Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe

Overview

General Information

Sample name:SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
Analysis ID:1431820
MD5:0d8bedda7d9b963de975685cf2b2a5eb
SHA1:cbbffe900a09e8a3bbb1a1bf16e7aeb8ebde72a1
SHA256:519f0b16537fa4a2bc228cdfce2b85c12225e2071d7789c8cc9bb8f7b85796ca
Tags:exe
Infos:

Detection

Score:16
Range:0 - 100
Whitelisted:false
Confidence:0%

Signatures

Yara detected BatToExe compiled binary
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
Potential key logger detected (key state polling based)
Queries keyboard layouts
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample searches for specific file, try point organization specific fake files to the analysis machine
  • System is w10x64
  • SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe (PID: 6284 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe" MD5: 0D8BEDDA7D9B963DE975685CF2B2A5EB)
    • SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp (PID: 6548 cmdline: "C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp" /SL5="$20438,4092287,121344,C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe" MD5: 90FC739C83CD19766ACB562C66A7D0E2)
      • Bat_To_Exe_Converter.exe (PID: 6128 cmdline: "C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe" MD5: E3D6B93E861FEEFA47CCEEAE03E99094)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpJoeSecurity_BatToExeYara detected BatToExe compiled binaryJoe Security
    Process Memory Space: Bat_To_Exe_Converter.exe PID: 6128JoeSecurity_BatToExeYara detected BatToExe compiled binaryJoe Security
      SourceRuleDescriptionAuthorStrings
      5.2.Bat_To_Exe_Converter.exe.1402216dd.3.raw.unpackJoeSecurity_BatToExeYara detected BatToExe compiled binaryJoe Security
        5.2.Bat_To_Exe_Converter.exe.1401e0add.2.raw.unpackJoeSecurity_BatToExeYara detected BatToExe compiled binaryJoe Security
          5.2.Bat_To_Exe_Converter.exe.140150618.1.raw.unpackJoeSecurity_BatToExeYara detected BatToExe compiled binaryJoe Security
            5.2.Bat_To_Exe_Converter.exe.140000000.0.unpackJoeSecurity_BatToExeYara detected BatToExe compiled binaryJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400A2380 CryptAcquireContextW,GetLastError,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,5_2_00000001400A2380
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014009AF20 exit,GetTempPathW,GetLastError,_malloc_dbg,_errno,GetTempPathW,??3@YAXPEAX@Z,GetFileAttributesW,GetLastError,GetLastError,_errno,GetFileAttributesW,GetLastError,_errno,CryptAcquireContextW,GetLastError,CryptGenRandom,??3@YAXPEAX@Z,CreateFileW,GetLastError,GetLastError,CryptReleaseContext,??3@YAXPEAX@Z,_open_osfhandle,CloseHandle,_errno,5_2_000000014009AF20
              Source: Bat_To_Exe_Converter.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.License AgreementCopyright (c) 2019 Fatih KodakPermission is hereby granted free of charge to any person obtaining a copyof this software and associated documentation files (the "Software") to dealin the Software without restriction including without limitation the rightsto use copy modify merge publish distribute sublicense and/or sellcopies of the Software and to permit persons to whom the Software isfurnished to do so subject to the following conditions:The above copyright notice and this permission notice shall be included inall copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND EXPRESS ORIMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITYFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THEAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHERLIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROMOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS INTHE SOFTWARE. I &accept the agreementI &do not accept the agreement&Next >Cancel
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.License AgreementCopyright (c) 2019 Fatih KodakPermission is hereby granted free of charge to any person obtaining a copyof this software and associated documentation files (the "Software") to dealin the Software without restriction including without limitation the rightsto use copy modify merge publish distribute sublicense and/or sellcopies of the Software and to permit persons to whom the Software isfurnished to do so subject to the following conditions:The above copyright notice and this permission notice shall be included inall copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND EXPRESS ORIMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITYFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THEAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHERLIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROMOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS INTHE SOFTWARE. I &accept the agreementI &do not accept the agreement&Next >Cancel
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe ConverterJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe Converter\unins000.datJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe Converter\is-54DM0.tmpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe Converter\is-48PVO.tmpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1Jump to behavior
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: Z?.PDB source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp
              Source: Binary string: d:\dev\All\shared\3rd_Party\Scintilla\1.76\bin\SciLexer.pdb source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Scilexer.dll.5.dr
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004BD20 wcslen,wcslen,RtlAllocateHeap,wcscpy,wcscat,wcscat,FindFirstFileW,GetLastError,HeapFree,5_2_000000014004BD20
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004C040 wcsncpy,wcslen,wcscat,GetDriveTypeW,FindFirstFileW,FindClose,GetFileAttributesW,GetDriveTypeW,5_2_000000014004C040
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004C434 wcsncpy,wcslen,wcsncpy,_snwprintf,FindFirstFileW,_snwprintf,wcscmp,wcscmp,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,5_2_000000014004C434
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\Roaming\Bat To Exe ConverterJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoRC.exeJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exeJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.2024179186.00000000021FA000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.2020443763.000000000235B000.00000004.00001000.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2924789685.0000000002ED6000.00000004.00000020.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi//b2e/downloads/v.zip
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000002.2021745061.000000000018E000.00000004.00000010.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000000.2018248651.00000001403C7000.00000008.00000001.01000000.00000008.sdmp, is-48PVO.tmp.1.drString found in binary or memory: http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/D
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/Submit
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.2020443763.000000000235B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/a
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.2020443763.000000000235B000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/q
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1669725255.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.1672186745.00000000031A0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/thttp://127.0.0.1:43110/17SWVnHoujG92yYGSZ
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: http://curl.haxx.se/docs/http-cookies.html
              Source: Bat_To_Exe_Converter.exeString found in binary or memory: http://curl.haxx.se/docs/http-cookies.html#
              Source: Bat_To_Exe_Converter.exeString found in binary or memory: http://www.f2ko.de/de/cmd.php
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.f2ko.de/de/cmd.phpDatei
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.f2ko.de/en/cmd.php
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.f2ko.de/en/cmd.phpVideosJapanese
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.godevtool.com
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.godevtool.com/GolinkFrame.htm
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.godevtool.com/GolinkFrame.htm/display
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.godevtool.com/GorcFrame.htm
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.godevtool.com/GorcFrame.htmPrivateBuildprivatebuildInterner
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.godevtool.comProduktversionCMD
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670603131.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670350947.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000000.1671462023.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp.0.dr, is-54DM0.tmp.1.drString found in binary or memory: http://www.innosetup.com/
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeString found in binary or memory: http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670603131.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670350947.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000000.1671462023.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp.0.dr, is-54DM0.tmp.1.drString found in binary or memory: http://www.remobjects.com/ps
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2924024021.000000000065B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3k
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2924024021.000000000065B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirm
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/99fk
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: https://github.com/99fkDokumenteLetzte
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://upx.github.io
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://upx.github.io/upx-license.html
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: https://upx.github.io/upx-license.htmlKonverterAltStyleGPL
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: https://upx.github.ioEine
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, upx.exe.5.drString found in binary or memory: https://upx.github.ioT
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.everaldo.com/
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.scintilla.org/
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.scintilla.org/ArchitekturAM/fileversionCouldn
              Source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.scintilla.org/License.txt
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpString found in binary or memory: https://www.scintilla.org/License.txtBat
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140060084 OpenClipboard,GetClipboardData,GlobalLock,wcslen,CloseClipboard,memcpy,GlobalUnWire,5_2_0000000140060084
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140397EB4 SetClipboardData,5_2_0000000140397EB4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005FFD0 OpenClipboard,wcslen,GlobalAlloc,EmptyClipboard,GlobalLock,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,5_2_000000014005FFD0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1E8224 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalAlloc,GlobalLock,MultiByteToWideChar,GlobalAlloc,GlobalLock,WideCharToMultiByte,GlobalUnlock,SetClipboardData,GlobalUnlock,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,SetClipboardData,SetClipboardData,CloseClipboard,5_2_00007FFDFF1E8224
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140060084 OpenClipboard,GetClipboardData,GlobalLock,wcslen,CloseClipboard,memcpy,GlobalUnWire,5_2_0000000140060084
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005DC08 GetFocus,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetClassNameW,_wcsncoll,IsDlgButtonChecked,GetKeyState,GetKeyState,GetKeyState,GetPropW,GetPropW,GetWindowThreadProcessId,GetCurrentProcessId,5_2_000000014005DC08
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1E59F8 IsChild,GetDlgCtrlID,SystemParametersInfoA,RegisterDragDrop,GetCursorPos,ScreenToClient,SystemParametersInfoA,ClientToScreen,IsWindowUnicode,WideCharToMultiByte,GetKeyState,GetKeyState,GetKeyState,SendMessageA,GetMessageTime,ImmGetContext,ImmReleaseContext,GetKeyState,GetMessageTime,DefWindowProcA,MsgWaitForMultipleObjects,GetTickCount,PostMessageA,SetFocus,5_2_00007FFDFF1E59F8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005D068 GetPropW,DefFrameProcW,SetLastError,NtdllDefWindowProc_W,5_2_000000014005D068
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140059267 GetClassNameW,_wcsicmp,_wcsicmp,_wcsicmp,NtdllDefWindowProc_W,CallWindowProcW,SetBkMode,DeleteObject,GetParent,GetClientRect,GetWindowRect,ScreenToClient,ScreenToClient,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,CreateWindowExW,DestroyWindow,CreateBrushIndirect,DeleteObject,DeleteDC,GetParent,GetUpdateRect,MapWindowPoints,InvalidateRect,GetParent,CallWindowProcW,5_2_0000000140059267
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005A27C GetWindowLongPtrW,CallWindowProcW,RemovePropW,RemovePropW,RevokeDragDrop,SetWindowLongPtrW,NtdllDefWindowProc_W,5_2_000000014005A27C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140057E94 CallWindowProcW,GetWindowLongPtrW,GetClientRect,FillRect,NtdllDefWindowProc_W,5_2_0000000140057E94
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140054030 NtdllDefWindowProc_W,GetWindowLongPtrW,GetPropW,SetWindowLongPtrW,RemovePropW,GetWindowTextW,GetWindowLongPtrW,SetPropW,SetWindowLongPtrW,5_2_0000000140054030
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005E0CC HeapFree,NtdllDefWindowProc_W,5_2_000000014005E0CC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140055520 GetWindowLongPtrW,GetClientRect,GetClientRect,GetScrollRange,GetScrollRange,GetScrollPos,GetScrollPos,SetScrollPos,CallWindowProcW,GetWindowLongPtrW,GetClientRect,FillRect,NtdllDefWindowProc_W,5_2_0000000140055520
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400526C8 GetWindowLongPtrW,SetCursor,BeginPaint,GetParent,IsDlgButtonChecked,FillRect,GetWindowTextW,SelectObject,GetClientRect,CreateRectRgnIndirect,SelectClipRgn,DeleteObject,IsWindowEnabled,SetBkMode,SetTextColor,TextOutW,GetTextExtentPoint32W,CreatePen,SelectObject,MoveToEx,LineTo,SelectObject,DeleteObject,DrawStateW,EndPaint,CallWindowProcW,CallWindowProcW,NtdllDefWindowProc_W,SetTimer,GetMessagePos,GetMessagePos,ScreenToClient,GetClientRect,GetParent,IsWindowEnabled,KillTimer,InvalidateRect,5_2_00000001400526C8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140055744 GetParent,GetWindowLongPtrW,GetScrollPos,IsDlgButtonChecked,SetFocus,GetParent,CallWindowProcW,GetParent,GetWindowLongPtrW,GetClientRect,FillRect,NtdllDefWindowProc_W,5_2_0000000140055744
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140397D84 NtdllDefWindowProc_W,5_2_0000000140397D84
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400010005_2_0000000140001000
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005D1385_2_000000014005D138
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400451E85_2_00000001400451E8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400423885_2_0000000140042388
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400840305_2_0000000140084030
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400CC0405_2_00000001400CC040
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400850505_2_0000000140085050
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400570C45_2_00000001400570C4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014006012C5_2_000000014006012C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014008015E5_2_000000014008015E
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400642585_2_0000000140064258
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400CA2F05_2_00000001400CA2F0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400803D55_2_00000001400803D5
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005F4445_2_000000014005F444
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014007D4D05_2_000000014007D4D0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400CB5C05_2_00000001400CB5C0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400D75F05_2_00000001400D75F0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400766A05_2_00000001400766A0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400526C85_2_00000001400526C8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005B6CC5_2_000000014005B6CC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400576E85_2_00000001400576E8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400856F05_2_00000001400856F0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400447C05_2_00000001400447C0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004788C5_2_000000014004788C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400F99305_2_00000001400F9930
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400799505_2_0000000140079950
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400849805_2_0000000140084980
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140065A205_2_0000000140065A20
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140079A305_2_0000000140079A30
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014007FACD5_2_000000014007FACD
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400FBAF05_2_00000001400FBAF0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400D6B505_2_00000001400D6B50
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400C9C205_2_00000001400C9C20
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014007FC655_2_000000014007FC65
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140083CA05_2_0000000140083CA0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140083CB05_2_0000000140083CB0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014006BCB05_2_000000014006BCB0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140075E005_2_0000000140075E00
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140073E605_2_0000000140073E60
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014009AF205_2_000000014009AF20
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004EF585_2_000000014004EF58
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140047FC85_2_0000000140047FC8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014006DFD45_2_000000014006DFD4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1E59F85_2_00007FFDFF1E59F8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1CE2145_2_00007FFDFF1CE214
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21FF9C5_2_00007FFDFF21FF9C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1D3FBC5_2_00007FFDFF1D3FBC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22AFA45_2_00007FFDFF22AFA4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2240205_2_00007FFDFF224020
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF20EE705_2_00007FFDFF20EE70
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F9EC05_2_00007FFDFF1F9EC0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1DCF485_2_00007FFDFF1DCF48
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1EADD45_2_00007FFDFF1EADD4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22BDE45_2_00007FFDFF22BDE4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F4E545_2_00007FFDFF1F4E54
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF235E385_2_00007FFDFF235E38
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21DC845_2_00007FFDFF21DC84
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21CC885_2_00007FFDFF21CC88
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF215B945_2_00007FFDFF215B94
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F1B945_2_00007FFDFF1F1B94
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22EB705_2_00007FFDFF22EB70
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1CCB705_2_00007FFDFF1CCB70
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1FDBB45_2_00007FFDFF1FDBB4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1DFA805_2_00007FFDFF1DFA80
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1EDAA05_2_00007FFDFF1EDAA0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF20FAEC5_2_00007FFDFF20FAEC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF211B585_2_00007FFDFF211B58
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF203B545_2_00007FFDFF203B54
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF20CB485_2_00007FFDFF20CB48
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1C6B245_2_00007FFDFF1C6B24
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1FF9C85_2_00007FFDFF1FF9C8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF20BA2C5_2_00007FFDFF20BA2C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1FE87C5_2_00007FFDFF1FE87C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21B8C05_2_00007FFDFF21B8C0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1EE8F05_2_00007FFDFF1EE8F0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1DF8F05_2_00007FFDFF1DF8F0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F09205_2_00007FFDFF1F0920
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21993C5_2_00007FFDFF21993C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF20979C5_2_00007FFDFF20979C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F57945_2_00007FFDFF1F5794
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22A7685_2_00007FFDFF22A768
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21D7DC5_2_00007FFDFF21D7DC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1EB7F85_2_00007FFDFF1EB7F8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22970C5_2_00007FFDFF22970C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2026E05_2_00007FFDFF2026E0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2226E85_2_00007FFDFF2226E8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F47405_2_00007FFDFF1F4740
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1EF7205_2_00007FFDFF1EF720
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF20D5905_2_00007FFDFF20D590
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2145985_2_00007FFDFF214598
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F25985_2_00007FFDFF1F2598
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1FB64C5_2_00007FFDFF1FB64C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21A6445_2_00007FFDFF21A644
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22764C5_2_00007FFDFF22764C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF23163C5_2_00007FFDFF23163C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1FC49C5_2_00007FFDFF1FC49C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2104605_2_00007FFDFF210460
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1E45045_2_00007FFDFF1E4504
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF21E3C05_2_00007FFDFF21E3C0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2323AC5_2_00007FFDFF2323AC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2284385_2_00007FFDFF228438
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1CB2605_2_00007FFDFF1CB260
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1FF3185_2_00007FFDFF1FF318
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22530C5_2_00007FFDFF22530C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2152EC5_2_00007FFDFF2152EC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1ED1C85_2_00007FFDFF1ED1C8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F82005_2_00007FFDFF1F8200
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F71F05_2_00007FFDFF1F71F0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2352345_2_00007FFDFF235234
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF20A2345_2_00007FFDFF20A234
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1FD0985_2_00007FFDFF1FD098
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF1F10D05_2_00007FFDFF1F10D0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF23111C5_2_00007FFDFF23111C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2010E85_2_00007FFDFF2010E8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF2091445_2_00007FFDFF209144
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: String function: 00000001400C7720 appears 52 times
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: String function: 0000000140072F30 appears 412 times
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: String function: 00007FFDFF22F1C0 appears 157 times
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: String function: 0000000140073020 appears 65 times
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Source: is-54DM0.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
              Source: is-54DM0.tmp.1.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670350947.00000000024C6000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670603131.000000007FE32000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameshfolder.dll~/ vs SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: is-48PVO.tmp.1.drStatic PE information: Section: UPX1 ZLIB complexity 0.999680434853633
              Source: upx.exe.5.drStatic PE information: Section: UPX1 ZLIB complexity 0.9970993193069307
              Source: classification engineClassification label: clean16.evad.winEXE@5/33@0/1
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140014D9A BeginUpdateResourceW,SizeofResource,UpdateResourceW,EndUpdateResourceA,FreeLibrary,5_2_0000000140014D9A
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\Program Files\Bat To Exe ConverterJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\Users\user\AppData\Local\ProgramsJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeFile created: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmpJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile read: C:\Program Files\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
              Source: Bat_To_Exe_Converter.exeString found in binary or memory: -help
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeString found in binary or memory: /LOADINF="filename"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeProcess created: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp "C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp" /SL5="$20438,4092287,121344,C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess created: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe "C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeProcess created: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp "C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp" /SL5="$20438,4092287,121344,C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess created: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe "C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe"Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: msimg32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: rstrtmgr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: msftedit.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: windows.globalization.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: bcp47mrm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: globinputhost.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: windows.ui.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: windowmanagementapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: inputhost.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: explorerframe.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: sfc.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: sfc_os.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: linkinfo.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: ntshrui.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: cscapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpSection loaded: netutils.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: version.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: msimg32.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: wtsapi32.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: ehstorshell.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: cscui.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: thumbcache.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: policymanager.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: msvcp110_win.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: dataexchange.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: d3d11.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: dcomp.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: dxgi.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
              Source: Bat To Exe Converter.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
              Source: Uninstall Bat To Exe Converter.lnk.1.drLNK file: ..\..\..\..\..\..\Program Files\Bat To Exe Converter\unins000.exe
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpWindow found: window name: TSelectLanguageFormJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: OK
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: I accept the agreement
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: Next >
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: I accept the agreement
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: Next >
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: Next >
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: I accept the agreement
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: Next >
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: I accept the agreement
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: Install
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpAutomated click: I accept the agreement
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile opened: C:\Windows\SysWOW64\MSFTEDIT.DLLJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.License AgreementCopyright (c) 2019 Fatih KodakPermission is hereby granted free of charge to any person obtaining a copyof this software and associated documentation files (the "Software") to dealin the Software without restriction including without limitation the rightsto use copy modify merge publish distribute sublicense and/or sellcopies of the Software and to permit persons to whom the Software isfurnished to do so subject to the following conditions:The above copyright notice and this permission notice shall be included inall copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND EXPRESS ORIMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITYFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THEAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHERLIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROMOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS INTHE SOFTWARE. I &accept the agreementI &do not accept the agreement&Next >Cancel
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpWindow detected: License AgreementPlease read the following important information before continuing.Please read the following License Agreement. You must accept the terms of this agreement before continuing with the installation.License AgreementCopyright (c) 2019 Fatih KodakPermission is hereby granted free of charge to any person obtaining a copyof this software and associated documentation files (the "Software") to dealin the Software without restriction including without limitation the rightsto use copy modify merge publish distribute sublicense and/or sellcopies of the Software and to permit persons to whom the Software isfurnished to do so subject to the following conditions:The above copyright notice and this permission notice shall be included inall copies or substantial portions of the Software.THE SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND EXPRESS ORIMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITYFITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THEAUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHERLIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROMOUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS INTHE SOFTWARE. I &accept the agreementI &do not accept the agreement&Next >Cancel
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeWindow detected: Number of UI elements: 34
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe ConverterJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe Converter\unins000.datJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe Converter\is-54DM0.tmpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDirectory created: C:\Program Files\Bat To Exe Converter\is-48PVO.tmpJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1Jump to behavior
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeStatic file information: File size 4482593 > 1048576
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: Z?.PDB source: Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp
              Source: Binary string: d:\dev\All\shared\3rd_Party\Scintilla\1.76\bin\SciLexer.pdb source: Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Scilexer.dll.5.dr

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 5.2.Bat_To_Exe_Converter.exe.1402216dd.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Bat_To_Exe_Converter.exe.1401e0add.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Bat_To_Exe_Converter.exe.140150618.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.Bat_To_Exe_Converter.exe.140000000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Bat_To_Exe_Converter.exe PID: 6128, type: MEMORYSTR
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004C1BC LoadLibraryW,GetProcAddress,wcscpy,wcscat,wcslen,FreeLibrary,wcscat,wcslen,5_2_000000014004C1BC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140075191 push rbp; iretd 5_2_0000000140075192
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014007538F push r13; retf 5_2_0000000140075391
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014007538C push rbp; retf 5_2_000000014007538D
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400746EA pushfq ; retf 5_2_00000001400746EB
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400746F1 pushfq ; retf 5_2_00000001400746F8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140074EF9 push rbp; retf 5_2_0000000140074F00
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_0000000140074F02 push r13; retf 5_2_0000000140074F04
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeFile created: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpJump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile created: C:\Users\user\AppData\Roaming\Bat To Exe Converter\upx.exeJump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile created: C:\Users\user\AppData\Roaming\Bat To Exe Converter\Scilexer.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\Program Files\Bat To Exe Converter\is-54DM0.tmpJump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile created: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoRC.exeJump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile created: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\Program Files\Bat To Exe Converter\is-48PVO.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe (copy)Jump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\Users\user\AppData\Local\Temp\is-DVABN.tmp\_isetup\_setup64.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\Program Files\Bat To Exe Converter\unins000.exe (copy)Jump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Bat To Exe ConverterJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Bat To Exe Converter\Bat To Exe Converter.lnkJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Bat To Exe Converter\Uninstall Bat To Exe Converter.lnkJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005C6A8 GetWindow,SetActiveWindow,GetWindow,IsZoomed,IsIconic,IsIconic,ShowWindow,5_2_000000014005C6A8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005C6A8 GetWindow,SetActiveWindow,GetWindow,IsZoomed,IsIconic,IsIconic,ShowWindow,5_2_000000014005C6A8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005CE70 IsZoomed,IsIconic,5_2_000000014005CE70
              Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeWindow / User API: threadDelayed 882Jump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Bat To Exe Converter\upx.exeJump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Bat To Exe Converter\Scilexer.dllJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDropped PE file which has not been started: C:\Program Files\Bat To Exe Converter\is-54DM0.tmpJump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoRC.exeJump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-DVABN.tmp\_isetup\_setup64.tmpJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpDropped PE file which has not been started: C:\Program Files\Bat To Exe Converter\unins000.exe (copy)Jump to dropped file
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_5-103273
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004BD20 wcslen,wcslen,RtlAllocateHeap,wcscpy,wcscat,wcscat,FindFirstFileW,GetLastError,HeapFree,5_2_000000014004BD20
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004C040 wcsncpy,wcslen,wcscat,GetDriveTypeW,FindFirstFileW,FindClose,GetFileAttributesW,GetDriveTypeW,5_2_000000014004C040
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004C434 wcsncpy,wcslen,wcsncpy,_snwprintf,FindFirstFileW,_snwprintf,wcscmp,wcscmp,SetFileAttributesW,DeleteFileW,FindNextFileW,FindClose,SetFileAttributesW,RemoveDirectoryW,5_2_000000014004C434
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\userJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\Roaming\Bat To Exe ConverterJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoRC.exeJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exeJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeFile opened: C:\Users\user\AppDataJump to behavior
              Source: Bat_To_Exe_Converter.exe, 00000005.00000002.2924024021.000000000060A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll7
              Source: SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.2021422458.000000000067C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\3
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeAPI call chain: ExitProcess graph end nodegraph_5-103407
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpProcess information queried: ProcessInformationJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22DB70 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFDFF22DB70
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014004C1BC LoadLibraryW,GetProcAddress,wcscpy,wcscat,wcslen,FreeLibrary,wcscat,wcslen,5_2_000000014004C1BC
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400471B0 RtlRemoveVectoredExceptionHandler,RtlAddVectoredExceptionHandler,5_2_00000001400471B0
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22DB70 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFDFF22DB70
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF22F270 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00007FFDFF22F270
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00007FFDFF23212C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00007FFDFF23212C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: GetLocaleInfoA,5_2_00007FFDFF23605C
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: GetKeyboardLayout,GetLocaleInfoA,5_2_00007FFDFF1E5434
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014005F8E4 GetLocalTime,5_2_000000014005F8E4
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_00000001400439C8 memset,memset,GetVersionExW,CreateWindowExW,SetWindowLongPtrW,IsDlgButtonChecked,5_2_00000001400439C8
              Source: C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exeCode function: 5_2_000000014039813C WSACleanup,bind,connect,5_2_000000014039813C
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Command and Scripting Interpreter
              1
              Windows Service
              1
              Windows Service
              3
              Masquerading
              1
              Input Capture
              1
              System Time Discovery
              Remote Services1
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Native API
              1
              Registry Run Keys / Startup Folder
              1
              Process Injection
              1
              Process Injection
              LSASS Memory11
              Security Software Discovery
              Remote Desktop Protocol11
              Archive Collected Data
              Junk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt1
              DLL Side-Loading
              1
              Registry Run Keys / Startup Folder
              1
              Deobfuscate/Decode Files or Information
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              SteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              21
              Obfuscated Files or Information
              NTDS11
              Application Window Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Software Packing
              LSA Secrets2
              System Owner/User Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials3
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync33
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe3%ReversingLabs
              SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe4%VirustotalBrowse
              SourceDetectionScannerLabelLink
              C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe (copy)0%ReversingLabs
              C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe (copy)1%VirustotalBrowse
              C:\Program Files\Bat To Exe Converter\is-48PVO.tmp0%ReversingLabs
              C:\Program Files\Bat To Exe Converter\is-48PVO.tmp1%VirustotalBrowse
              C:\Program Files\Bat To Exe Converter\is-54DM0.tmp5%ReversingLabs
              C:\Program Files\Bat To Exe Converter\is-54DM0.tmp0%VirustotalBrowse
              C:\Program Files\Bat To Exe Converter\unins000.exe (copy)5%ReversingLabs
              C:\Program Files\Bat To Exe Converter\unins000.exe (copy)0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp3%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\is-DVABN.tmp\_isetup\_setup64.tmp0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\is-DVABN.tmp\_isetup\_setup64.tmp0%VirustotalBrowse
              C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exe4%ReversingLabs
              C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exe3%VirustotalBrowse
              C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoRC.exe0%ReversingLabs
              C:\Users\user\AppData\Roaming\Bat To Exe Converter\Scilexer.dll0%ReversingLabs
              C:\Users\user\AppData\Roaming\Bat To Exe Converter\upx.exe0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://www.remobjects.com/ps0%URL Reputationsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/0%Avira URL Cloudsafe
              https://upx.github.io/upx-license.htmlKonverterAltStyleGPL0%Avira URL Cloudsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/thttp://127.0.0.1:43110/17SWVnHoujG92yYGSZ0%Avira URL Cloudsafe
              http://www.innosetup.com/0%Avira URL Cloudsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/Submit0%Avira URL Cloudsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/D0%Avira URL Cloudsafe
              https://upx.github.io0%Avira URL Cloudsafe
              https://upx.github.ioEine0%Avira URL Cloudsafe
              http://www.innosetup.com/2%VirustotalBrowse
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/Submit0%VirustotalBrowse
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/thttp://127.0.0.1:43110/17SWVnHoujG92yYGSZ0%VirustotalBrowse
              https://upx.github.io/upx-license.html0%Avira URL Cloudsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/0%VirustotalBrowse
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/q0%Avira URL Cloudsafe
              https://upx.github.io/upx-license.htmlKonverterAltStyleGPL0%VirustotalBrowse
              https://upx.github.io0%VirustotalBrowse
              https://upx.github.ioT0%Avira URL Cloudsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi//b2e/downloads/v.zip0%Avira URL Cloudsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/a0%Avira URL Cloudsafe
              https://www.everaldo.com/0%Avira URL Cloudsafe
              http://www.godevtool.comProduktversionCMD0%Avira URL Cloudsafe
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/q0%VirustotalBrowse
              https://upx.github.io/upx-license.html0%VirustotalBrowse
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/D0%VirustotalBrowse
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/a1%VirustotalBrowse
              https://www.everaldo.com/0%VirustotalBrowse
              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi//b2e/downloads/v.zip0%VirustotalBrowse
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.innosetup.com/SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670603131.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670350947.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000000.1671462023.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp.0.dr, is-54DM0.tmp.1.drfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://upx.github.io/upx-license.htmlKonverterAltStyleGPLBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.godevtool.com/GolinkFrame.htmBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/thttp://127.0.0.1:43110/17SWVnHoujG92yYGSZSecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1669725255.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.1672186745.00000000031A0000.00000004.00001000.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/SubmitBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupUSecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exefalse
                  high
                  http://curl.haxx.se/docs/http-cookies.html#Bat_To_Exe_Converter.exefalse
                    high
                    https://github.com/99fkDokumenteLetzteBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                      high
                      https://www.scintilla.org/Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://www.scintilla.org/License.txtBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.2024179186.00000000021FA000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.2020443763.000000000235B000.00000004.00001000.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://github.com/99fkBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://www.godevtool.com/GorcFrame.htmPrivateBuildprivatebuildInternerBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                              high
                              http://www.f2ko.de/de/cmd.phpBat_To_Exe_Converter.exefalse
                                high
                                http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/DSecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000002.2021745061.000000000018E000.00000004.00000010.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000000.2018248651.00000001403C7000.00000008.00000001.01000000.00000008.sdmp, is-48PVO.tmp.1.drfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                https://upx.github.ioBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                • 0%, Virustotal, Browse
                                • Avira URL Cloud: safe
                                unknown
                                https://upx.github.ioEineBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://aka.ms/Vh5j3kBat_To_Exe_Converter.exe, 00000005.00000002.2924024021.000000000065B000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://upx.github.io/upx-license.htmlBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://curl.haxx.se/docs/http-cookies.htmlBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                    high
                                    http://www.godevtool.com/GorcFrame.htmBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://aka.ms/odirmBat_To_Exe_Converter.exe, 00000005.00000002.2924024021.000000000065B000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.f2ko.de/en/cmd.phpVideosJapaneseBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                          high
                                          http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/qSecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.2020443763.000000000235B000.00000004.00001000.00020000.00000000.sdmpfalse
                                          • 0%, Virustotal, Browse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.f2ko.de/de/cmd.phpDateiBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                            high
                                            http://www.godevtool.comBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi//b2e/downloads/v.zipBat_To_Exe_Converter.exe, 00000005.00000002.2924789685.0000000002ED6000.00000004.00000020.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • 0%, Virustotal, Browse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.scintilla.org/ArchitekturAM/fileversionCouldnBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                                high
                                                https://upx.github.ioTBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, upx.exe.5.drfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                http://www.remobjects.com/psSecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670603131.000000007FD20000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe, 00000000.00000003.1670350947.00000000023B0000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000000.1671462023.0000000000401000.00000020.00000001.01000000.00000004.sdmp, SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp.0.dr, is-54DM0.tmp.1.drfalse
                                                • URL Reputation: safe
                                                unknown
                                                https://www.scintilla.org/License.txtBatBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                                  high
                                                  http://www.godevtool.com/GolinkFrame.htm/displayBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                                    high
                                                    http://www.f2ko.de/en/cmd.phpBat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/aSecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp, 00000001.00000003.2020443763.000000000235B000.00000004.00001000.00020000.00000000.sdmpfalse
                                                      • 1%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://www.godevtool.comProduktversionCMDBat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://www.everaldo.com/Bat_To_Exe_Converter.exe, Bat_To_Exe_Converter.exe, 00000005.00000002.2924550088.00000000022A9000.00000004.00000020.00020000.00000000.sdmp, Bat_To_Exe_Converter.exe, 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpfalse
                                                      • 0%, Virustotal, Browse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      IP
                                                      127.0.0.1
                                                      Joe Sandbox version:40.0.0 Tourmaline
                                                      Analysis ID:1431820
                                                      Start date and time:2024-04-25 20:39:06 +02:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 6m 35s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:8
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
                                                      Detection:CLEAN
                                                      Classification:clean16.evad.winEXE@5/33@0/1
                                                      EGA Information:
                                                      • Successful, ratio: 100%
                                                      HCA Information:
                                                      • Successful, ratio: 91%
                                                      • Number of executed functions: 124
                                                      • Number of non-executed functions: 91
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      No simulations
                                                      No context
                                                      No context
                                                      No context
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmpexpat-win32bin-2.6.2.exeGet hashmaliciousUnknownBrowse
                                                        Ps1_To_Exe_(Installer).exeGet hashmaliciousUnknownBrowse
                                                          CHT1044.Compact.Analyzer.v2.34.10.0.exeGet hashmaliciousUnknownBrowse
                                                            window driver-Receipt.exeGet hashmaliciousUnknownBrowse
                                                              setup.exeGet hashmaliciousUnknownBrowse
                                                                5CdYzOKRTr.exeGet hashmaliciousUnknownBrowse
                                                                  GoogleTranslateDesktop.exeGet hashmaliciousUnknownBrowse
                                                                    483595855.exeGet hashmaliciousUnknownBrowse
                                                                      setup.exeGet hashmaliciousUnknownBrowse
                                                                        WinCash_Backoffice.exeGet hashmaliciousUnknownBrowse
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):2105856
                                                                          Entropy (8bit):7.972220715342655
                                                                          Encrypted:false
                                                                          SSDEEP:49152:NOPSa4ZImzdAxZmKLEb+T+VY07d7AidLAbbtwSjugk:NraitzdAfBEa0AiLAbbO0ugk
                                                                          MD5:E3D6B93E861FEEFA47CCEEAE03E99094
                                                                          SHA1:94AC369EA396C6A4C23DDCFB41CFDFE81CE0B3DA
                                                                          SHA-256:55DF60E09826469E543C090198AC6A12E1269047A88ED698E25E6E62D83FF4C7
                                                                          SHA-512:2C00287925DCB22B4BABD7C49E9035CCB92B895F123791EF361FF495B08D74FE1E9ADD54C1FCABD4DE3CD396FAAFECCBAE0C750913D911DBA6531F51AB126402
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                                                          Reputation:low
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....@]........../....2.....@...p...X<........@..............................>...............................................................>.$....p<..7..........................................................................................................UPX0.....p..............................UPX1................................@....rsrc....@...p<..<..................@...3.94.UPX!.$..~.J.....E<<.......;.I......$ ..].e..M....L....3...JY.h.. .I...(.J.....^.s..Y........ On..f&.4.J.S.):.O.R(7s._.U,X...t..1H|...X<...J^1m../.&.......].>..[D.#....u...vqT...k..m...N.<.......D>...|.@/.&..&Q..4..W...!q.m..e0...C?..M..k..7..79.....5...'..l]..!...*.....A,$7If.<.4S*.....w&z.......]n...*...;........Q...............n.-...K.+v9.....b.<J....*?FXD..3.........t.h8..K.Q*..?.7.ia.\<....-t..}..b..6$f'....h{l...X.g..S1$..f.....a(.7=.......6Y%..'/./....u
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):2105856
                                                                          Entropy (8bit):7.972220715342655
                                                                          Encrypted:false
                                                                          SSDEEP:49152:NOPSa4ZImzdAxZmKLEb+T+VY07d7AidLAbbtwSjugk:NraitzdAfBEa0AiLAbbO0ugk
                                                                          MD5:E3D6B93E861FEEFA47CCEEAE03E99094
                                                                          SHA1:94AC369EA396C6A4C23DDCFB41CFDFE81CE0B3DA
                                                                          SHA-256:55DF60E09826469E543C090198AC6A12E1269047A88ED698E25E6E62D83FF4C7
                                                                          SHA-512:2C00287925DCB22B4BABD7C49E9035CCB92B895F123791EF361FF495B08D74FE1E9ADD54C1FCABD4DE3CD396FAAFECCBAE0C750913D911DBA6531F51AB126402
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                                                          Reputation:low
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....@]........../....2.....@...p...X<........@..............................>...............................................................>.$....p<..7..........................................................................................................UPX0.....p..............................UPX1................................@....rsrc....@...p<..<..................@...3.94.UPX!.$..~.J.....E<<.......;.I......$ ..].e..M....L....3...JY.h.. .I...(.J.....^.s..Y........ On..f&.4.J.S.):.O.R(7s._.U,X...t..1H|...X<...J^1m../.&.......].>..[D.#....u...vqT...k..m...N.<.......D>...|.@/.&..&Q..4..W...!q.m..e0...C?..M..k..7..79.....5...'..l]..!...*.....A,$7If.<.4S*.....w&z.......]n...*...;........Q...............n.-...K.+v9.....b.<J....*?FXD..3.........t.h8..K.Q*..?.7.ia.\<....-t..}..b..6$f'....h{l...X.g..S1$..f.....a(.7=.......6Y%..'/./....u
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1202385
                                                                          Entropy (8bit):6.3676423528784865
                                                                          Encrypted:false
                                                                          SSDEEP:24576:JtdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt5lTxyt1:3qTytRFk6ek1L2
                                                                          MD5:628B00C12FAC5A7E788FDFD8A02244D1
                                                                          SHA1:7C318E92F2AE8E77FBF3669C65D56E4691648CE3
                                                                          SHA-256:BBD0534581D5EF17243748536FD95C31031600017C97F1645E83E44F1A7B2E62
                                                                          SHA-512:3061987D15DAF427824771DBEAA56692C51817EB814B52309EF061606892CB1A71DE7A4895CE33C6D38A313DC990ACEDED237F90D2202802BD02472E25A5EE49
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 5%
                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                          Reputation:low
                                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......W............................l........ ....@.......................................@......@..............................@8...0....................................................... .......................................................text............................... ..`.itext.............................. ..`.data...h0... ...2..................@....bss.....a...`.......0...................idata..@8.......:...0..............@....tls....<............j...................rdata....... .......j..............@..@.rsrc........0.......l..............@..@....................................@..@........................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:InnoSetup Log 64-bit Bat To Exe Converter {60C29EC2-33E8-45EE-87E4-31FA3E35C539}, version 0x418, 4039 bytes, 258555\37\user\376, C:\Program Files\Bat To Exe Converter\376\
                                                                          Category:dropped
                                                                          Size (bytes):4039
                                                                          Entropy (8bit):3.5882877667893496
                                                                          Encrypted:false
                                                                          SSDEEP:96:3fCpbcuJlEDA4MZAe2L2ICDcCJC6lCDUCph7Cph4HHhqe:3WbP4DSmpckHp
                                                                          MD5:80AEC56BA3D0709D35D42B8B38D9BF3F
                                                                          SHA1:8CB6A748FCDED66A2B0EB1F2253CB131214E031F
                                                                          SHA-256:D273D2462493CFB5DAF9145E53B8D3321964946E42DC02041DA537281B77C4F9
                                                                          SHA-512:BCDC2B857C1ABC2639C80E89D77EC27ED62B75927648392EFA0FC267E8A4937B26577EE359C92B5C7ED02B95F389F899A528E40B5CD0B2E83177F6743208893F
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:Inno Setup Uninstall Log (b) 64-bit.............................{60C29EC2-33E8-45EE-87E4-31FA3E35C539}..........................................................................................Bat To Exe Converter........................................................................................................................%...............................................................................................................@..+.........+GQ...............2.5.8.5.5.5......j.o.n.e.s......C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r................(...F.. ..............IFPS....................................................................................................................................................................BOOLEAN......................!MAIN....-1..IS64BITINSTALLMODE................C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r..n...C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1202385
                                                                          Entropy (8bit):6.3676423528784865
                                                                          Encrypted:false
                                                                          SSDEEP:24576:JtdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt5lTxyt1:3qTytRFk6ek1L2
                                                                          MD5:628B00C12FAC5A7E788FDFD8A02244D1
                                                                          SHA1:7C318E92F2AE8E77FBF3669C65D56E4691648CE3
                                                                          SHA-256:BBD0534581D5EF17243748536FD95C31031600017C97F1645E83E44F1A7B2E62
                                                                          SHA-512:3061987D15DAF427824771DBEAA56692C51817EB814B52309EF061606892CB1A71DE7A4895CE33C6D38A313DC990ACEDED237F90D2202802BD02472E25A5EE49
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 5%
                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                          Reputation:low
                                                                          Preview:MZP.....................@.......................InUn....................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......W............................l........ ....@.......................................@......@..............................@8...0....................................................... .......................................................text............................... ..`.itext.............................. ..`.data...h0... ...2..................@....bss.....a...`.......0...................idata..@8.......:...0..............@....tls....<............j...................rdata....... .......j..............@..@.rsrc........0.......l..............@..@....................................@..@........................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 17:40:25 2024, mtime=Thu Apr 25 17:40:26 2024, atime=Tue Jul 30 08:54:40 2019, length=2105856, window=hide
                                                                          Category:dropped
                                                                          Size (bytes):1015
                                                                          Entropy (8bit):4.534697656204505
                                                                          Encrypted:false
                                                                          SSDEEP:24:8mnRldygJ/IWjVrUADhhMdFWQxdFWtr/Bm:8mndhRjDhhMddd2F
                                                                          MD5:F42E62654AEAE9ABAC3C82E5B18D3119
                                                                          SHA1:B528E3F69F7B4E0B24B4F050EBCB67831665FA4C
                                                                          SHA-256:C899E33D85FACA785819143235C0EAF3297BA07267CA2B3D7ABF9621B95C9007
                                                                          SHA-512:31A9822B6A9D5E50BC5AC21A57AEB57EA4A6EF0DACD104EEE8BAE7FEBA941047E3E4A9CE8B53C2DB5E43439D5DEC071A47D90FEFCBD23BA59DD01B8679D0A25D
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:L..................F.... ...L..@....l..@.......F..." ..........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IDWQ`....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....r.1......X....BATTOE~1..Z......X...X............................&.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r.....~.2.." ..N.N .BAT_TO~1.EXE..b......X...X...............................B.a.t._.T.o._.E.x.e._.C.o.n.v.e.r.t.e.r...e.x.e.......m...............-.......l...........?$d......C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe..M.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r.\.B.a.t._.T.o._.E.x.e._.C.o.n.v.e.r.t.e.r...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r.`.......X.......258555...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?.
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 17:40:25 2024, mtime=Thu Apr 25 17:40:25 2024, atime=Thu Apr 25 17:39:56 2024, length=1202385, window=hide
                                                                          Category:dropped
                                                                          Size (bytes):955
                                                                          Entropy (8bit):4.5891660457182555
                                                                          Encrypted:false
                                                                          SSDEEP:24:8mmAbdygJ/IWkDhIQA/h4dFWNgdFWtrTBm:8mm0dhQDh4/h4dOgd2Z
                                                                          MD5:991F6FE2A628D3996237065EE5FA004D
                                                                          SHA1:76E30774608496332AA507ED634E6A95BB50C3CE
                                                                          SHA-256:FA6E32B7F0DDE54847C6BAD806960E2B410E17BC5B8F57B95DEAB2FA2AD8B767
                                                                          SHA-512:FFAB602FFF593244C2AF667761D1456DF4E5B6DA2A6C5B056D54AAF09A35C17ACA449C3133BFFBE333811B5A916100BE70574D8691E62FC56FD95F28260BC010
                                                                          Malicious:false
                                                                          Reputation:low
                                                                          Preview:L..................F.... ......@......@.....k.?....X...........................P.O. .:i.....+00.../C:\.....................1......X....PROGRA~1..t......O.I.X......B...............J.......:.P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....r.1......X....BATTOE~1..Z......X...X............................&.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r.....f.2..X...X.. .unins000.exe..J......X...X............................:..u.n.i.n.s.0.0.0...e.x.e.......a...............-.......`...........?$d......C:\Program Files\Bat To Exe Converter\unins000.exe..A.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r.\.u.n.i.n.s.0.0.0...e.x.e.%.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.B.a.t. .T.o. .E.x.e. .C.o.n.v.e.r.t.e.r.`.......X.......258555...........hT..CrF.f4... .".T..b...,.......hT..CrF.f4... .".T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                          Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):1179648
                                                                          Entropy (8bit):6.395287124443116
                                                                          Encrypted:false
                                                                          SSDEEP:24576:RtdAm9DUi/CR3wCkCiRgoG7hBaHkbEXXeG/jFt5lTxyt:PqTytRFk6ek1L
                                                                          MD5:90FC739C83CD19766ACB562C66A7D0E2
                                                                          SHA1:451F385A53D5FED15E7649E7891E05F231EF549A
                                                                          SHA-256:821BD11693BF4B4B2B9F3C196036E1F4902ABD95FB26873EA6C43E123B8C9431
                                                                          SHA-512:4CB11AD48B7585EF1B70FAC9E3C25610B2F64A16358CD51E32ADCB0B17A6AB1C934AEB10ADAA8E9DDF69B2E2F1D18FE2E87B49B39F89B05EA13AA3205E41296C
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 3%
                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                          Joe Sandbox View:
                                                                          • Filename: expat-win32bin-2.6.2.exe, Detection: malicious, Browse
                                                                          • Filename: Ps1_To_Exe_(Installer).exe, Detection: malicious, Browse
                                                                          • Filename: CHT1044.Compact.Analyzer.v2.34.10.0.exe, Detection: malicious, Browse
                                                                          • Filename: window driver-Receipt.exe, Detection: malicious, Browse
                                                                          • Filename: setup.exe, Detection: malicious, Browse
                                                                          • Filename: 5CdYzOKRTr.exe, Detection: malicious, Browse
                                                                          • Filename: GoogleTranslateDesktop.exe, Detection: malicious, Browse
                                                                          • Filename: 483595855.exe, Detection: malicious, Browse
                                                                          • Filename: setup.exe, Detection: malicious, Browse
                                                                          • Filename: WinCash_Backoffice.exe, Detection: malicious, Browse
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L......W............................l........ ....@.......................................@......@..............................@8...0....................................................... .......................................................text............................... ..`.itext.............................. ..`.data...h0... ...2..................@....bss.....a...`.......0...................idata..@8.......:...0..............@....tls....<............j...................rdata....... .......j..............@..@.rsrc........0.......l..............@..@....................................@..@........................................................................................................................................
                                                                          Process:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):6144
                                                                          Entropy (8bit):4.720366600008286
                                                                          Encrypted:false
                                                                          SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12p+gt1sONA0:sfJEVYlvxaX12C6A0
                                                                          MD5:E4211D6D009757C078A9FAC7FF4F03D4
                                                                          SHA1:019CD56BA687D39D12D4B13991C9A42EA6BA03DA
                                                                          SHA-256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
                                                                          SHA-512:17257F15D843E88BB78ADCFB48184B8CE22109CC2C99E709432728A392AFAE7B808ED32289BA397207172DE990A354F15C2459B6797317DA8EA18B040C85787E
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                                                          Reputation:high, very likely benign file
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d.....R..........#............................@.............................`.......,......................................................<!.......P..H....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...H....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:very short file (no magic)
                                                                          Category:dropped
                                                                          Size (bytes):1
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3::
                                                                          MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                          SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                          SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                          SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                          Malicious:false
                                                                          Preview:.
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:very short file (no magic)
                                                                          Category:dropped
                                                                          Size (bytes):1
                                                                          Entropy (8bit):0.0
                                                                          Encrypted:false
                                                                          SSDEEP:3::
                                                                          MD5:93B885ADFE0DA089CDF634904FD59F71
                                                                          SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                                                          SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                                                          SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                                                          Malicious:false
                                                                          Preview:.
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):47104
                                                                          Entropy (8bit):6.38249525851103
                                                                          Encrypted:false
                                                                          SSDEEP:768:kWyGCFzNhPlIpVnwuDbU0xy576WK73T3aFfVbBiRchq/rgIQs1GAXw1WInr7llh0:kDFpgpBd80OK7D0VbBiyADg9s1JXw4Iz
                                                                          MD5:CAFC4EEC8A4F05B8DFEE4067FB5B9076
                                                                          SHA1:38F4C66246636E187FE4BF2AA8CB1D9B2502A14C
                                                                          SHA-256:1FA554D18490CB5E56D624CD97069F42E63800688136C6CF3C521E4EF6E83E28
                                                                          SHA-512:3C3E7C874E6B182AEF812A1B593C3B1A3EA6EFD5AE99792B88009CB6E6E0CEE13C46FC26A1DBB7D73899A2ED01F73779C06D85246FD23EDC6BF04FE41E0E133B
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 4%
                                                                          • Antivirus: Virustotal, Detection: 3%, Browse
                                                                          Preview:MZl.....................@.......Win32 Program!..$......!.L.!`...GoLink, GoAsm www.GoDevTool.com.PE..L.....\I.................x...<.......|............@..................................U........... ..............................(.......................................3...........................................$...............................code.....w.......x.................. ..`data.....D.......*...|..............@....rsrc...............................@..@.rdata..3...........................@..@.idata..h........................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):54784
                                                                          Entropy (8bit):6.505164558362332
                                                                          Encrypted:false
                                                                          SSDEEP:1536:ob9eNDMeUu2rpfT+Rpog93zAecGMWEPwv+iRS6:oENDILpg7nYpiV
                                                                          MD5:F69B0E5F35B5DAE1B11B950CFF157FB3
                                                                          SHA1:F582F77D036C362F1EC5A0AB11707143CB0C9220
                                                                          SHA-256:ED010C50A7CEB43B9666E7FBCA13D8377D30B79203207BAD77004A890ADEEA17
                                                                          SHA-512:F0AC0B51A80D20148D069A231D50A581E6580EA45ADC2D15C15182C9551363E204E119DAAC544C37AC6D9E93B75AB73E90E9947E7BF3CF86707A5C5645E2750C
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZl.....................@.......Win32 Program!..$......!.L.!`...GoLink, GoAsm www.GoDevTool.com.PE..L...t.\I...............&.v...\......0*............@..........................@..............................................0..(.......p............................ ..1............................................0..............................code.....v.......v.................. ..`data.....z.......J...z..............@....rsrc...p...........................@..@.rdata..1.... ......................@..@.idata.......0...................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                          Category:dropped
                                                                          Size (bytes):568320
                                                                          Entropy (8bit):6.362114578604268
                                                                          Encrypted:false
                                                                          SSDEEP:6144:FuyRri/YTtF1LbOtbvMMhLxodmpjSIZ/KfmGE178z0srIW4w23Y8D9xbDUV7R0Kq:FucNtFJCxvBLxodojSIZKmX5sr/h4Ik
                                                                          MD5:0239B5B3A757CE3367335E873B9D9DDA
                                                                          SHA1:11A2EA37F1AAA80C547B07DEE5B7D1B727809376
                                                                          SHA-256:2B04DB2CAA0064A89DCB8137077F12DE5D2B72389CEEED1227CE7C80C5C7023A
                                                                          SHA-512:859013A987E49991E55EE826EF1CE3593163AB37ED19F0DB1587D729CBAD1897EA09401556AE0DF2B840972DC4909BF479047A42B1DB387136CD68659BD515BB
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............le..le..le.....le..>...le..>..le..>...le.....le..ld.%le..>..le..>...le..>...le..>...le.Rich.le.................PE..d......G.........." .....z...R............................................................@..........................................=..X...4(..x.......x.......0-..................................................................................................text....x.......z.................. ..`.rdata...............~..............@..@.data...`\...@...:...,..............@....pdata..0-...........f..............@..@.rsrc...x...........................@..@.reloc..f...........................@..B........................................................................................................................................................................................................................................................
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:MS Windows HtmlHelp Data
                                                                          Category:dropped
                                                                          Size (bytes):20381
                                                                          Entropy (8bit):5.87618803287666
                                                                          Encrypted:false
                                                                          SSDEEP:192:3cVkQ/kDkglpmDHrjhxqIUexuvMc7PwiloGn2NgjaJ+poKuHTrUDuoOHLO5Fpib0:3c6Qc3mDfUDvMcv/nA8akoKukDwZPs
                                                                          MD5:D4FC8C71A167383B2CEA62137B12F63D
                                                                          SHA1:A065B7A9479C0FCE752DFB1120C58310661EB4AB
                                                                          SHA-256:2786F9B9CDF8A73396405CE59CB6D00FAD9D51E5136183999D14A5CB9F5D80FB
                                                                          SHA-512:D60F2841DC6C873D6B26A0A2D019878AFDEBB52426C05F57C40C54181352A98FA4E628202313D718274C96767D5D3095FEFEFBEBD307DE61EE3B7F0A08666989
                                                                          Malicious:false
                                                                          Preview:ITSF....`.......YE.........|.{.......".....|.{......."..`...............x.......T........................O..............ITSP....T...........................................j..].!......."..T...............PMGL-................/..../#IDXHDR......./#ITBITS..../#STRINGS...n.x./#SYSTEM..F.../#TOPICS.....`./#URLSTR...:.4./#URLTBL...r.H./$FIftiMain..../$OBJINST...S.?./$WWAssociativeLinks/..../$WWAssociativeLinks/Property...O../$WWKeywordLinks/..../$WWKeywordLinks/Property...K../ext.html..5..../help.hhc...5.::DataSpace/NameList..<(::DataSpace/Storage/MSCompressed/Content..K..,::DataSpace/Storage/MSCompressed/ControlData.j.)::DataSpace/Storage/MSCompressed/SpanInfo.b./::DataSpace/Storage/MSCompressed/Transform/List.<&_::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/...i::DataSpace/Storage/MSCompressed/Transform/{7FC28940-9D31-11D0-9B27-00A0C91E9C7C}/InstanceData/ResetTable...@.........................................................................
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):6427
                                                                          Entropy (8bit):5.413103855303524
                                                                          Encrypted:false
                                                                          SSDEEP:192:QVvN9zpYcnuWDOCarYMDX3XmAlROa4xjbz:U9zQCKYgX3XMxjbz
                                                                          MD5:2125B2D9BFDA91CECA3ED41F4C861B4C
                                                                          SHA1:B0D6F35D8A60659FF40F1759B6207C81D99AC0F9
                                                                          SHA-256:876D4162596D4EFA962D5E214A3A801EAE4C8BFD36439D20880D5098F602321B
                                                                          SHA-512:2A009AA887643FE268D9130347A5940B7EEF134BF3DE16E2D43337CA41F5B71E5BECAC02BFD96BC0A36AFB202BF51D6CD70477F0CC77E5D6DC8E02A6290BF415
                                                                          Malicious:false
                                                                          Preview:...0 = 32.....1 = 64.....2 = ......................3 = .....................4 = ....5 = .......6 = ....7 = ................................8 = .........9 = .........10 = ............11 = .........12 = Alt..13 = ................14 = AppData..15 = .........16 = .....17 = ...=.....................18 = Bat To Exe Converter......... - .....................19 = .......20 = Captcha..21 = Captcha.........22 = ...........23 = .........................................24 = .............
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5502
                                                                          Entropy (8bit):5.481178089670343
                                                                          Encrypted:false
                                                                          SSDEEP:96:e3g+6RnucNWIoSrE7eC5irlf8d4QscFKY+cdT5sHKoNNYps6O0Xq5Y+LbaE9QfJF:8g+knPw0os0KYtsqoNNU3XqY+3l9mJI8
                                                                          MD5:CFC7FC230EA20DC8E11BB17389FA57B2
                                                                          SHA1:23431C831BCC90F5678C9F9987359C69C57CD269
                                                                          SHA-256:63D5C6772D8998FBD0331092E96151CA31662A6A7AC7B11AF4F5E2FD30ED77F4
                                                                          SHA-512:5A10F9995AD54506E21D8E084B91C95417F9DC1BF55AD00F9B127803385E9A727DEFB38B22A89CF5AFDA9AED6932EC912FC56B82BB884AA318C4C606F627C682
                                                                          Malicious:false
                                                                          Preview:...0 = 32 ....1 = 64 ....2 = ... ... ... .. .........3 = ... ... .... .......4 = ....5 = .. .....6 = ....7 = ..... ... ... ... ... ........8 = ... ....9 = ... ....10 = .. .. ....11 = .. .. ....12 = Alt..13 = .. ..... .........14 = AppData..15 = ......16 = .....17 = ... = ... ... ..... .... .....18 = Bat To Exe Converter . ....... - ... .... .. ......!..19 = ....20 = Captcha..21 = Captcha .. .....22 = .... ....23 = . . .... ... ... . ... ... ... ........24 = . . .... .. .... ... .......25 = .....26 = ....27 = .. ....28 = CMD ... ....29 = ...
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):4512
                                                                          Entropy (8bit):5.888205681855047
                                                                          Encrypted:false
                                                                          SSDEEP:96:4bkF2b86BVTbzxtcM/jFnGHAhf7Y/H1paCNexJs375lyEc8EV1Zw6:CkF2b86Bh1TCA9Y/VrNck/yEEVzw6
                                                                          MD5:8AB06A4B804350D0A232E65B82E992E1
                                                                          SHA1:B1C11CF302C18A2334EAA09DDA4C0EBAA54C2D77
                                                                          SHA-256:5A5FBE8998D1AA2C6CB7E16FA50861910C806AC3DF99E2026E8B577175B36133
                                                                          SHA-512:4B9F8324F5DA953AE18B8BB073CC8414BCBB9584E1AA5B6D80214EB00AC8BB8AA8B86EA94F901098AB03A924B0EEB49A3451D09408B563E2259892478468BB06
                                                                          Malicious:false
                                                                          Preview:...0 = 32 ...1 = 64 ...2 = ................3 = ............4 = ....5 = .. .....6 = ....7 = ........................8 = ......9 = ......10 = ........11 = .........12 = Alt..13 = .................14 = AppData..15 = ....16 = ....17 = .. = ..............18 = Bat To Exe Converter ..... . .........19 = ....20 = .....21 = ........22 = ......23 = ........................24 = ..............25 = ....26 = ....27 = ......28 = CMD-....29 = ....30 = ....31 = ....32 = .........33 = ....34 = ....35 = ....36 = ......37 = ........38 = ......39 = ........40 = .....
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):4515
                                                                          Entropy (8bit):5.895445604698382
                                                                          Encrypted:false
                                                                          SSDEEP:96:aK7D0+JkfAcpBka45aGJz1XLLXQOYR1h7mKSFOZVfAfNX8EiVCc6:aK7D0+ydV34LXQOYPWOjfAVMEnc6
                                                                          MD5:4CCFE9DC8CDFE91117D59B8599419D26
                                                                          SHA1:AED9EFB0FE4715F3E0D7C72B996A1D148FA8D447
                                                                          SHA-256:B59693AB5279FEB735B9A10943BDBAE71C9CB363B1AA83E40F422142B39FF360
                                                                          SHA-512:E62FE04027297C3DD99F854211E2966D2E206B39CC9F37AB221F1C13591343795D73AA4883EA9F42F542878DACDB965815B92ED234D20E126FC323C411EEA6FE
                                                                          Malicious:false
                                                                          Preview:...0 = 32 ...1 = 64 ...2 = ................3 = ............4 = ....5 = .. .....6 = ....7 = ........................8 = ......9 = ......10 = ........11 = .........12 = Alt..13 = .................14 = AppData..15 = ....16 = ....17 = .. = ..............18 = Bat To Exe Converter ..... . .........19 = ....20 = .....21 = ........22 = ......23 = ........................24 = ..............25 = ....26 = ....27 = ......28 = CMD-....29 = ....30 = ....31 = ....32 = .........33 = ....34 = ....35 = ....36 = ......37 = ........38 = ......39 = ........40 = .....
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):6387
                                                                          Entropy (8bit):4.150753889633663
                                                                          Encrypted:false
                                                                          SSDEEP:192:X0w8lfNd5Zm/PzBNOTS4/J2gK/kycQfhuc:x8l1x+z2TS4/Jy/kgEc
                                                                          MD5:ACEF3CF2CD28076E5313A02F6984F754
                                                                          SHA1:E24231ADA7DD357F7C1CA78A7A88700782B50E37
                                                                          SHA-256:4564DAC8FD1DE4C66D9506C516198A079CF6C98B9EC4F8A7527C27F44800CC22
                                                                          SHA-512:901CE97986BC2476433D8F6CABCE99ABCBA16CBA41F68F5CC1645133D43E6AB67D20E3F1C7DB08BDC18EC1A957CA371AAACB5468970C7A34574444D61E6F04EA
                                                                          Malicious:false
                                                                          Preview:...0 = .... 32 ........1 = .... 64 ........2 = .... ..... .. ... ......3 = .... .... ..... ........4 = .......5 = ..........6 = ......7 = .... ..... ....... ..... ..... ..... ...... ... ......8 = ..... .......9 = ..... ........10 = ..... .... ......11 = .... .... ... ......12 = Alt..13 = .... .. ..... ... ... ......14 = ..... AppData..15 = ............16 = ...........17 = ......... - .. ..... .. ........ ....... .........18 = ..... ... ..... ..... . .... ... ...... ...... .. ........19 = .......20 = ... .......21 = ... ..... ......22 = .... .........23 = ..... .".." .... .. ...... ........ ...... ..... ........24 =
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):6966
                                                                          Entropy (8bit):4.4351898698934304
                                                                          Encrypted:false
                                                                          SSDEEP:96:IEWliR8xl/tuuAvoyUNH0q+tzXiLFSzfwqiowiXUbVlNH7ZUEY4Uf2hqoC5SFbyo:PWU4cuAINH0tSLgHiIUH9ZUJ/f2M2bF
                                                                          MD5:101A8B4AE341C9D9ACD37626BA3909F5
                                                                          SHA1:8716D647EA6AA120E6B00975DDBDF076570264AD
                                                                          SHA-256:F12BF0E1FF2327107B92DE4D69234D0364B530B34761E01CCB021805C3ABE562
                                                                          SHA-512:CF10C1956FBA214F85EA621EBCC3C334A90AB93D38F4641DB7B1735687CD70A57DD406F81B2B36E6461E62A06A2A490F5AE5C6418140010CEBE78AD9413A8F5A
                                                                          Malicious:false
                                                                          Preview:...0 = 32 Bit..1 = 64 Bit..2 = ... .... ..... ..... ........3 = ..... ..... .... .........4 = .....5 = ........6 = .......7 = ..... ....... ......... .... .... ....... .. ..... ...... ....... .....8 = ..... ........9 = ..... .........10 = ..... ....... .........11 = ...... ..... ..... .....12 = Alt..13 = ... ....... ... ....... ........14 = AppData..15 = ........16 = ... ........17 = ... ...... = .. ..... ... ... ..... ....... .........18 = !...... .... ..........19 = .......20 = ........21 = ... ...... ... ......22 = ...... .. .... .........23 = ..... ...... ... ... ... ....... ......... ......... ... ...... ...
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):8389
                                                                          Entropy (8bit):4.556656309616615
                                                                          Encrypted:false
                                                                          SSDEEP:192:5INqmux7tQeD1XDot3rbFCKnBifxAltB3AESl:4qnZ0t75LBKW7vSl
                                                                          MD5:E85F3E236272739458070F2AD0FD8AEA
                                                                          SHA1:45C44551DA97FCCB2DA948DF4BE51EF4DE472348
                                                                          SHA-256:EFA8B1029530AA46FF21F704F6EFE59A69FE59D6B96E2370EDC32FAB62A2FD29
                                                                          SHA-512:FCE0B86A5EB75C8286A755A928ED6529934438BD0BB53EC3BED2173CFB5F0BD263FEC649BA93C687C68017063ED207B0AA0530421183F7AD5C29F115E38E5BD6
                                                                          Malicious:false
                                                                          Preview:.0 = 32 ......1 = 64 ......2 = .... . ... .. ...... ... .........3 = ..... ...... ........ ... .............4 = . ...........5 = . .....6 = ..........7 = ........ ..... . ....., ....... .. ...... ........ . .... ........... .... ........8 = ........ ........9 = ........ .........10 = .......... .......... . ........11 = ......... ...... .... ......... ............12 = Alt..13 = ......... ..... .......... ... .........14 = AppData..15 = .............16 = ............17 = .......... = .. ....., .... ..... ....... ............ ...........18 = Bat To Exe Converter - .......... .. - ..........., ..... .......
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):9499
                                                                          Entropy (8bit):4.5624224565941
                                                                          Encrypted:false
                                                                          SSDEEP:192:PGGg/NtyFIKAwDKQCHFoVuYMaqz5Gy70sdLHG18REYcYnyVm2PQJv3XhnTe2Xmpb:eV//E9DVCHFokYMaq8y708HG189Oozzm
                                                                          MD5:CE7919F5607F6852962AFEE414CF143C
                                                                          SHA1:1CD289D7C4FA9E8951F48F4338546067E7652B95
                                                                          SHA-256:CDA6F61CB33194B48B9764BC9E1D704197454DA7967BB7B6F0F87122D033E767
                                                                          SHA-512:1255BB23A24E77D9F66FD7B2BBDDA0ADA8FD8825F16ECC128174E89C671180B87E497583137CB59CD7D6D7981A9A982D8D584A67E4B72E532BF4E4033FBCFAF9
                                                                          Malicious:false
                                                                          Preview:...0 = 32 Bit..1 = 64 Bit..2 = ... ...... .. .. .... ..... ..... ... ..........3 = ... ... ...... ..... ......... ... .......4 = ......5 = .........6 = ..........7 = ......... ... .. ...... ... .... ........ ... ...... .. ............. ... .......... ...... ......8 = ........ ............9 = ........ .......10 = ........ ........... .........11 = .. ........... .... ... ..........12 = Alt..13 = ... ........ ..... ... ......... .......... .....14 = AppData..15 = ...............16 = ...........17 = .........: ..... ....... ..... .. .......... ... ........... ... ............18 = .. Bat To Exe Converter .....
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5389
                                                                          Entropy (8bit):5.3452303894979805
                                                                          Encrypted:false
                                                                          SSDEEP:96:IE8xfLofbXyG/soMrKcpfsbziUR9G7hPGeHHlgKh5YkTNzLnBBNp:P8uNsacpfsizh7HlgaYONz7BBT
                                                                          MD5:126DC042974C8979DB72CCC7F253E6AA
                                                                          SHA1:B78663D76A0E26919249C502ED10D5E66C90B81B
                                                                          SHA-256:515607FF950FCB9729E2DEBB947F6C869BBB58189BB73CC7EFCCB9308D6936ED
                                                                          SHA-512:80F49EAC959F36066BAC27B24A2DA706F79CE6D311E1365E30EB7B3D58D8DB249C83F3C8A82A094F327C6329D281410454DD60CB0DAF6A4F0239FE8B4D82A1DF
                                                                          Malicious:false
                                                                          Preview:...0 = 32 Bit..1 = 64 Bit..2 = Soubor se stejn.m n.zvem je ji. otev.en...3 = Nov.j.. verze je k dispozici ke sta.en...4 = O..5 = O .....6 = P.idat..7 = Sem p.idejte soubory a slo.ky kter. chcete zahrnout do va.eho exe souboru...8 = P.idat ikonu..9 = P.idat zdroje..10 = P.idat informace o verzi..11 = Povolit pouze jednu instanci..12 = Alt..13 = Jenda instance aplikace ji. b.....14 = AppData..15 = Architektura..16 = Asynchronn...17 = Asynchron. = Ne.ekat dokud nejsou vytvo.eny vlo.en. elementy...18 = Bat To Exe Converter je freeware - P.isp.jte na podporu v.voje!..19 = Zru.it..20 = Captcha..21 = K.d captche je .patn...22 = Zkontrolovat aktualizace..23 = Vybr.n.m ANO budou po ukon.en. programu smaz.ny extrahovan. soubory a slo.ky..24 = Vybr.n.m ANO p.ep..e existuj.c. soubory..25 = Vy.istit..26 = Zav..t..27 = Zav..t v.e..28 = CMD-prost.ed...29 = Koment..e..30 = Spole.nost..31 = Komprimuji..32 = Konzole (Viditeln.)..33 = Zkonvert
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5571
                                                                          Entropy (8bit):4.915928421056274
                                                                          Encrypted:false
                                                                          SSDEEP:96:IE0Yraa656WKAeNoIdgNhQA+BgTdA4UK+/14/BDFiLJSjLxGFvU0XJ4M:P0aaRkWOrgPH+qdAd2/aJwdGiqJ4M
                                                                          MD5:0B1FBD5CE0A704C773B535E9F7F954F6
                                                                          SHA1:309EB1BD7EF5CB72439CBE4D10E387F86C4017BF
                                                                          SHA-256:AE6EDA1EFC2F611498B9B94FD297FAE3CD46E85D38891D598A78E7D844DBFF6A
                                                                          SHA-512:BD383E6201241C5AFEE8FABF1DE60D2617F0288CFE79CB871BB49F691CD9935571D183E3D95286F034FD9D5D5F7F352E0D7B93DF87B3293E2A06B82EF95B5B06
                                                                          Malicious:false
                                                                          Preview:...0 = 32 Bit..1 = 64 Bit..2 = Un archivo con el mismo nombre ya se abre...3 = Una nueva versi.n esta disponible para descargar...4 = Acerca..5 = Acerca.....6 = A.adir..7 = A.adir archivos y carpetas que usted desee incluir en su ejecutable...8 = A.adir icono..9 = Agregar recursos..10 = A.adir informaci.n de la versi.n..11 = Permitir solo una instancia..12 = Alt..13 = Una instancia de esta aplicaci.n ya se ejecuta..14 = AppData..15 = Arquitectura..16 = Asincronismo..17 = Asincronismo=No espera hasta que se creen los elementos incluidos...18 = Bat To Exe Converter is freeware . Donar para cotinuar su desarrollo...19 = Cancelar..20 = Captcha..21 = C.digo captcha incorrecto..22 = Revisar si hay actualizaciones..23 = Escogiendo S. borrar. los archivos extra.dos y carpetas cuando los acababe la ejecuci.n..24 = Escogiendo S. borrar. los archivos existentes...25 = Limpiar..26 = Cerrar..27 = Cerrar todo..28 = Interface CMD..29 = Comentarios..30 = Compa.ia..31 = Comprimiendo
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5771
                                                                          Entropy (8bit):5.013595303578687
                                                                          Encrypted:false
                                                                          SSDEEP:96:oE9xcPtw2yK82RyFKDXWie0S4CvUqXFM+KChY+Xu0uNlboguRLAu0AcHClE7RJn5:oE9xItw2v82RCKDr5NCZFM+9hY+Xu0kt
                                                                          MD5:BEF8EC23F8162F30BCDB19B9E63BEF90
                                                                          SHA1:10D47362FD769EC15B783735CA1BCA4BC93E668A
                                                                          SHA-256:85407106B34A3C4451CEA55786DF36D2408BC579A4211C02D12AB3650C96A86E
                                                                          SHA-512:07F76EA30827CCEEE2C5E75483E00194C1C1F9EE968CE2D709D8AC32B4C9750164951C77342B517C6367965F21380DFB9760A8842BBA64064CD5E2D04D798A8E
                                                                          Malicious:false
                                                                          Preview:...0 = 32 bit..1 = 64 bit..2 = Fichier du m.me nom est d.j. ouvert...3 = Version plus r.cente disponible en t.l.chargement...4 = A propos de..5 = A propos de .....6 = Ajouter..7 = Ajouter des fichiers et dossiers que vous souhaitez inclure dans votre ex.cutable ici...8 = Ajouter une ic.ne..9 = Ajouter des ressources..10 = Ajout d'informations sur la version..11 = Autoriser une seule instance..12 = Alt..13 = Une instance de l'application est d.j. en cours d'ex.cution..14 = AppData..15 = Architecture..16 = Asynchrone..17 = Asynchrone = N'attendez pas que les .l.ments incorpor.s soient cr..s...18 = Bat To Exe Converter est un logiciel gratuit - Faire un don pour soutenir le d.veloppement!..19 = Annuler..20 = Captcha..21 = Code Captcha incorrect..22 = V.rifier les mises . jour..23 = Choisir OUI supprimera les fichiers et dossiers extraits lorsque l'ex.cution sera termin.e...24 = Choisir OUI .crasera les fichiers existants...25 = Effacer..26 = Fermer..27 = Fermer Tou
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5446
                                                                          Entropy (8bit):4.848999465904957
                                                                          Encrypted:false
                                                                          SSDEEP:96:oEQRR1C6cEuOOr5rTSrkMmvBYuZE+4NbZlqQm0jefR7Sb3tlZ+Llch5yy//P:oEqR1C6TudnSbsBYuZItlqQDPDYLlchH
                                                                          MD5:6B078E7A6849C8954A5001A044BC90FD
                                                                          SHA1:57C318CFB473A8E3A4675CAC70732A2FE6AB7B76
                                                                          SHA-256:9F93BE553F9256EC0D71BD44CAA1990B82D7EEFEB6AC5075A96E8C4BC9D41C06
                                                                          SHA-512:A07A8E705AE8A43D1756F39839CC22C5A481A0871388277B73A72EC914CFAD6638B88F02492459F7DC9FB8BB8CCF62A8D4184D6482894DFA400AB0F259E998E4
                                                                          Malicious:false
                                                                          Preview:...0 = 32 bit..1 = 64 bit..2 = Un file con lo stesso nome . gi. aperto...3 = Una versione pi. recente . disponibile per il download...4 = Info..5 = Info.....6 = Inserisci..7 = Aggiungi qui file e cartelle che vuoi includere nel tuo eseguibile...8 = Aggiunta di icone..9 = Aggiungere risorse..10 = Aggiunta di informazioni sulla versione..11 = Consenti solo un'istanza..12 = Alt..13 = Un'istanza di questa applicazione . gi. in esecuzione..14 = AppData..15 = Architettura..16 = Asincrono..17 = Asincrono = Non aspettare che vengano creati elementi incorporati...18 = Bat To Exe Converter . freeware - Dona per supportare lo sviluppo!..19 = Annulla..20 = Captcha..21 = Codice captcha errato..22 = Controlla gli aggiornamenti..23 = Scegliendo SI eliminerai i file e le cartelle estratti al termine dell'esecuzione...24 = Scegliendo SI si sovrascriveranno i file esistenti...25 = Pulisci..26 = Chiudi..27 = Chiudi tutto..28 = Interfaccia CMD..29 = Commenti..30 = Azienda..31 = Compressione..32 =
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5731
                                                                          Entropy (8bit):5.235127210855445
                                                                          Encrypted:false
                                                                          SSDEEP:96:ybIE7gYC2n60xiJaJJzVaAbPtqUpjujJEPLnie7eFUFhxjflsZJL8ueSuJvc3VIZ:ybrPHoJaJp82wUpj2weFSGZJwRSuJvce
                                                                          MD5:0427E675DAE96193FBBD2575B25E4ADD
                                                                          SHA1:7FC54DD5AEC429F431CAA39A8A7132AA7B2ADEA3
                                                                          SHA-256:A9EC95138C89144FAD7304CCDFA22E30F4552F42EC5F87EFBEC17E6B45227886
                                                                          SHA-512:82AA697BE9D38BC64F43A872238D738D7559891D42EE548053FF20FF456F72F1F6A2DCCEC85423CA527E98801E35F3ABC358F3F80A19BB03A091B2F2147A5E2D
                                                                          Malicious:false
                                                                          Preview:...0 = 32-bit..1 = 64-bit..2 = Egy azonos n.vvel rendelkez. f.jl m.r meg lett nyitva...3 = Egy .jabb verzi. .rhet. el let.lt.sre...4 = N.vjegy..5 = N.vjegy .....6 = Hozz.ad.s..7 = Adjon hozz. f.jlokat .s mapp.kat, amelyeket el szeretne helyezni a futtathat. f.jlban...8 = Ikon hozz.ad.sa..9 = Forr.sok hozz.ad.sa..10 = Verzi.inform.ci.k hozz.ad.sa..11 = Csak egy p.ld.ny enged.lyez.se..12 = Alt..13 = Az alkalmaz.s egy p.ld.nya m.r fut..14 = AppData..15 = Architekt.ra..16 = Aszinkron..17 = Aszinkron = Ne v.rja meg a be.gyazott elemek l.trehoz.s.t...18 = A Bat To Exe Converter ingyenes . Adom.nyozzon a fejleszt.s t.mogat.s.hoz!..19 = M.gse..20 = K.pk.d..21 = A k.pk.d .rv.nytelen..22 = Friss.t.sek ellen.rz.se..23 = Az IGEN kiv.laszt.s.val t.rli a kibontott f.jlokat .s mapp.kat a v.grehajt.s befejez.sekor...24 = Az IGEN kiv.laszt.sa fel.l.rja a megl.v. f.jlokat...25 = .r.t.s..26 = Bez.r.s..27 = .sszes bez.
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5136
                                                                          Entropy (8bit):4.907104375023733
                                                                          Encrypted:false
                                                                          SSDEEP:96:IERQmH0jdNW2QzGyub7sNCC1xvtOCxk5ul9bKEHimSpyusIvLwAp+eGHXdl:PRQmUBNW1Gb77C1bOCxk5y9bK2i0u7U/
                                                                          MD5:30E8FFB0E32E27F754610A3CB6B2E932
                                                                          SHA1:189656584C97E3149D7BA2EB1B86D774BFC682A2
                                                                          SHA-256:3C0405BD3D1AF87EF1675E067020C07A754C2C62662D8F32009A6265C3F48D55
                                                                          SHA-512:4C859CB74CDF473946B4436DBB93972FDBE1E764947F5BA09893D013DA1253E36D5FD27E50B81ACB13B849525F84FE21B7BF5BCF53195BB3FEFB315D53903B70
                                                                          Malicious:false
                                                                          Preview:...0 = 32 Bit..1 = 64 Bit..2 = Een bestand met dezelfde naam is al geopend...3 = Een nieuwere versie kan gedownload worden...4 = Over..5 = Over.....6 = Toevoegen..7 = Voeg bestanden en mappen toe die u in uw exe-bestand wil insluiten...8 = Icon toevoegen..9 = Bronnen toevoegen..10 = Versie informatie toevoegen..11 = Slechts ..n uitvoering toestaan..12 = Alt..13 = Deze toepassing is reeds actief..14 = AppData..15 = Architectuur..16 = Asynchroon..17 = Asynchroon = Wacht niet tot ingesloten elementen gemaakt zijn...18 = Bat To Exe Converter is freeware - Doe een gift om de ontwikkeling te steunen...19 = Annuleren..20 = Captcha..21 = Captcha code onjuist..22 = Controleer voor updates..23 = JA wist de bestanden en mappen...24 = JA overschrijft de bestanden...25 = Leegmaken..26 = Sluiten..27 = Alles sluiten..28 = CMD-interface..29 = Commentaren..30 = Firma..31 = Aan het comprimeren..32 = Console (Zichtbaar)..33 = Converteer..34 = Converteerder..35 = Kopieer..36 = Kopieer log..37 = Kopiee
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5639
                                                                          Entropy (8bit):5.014841388257068
                                                                          Encrypted:false
                                                                          SSDEEP:96:o/7/tlDAyNWMiJolH81z04S+yomJnt/tfLFriPfqw7wI0ABtD6UwNl:oj/7DAyNXiqlCz0hzPJNyPlMIZD6/Nl
                                                                          MD5:71F0183E192E34D375F0735210E97C4A
                                                                          SHA1:B60E72378FEF5227D9B3EA8F30DD29D4C9BE097B
                                                                          SHA-256:130764E3A2E43B78EE632C0372BC5630BD62ABF74AA825865FE5B4C14F4D7A27
                                                                          SHA-512:19914BFEA9F4EE3ECD46835F0C276A477A6F1B440FB9F33F9B8DF0E063B1CF0703495C27336FED1F101315690C43110B9E47DAC0F688D41EEA59F3415468D756
                                                                          Malicious:false
                                                                          Preview:...0 = 32 bits..1 = 64 Bits..2 = Um arquivo com o mesmo nome j. est. aberto..3 = Uma nova vers.o est. dispon.vel para download..4 = Sobre..5 = Sobre .....6 = Adicionar..7 = Adicione arquivos e pastas que voc. deseja incluir no seu execut.vel aqui...8 = Adicionando .cone..9 = Adicionando recursos..10 = Adicionando informa..es de vers.o..11 = Permitir apenas uma inst.ncia..12 = Alt..13 = Uma inst.ncia desse aplicativo j. est. sendo executada..14 = AppData..15 = Arquitetura..16 = Ass.ncrono..17 = N.o espera at. que os elementos incorporados sejam criados...18 = Bat To Exe Converter . gratuito - Fa.a uma doa..o para apoiar o desenvolvimento!..19 = Cancelar..20 = Captcha..21 = C.digo captcha est. incorreto..22 = Buscar por atualiza..es..23 = Escolher SIM apagar. os arquivos e pastas extra.dos quando a execu..o terminar...24 = Escolhendo SIM substituir. os arquivos existentes...25 = Limpar..26 = Fechar..27 = Fechar todos..28 = Interface-CMD..29 = Coment.rios
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5431
                                                                          Entropy (8bit):5.3468775375546045
                                                                          Encrypted:false
                                                                          SSDEEP:96:IEL64APn65uLf7qs40IJS9n9utccdB/OOhfJnvLdB08GhiAD3mPtj+hNC1hbq364:PL6R65yfer1S99utccdB2OhfJnvLP0xJ
                                                                          MD5:F19CD4F6CCE52F99B6C62802E0D690C4
                                                                          SHA1:6D719B72AC137021B9F8809575161B878BC6359A
                                                                          SHA-256:9442A4ED768B0F65D4A8DD5C1E91C9E7EDBEA4235C8C8E5C6AB44A54F93297A1
                                                                          SHA-512:50A95D4017737A9DA59414048308D10BBD892789DCAB7D56C75547E216A730847337B476F1B01DECEA1BE64E90C82343C2FA82BD653C73BAD9BAE645D826E802
                                                                          Malicious:false
                                                                          Preview:...0 = 32 Bit..1 = 64 Bit..2 = S.bor s rovnak.m n.zvom je u. otvoren....3 = Je dostupn. nov. verzia programu...4 = O aplik.cii..5 = O aplik.cii.....6 = Prida...7 = Pridajte s.bory a zlo.ky ktor. chcete zahrn.. do v..ho spustite.n.ho s.boru...8 = Prid.vanie ikony.....9 = Prid.vanie zdrojov.....10 = Prid.vanie inform.cii o verzii.....11 = Povoli. naraz iba jednu spusten. in.tanciu..12 = Alt..13 = Jedna in.tancia tejto aplik.cie u. be....14 = AppData..15 = Architekt.ra..16 = Asynchr.nny..17 = Asynchr.nny = Ne.aka. k.m sa vytvoria embeddovan. elementy...18 = Bat To Exe Converter je freeware - Podporte developera finan.n.m pr.spevkom!..19 = Zru.i...20 = Captcha..21 = Zle op.san. Captcha..22 = Kontrolova. aktualiz.cie..23 = V.berom .NO sa po ukon.en. programu vyma.. extrahovan. s.bory...24 = V.berom .NO prep..ete existuj.ce nastavenia...25 = Zmazat..26 = Zavrie...27 = Zavrie. v.etko..28 = CMD-Rozhranie..29 = Koment.re..30 = S
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):5270
                                                                          Entropy (8bit):5.202682622645692
                                                                          Encrypted:false
                                                                          SSDEEP:96:oEy4jacW4p0ots/3xQf9PdwSzP9b1SwLAp6hmKe/MLP9boFKOgxAVEGoA:oEy4Rpvsx49Pdxf0p9K8GPVigxx9A
                                                                          MD5:6D8188689F086C305793941E56B51EF9
                                                                          SHA1:2E4A5E74B0B9D61C4FF6E25B21A659BE1CADD9F3
                                                                          SHA-256:51F36AA59CBE22FD5A470D75DC77B1831D88643F3687A7C8717C46A105567354
                                                                          SHA-512:BCAC0CE5722972AAFB7323017196770995AF0FE623BB6CD4D78122046310648E0D65D45B3E6411504621BD140EBE368086A0A246EF19433B1DEC6C239D4474E9
                                                                          Malicious:false
                                                                          Preview:...0 = 32 bit..1 = 64 bit..2 = Ayn. ada sahip bir dosya zaten a..ld....3 = Daha yeni bir s.r.m. indirmek i.in kullan.labilir...4 = Hakk.nda..5 = Hakk.nda .....6 = Ekle..7 = Uygulaman.za dahil etmek istedi.iniz dosya ve klas.rleri buraya ekleyin...8 = Simge ekleniyor..9 = Kaynak ekleme..10 = S.r.m bilgisi ekleme..11 = Sadece bir .rne.e izin ver..12 = Alt..13 = Bu uygulaman.n bir .rne.i zaten .al...yor..14 = Uygulama verisi..15 = Mimari..16 = E.zamanl. olmayan..17 = E.zamans.z = G.m.l. elemanlar olu.turuluncaya kadar beklemeyin...18 = Bat To Exe Converter .cretsizdir - Geli.imini desteklemek i.in sizde ba... yap.n!..19 = .ptal..20 = Do.rulama kodu..21 = Do.rulama kodu yanl....22 = G.ncellemeleri kontrol et..23 = Y.r.tme bitti.inde, YES se.imi ..kart.lan dosyalar. ve klas.rleri siler...24 = EVET se.imi mevcut dosyalar.n .zerine yazacakt.r...25 = A...26 = Kapat..27 = Hepsini kapat..28 = CMD-Aray.z...29 = Yorum..30 = .irket..3
                                                                          Process:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                                                                          Category:dropped
                                                                          Size (bytes):364544
                                                                          Entropy (8bit):7.995709475150595
                                                                          Encrypted:true
                                                                          SSDEEP:6144:PhoGv9lnheLRaK5KOdHW/Znp2BPCx/5yR9fXG785NrtjKWvn0MGHJKZkHDoS:Jr9lnheLtk6Hy1gPCpi9fWOhKqJoJKZu
                                                                          MD5:0A493C3B30C4F095B68171621CA94FDE
                                                                          SHA1:747159A347C12D394E9576167C234D7DB3D9AB0A
                                                                          SHA-256:CE0CDAA2E2D12763C7C7B0DECC483020786EB28F25904ED63C06512A83938B69
                                                                          SHA-512:9C67511BDE3EEDFA0482BF28CDD5564E12CB3C770982AD26EAAA39F2C1F07E90D0F017C7155881F6AF9394C75B3C8A9B9D625124CEAA64EDC52F44A1A1955BFD
                                                                          Malicious:false
                                                                          Antivirus:
                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......................8.....................0....@..........................@................ ..............................5.......0..............................................................................................................UPX0....................................UPX1................................@....rsrc........0......................@...3.94.UPX!.....g.Q.#C......y...^..F......*.X.b...x{...S..H.....b..>....:cJ....Vf.u.k...C..........R...by..~*..;8../..........Z...v..X.LP4.Y......f...D.WU..h..5.3......._......H..b. ..NP.......f.-../%.a.fZ.[....J.V.....'p....Cw.C..*.$y......A...".s....S......u^.:./_gnmP|...0f...1.....W.!.*".w#.......3.....3.N..{'P....T\.r._.z..^.B....q..y..8*d\..52.....^.2.._.[..-[...iN..S.kVF(.D..f.3<..M-.....P.1...$5.....rH.Jr...%z.RX.5.f..;..%....G.,...}.X..,$.P..\&.B.MK..J....^$q.....py...
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                          Entropy (8bit):7.991378162587342
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.94%
                                                                          • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
                                                                          File size:4'482'593 bytes
                                                                          MD5:0d8bedda7d9b963de975685cf2b2a5eb
                                                                          SHA1:cbbffe900a09e8a3bbb1a1bf16e7aeb8ebde72a1
                                                                          SHA256:519f0b16537fa4a2bc228cdfce2b85c12225e2071d7789c8cc9bb8f7b85796ca
                                                                          SHA512:9d8eb3433e88fb47b15d624b493af69a9697eeeee7ccfef71daf04181bcc5ba45b2f9cc801679c0234399fdf80f4a85f20858038c41c11132b515fb76cf22612
                                                                          SSDEEP:98304:/xQvu6zDf/mV8jYMG2eHlLrTvIpfCnIpMpCEORglqLxjX:/Gv9AMGnHlLrTvIquMiWqLxj
                                                                          TLSH:0A263303B3CB0836F036BE35CDA949646DA3356815F5B06E4EB3DA4F4A3D6C49877292
                                                                          File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                          Icon Hash:2d2e3797b32b2b99
                                                                          Entrypoint:0x4117dc
                                                                          Entrypoint Section:.itext
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x57051F88 [Wed Apr 6 14:39:04 2016 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:5
                                                                          OS Version Minor:0
                                                                          File Version Major:5
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:5
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:20dd26497880c05caed9305b3c8b9109
                                                                          Instruction
                                                                          push ebp
                                                                          mov ebp, esp
                                                                          add esp, FFFFFFA4h
                                                                          push ebx
                                                                          push esi
                                                                          push edi
                                                                          xor eax, eax
                                                                          mov dword ptr [ebp-3Ch], eax
                                                                          mov dword ptr [ebp-40h], eax
                                                                          mov dword ptr [ebp-5Ch], eax
                                                                          mov dword ptr [ebp-30h], eax
                                                                          mov dword ptr [ebp-38h], eax
                                                                          mov dword ptr [ebp-34h], eax
                                                                          mov dword ptr [ebp-2Ch], eax
                                                                          mov dword ptr [ebp-28h], eax
                                                                          mov dword ptr [ebp-14h], eax
                                                                          mov eax, 00410144h
                                                                          call 00007F7B9924EBBDh
                                                                          xor eax, eax
                                                                          push ebp
                                                                          push 00411EBEh
                                                                          push dword ptr fs:[eax]
                                                                          mov dword ptr fs:[eax], esp
                                                                          xor edx, edx
                                                                          push ebp
                                                                          push 00411E7Ah
                                                                          push dword ptr fs:[edx]
                                                                          mov dword ptr fs:[edx], esp
                                                                          mov eax, dword ptr [00415B48h]
                                                                          call 00007F7B99257303h
                                                                          call 00007F7B99256E52h
                                                                          cmp byte ptr [00412ADCh], 00000000h
                                                                          je 00007F7B99259DFEh
                                                                          call 00007F7B99257418h
                                                                          xor eax, eax
                                                                          call 00007F7B9924CC55h
                                                                          lea edx, dword ptr [ebp-14h]
                                                                          xor eax, eax
                                                                          call 00007F7B99253E9Bh
                                                                          mov edx, dword ptr [ebp-14h]
                                                                          mov eax, 00418658h
                                                                          call 00007F7B9924D22Ah
                                                                          push 00000002h
                                                                          push 00000000h
                                                                          push 00000001h
                                                                          mov ecx, dword ptr [00418658h]
                                                                          mov dl, 01h
                                                                          mov eax, dword ptr [0040C04Ch]
                                                                          call 00007F7B992547B2h
                                                                          mov dword ptr [0041865Ch], eax
                                                                          xor edx, edx
                                                                          push ebp
                                                                          push 00411E26h
                                                                          push dword ptr fs:[edx]
                                                                          mov dword ptr fs:[edx], esp
                                                                          call 00007F7B99257376h
                                                                          mov dword ptr [00418664h], eax
                                                                          mov eax, dword ptr [00418664h]
                                                                          cmp dword ptr [eax+0Ch], 01h
                                                                          jne 00007F7B99259E3Ah
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x190000xe04.idata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000xb200.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x1b0000x18.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x193040x214.idata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000xf2440xf400a33e9ff7181115027d121cd377c28c8fFalse0.5481717469262295data6.3752135040515485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .itext0x110000xf640x1000caec456c18277b579a94c9508daf36ecFalse0.55859375data5.732200666157372IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .data0x120000xc880xe00746954890499546d73dce0e994642192False0.2533482142857143data2.2967209087898324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .bss0x130000x56bc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .idata0x190000xe040x1000e9b9c0328fd9628ad4d6ab8283dcb20eFalse0.321533203125data4.597812557707959IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .tls0x1a0000x80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rdata0x1b0000x180x2003dffc444ccc131c9dcee18db49ee6403False0.05078125data0.2044881574398449IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x1c0000xb2000xb20077556010789c981e280edab6f31467efFalse0.17841467696629212data4.142803017471795IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x1c41c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchNetherlands0.5675675675675675
                                                                          RT_ICON0x1c5440x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchNetherlands0.4486994219653179
                                                                          RT_ICON0x1caac0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchNetherlands0.4637096774193548
                                                                          RT_ICON0x1cd940x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchNetherlands0.3935018050541516
                                                                          RT_STRING0x1d63c0x68data0.6538461538461539
                                                                          RT_STRING0x1d6a40xd4data0.5283018867924528
                                                                          RT_STRING0x1d7780xa4data0.6524390243902439
                                                                          RT_STRING0x1d81c0x2acdata0.45614035087719296
                                                                          RT_STRING0x1dac80x34cdata0.4218009478672986
                                                                          RT_STRING0x1de140x294data0.4106060606060606
                                                                          RT_RCDATA0x1e0a80x82e8dataEnglishUnited States0.11261637622344235
                                                                          RT_RCDATA0x263900x10data1.5
                                                                          RT_RCDATA0x263a00x150data0.8392857142857143
                                                                          RT_RCDATA0x264f00x2cdata1.1590909090909092
                                                                          RT_GROUP_ICON0x2651c0x3edataEnglishUnited States0.8387096774193549
                                                                          RT_VERSION0x2655c0x4f4dataEnglishUnited States0.2823343848580442
                                                                          RT_MANIFEST0x26a500x62cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4240506329113924
                                                                          DLLImport
                                                                          oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                          advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
                                                                          user32.dllGetKeyboardType, LoadStringW, MessageBoxA, CharNextW
                                                                          kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetSystemInfo, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenW, lstrcpynW, LoadLibraryExW, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetCommandLineW, FreeLibrary, FindFirstFileW, FindClose, ExitProcess, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle, CloseHandle
                                                                          kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleW
                                                                          user32.dllCreateWindowExW, TranslateMessage, SetWindowLongW, PeekMessageW, MsgWaitForMultipleObjects, MessageBoxW, LoadStringW, GetSystemMetrics, ExitWindowsEx, DispatchMessageW, DestroyWindow, CharUpperBuffW, CallWindowProcW
                                                                          kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, SizeofResource, SignalObjectAndWait, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, RemoveDirectoryW, ReadFile, MultiByteToWideChar, LockResource, LoadResource, LoadLibraryW, GetWindowsDirectoryW, GetVersionExW, GetVersion, GetUserDefaultLangID, GetThreadLocale, GetSystemInfo, GetSystemDirectoryW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeProcess, GetEnvironmentVariableW, GetDiskFreeSpaceW, GetCurrentProcess, GetCommandLineW, GetCPInfo, InterlockedExchange, InterlockedCompareExchange, FreeLibrary, FormatMessageW, FindResourceW, EnumCalendarInfoW, DeleteFileW, CreateProcessW, CreateFileW, CreateEventW, CreateDirectoryW, CloseHandle
                                                                          advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW
                                                                          comctl32.dllInitCommonControls
                                                                          kernel32.dllSleep
                                                                          advapi32.dllAdjustTokenPrivileges
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          DutchNetherlands
                                                                          EnglishUnited States
                                                                          No network behavior found

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:20:39:56
                                                                          Start date:25/04/2024
                                                                          Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"
                                                                          Imagebase:0x400000
                                                                          File size:4'482'593 bytes
                                                                          MD5 hash:0D8BEDDA7D9B963DE975685CF2B2A5EB
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:Borland Delphi
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:1
                                                                          Start time:20:39:56
                                                                          Start date:25/04/2024
                                                                          Path:C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp" /SL5="$20438,4092287,121344,C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"
                                                                          Imagebase:0x400000
                                                                          File size:1'179'648 bytes
                                                                          MD5 hash:90FC739C83CD19766ACB562C66A7D0E2
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:Borland Delphi
                                                                          Antivirus matches:
                                                                          • Detection: 3%, ReversingLabs
                                                                          • Detection: 0%, Virustotal, Browse
                                                                          Reputation:moderate
                                                                          Has exited:true

                                                                          Target ID:5
                                                                          Start time:20:40:31
                                                                          Start date:25/04/2024
                                                                          Path:C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe"
                                                                          Imagebase:0x140000000
                                                                          File size:2'105'856 bytes
                                                                          MD5 hash:E3D6B93E861FEEFA47CCEEAE03E99094
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_BatToExe, Description: Yara detected BatToExe compiled binary, Source: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Author: Joe Security
                                                                          Reputation:low
                                                                          Has exited:false

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:6.8%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:17%
                                                                            Total number of Nodes:1602
                                                                            Total number of Limit Nodes:76
                                                                            execution_graph 103111 14005d068 103120 14005d138 103111->103120 103114 14005d0f4 SetLastError 103116 14005d105 NtdllDefWindowProc_W 103114->103116 103117 14005d118 103114->103117 103115 14005d099 GetPropW 103115->103114 103119 14005d0ae 103115->103119 103116->103117 103118 14005d0e3 DefFrameProcW 103118->103117 103119->103117 103119->103118 103195 140071fb4 TlsGetValue 103120->103195 103123 14005d18b GetPropW 103124 14005d1b4 103123->103124 103125 14005d1a3 GetParent 103123->103125 103127 14005d1d9 103124->103127 103206 1400721f0 RtlAcquirePebLock 103124->103206 103125->103123 103125->103124 103128 14005d384 103127->103128 103129 14005d6ea 103127->103129 103130 14005d22b 103127->103130 103182 14005d091 103127->103182 103212 14005cfbc GetPropW GetWindowLongPtrW RtlAcquirePebLock RtlLeaveCriticalSection 103128->103212 103134 14005d5d9 103129->103134 103138 14005d6fd 103129->103138 103131 14005d231 103130->103131 103132 14005d64e 103130->103132 103136 14005d243 103131->103136 103146 14005d596 103131->103146 103148 14005d50f 103131->103148 103219 14005cfbc GetPropW GetWindowLongPtrW RtlAcquirePebLock RtlLeaveCriticalSection 103132->103219 103134->103182 103222 14005e36c 21 API calls _raise_exc 103134->103222 103139 14005d52b 103136->103139 103140 14005d24b 103136->103140 103137 14005d661 103144 14005d671 GetWindowLongPtrW 103137->103144 103145 14005d69d 103137->103145 103137->103182 103158 14005d787 103138->103158 103138->103182 103141 14005d556 GetFocus SetPropW 103139->103141 103142 14005d531 GetPropW 103139->103142 103143 14005d254 103140->103143 103140->103148 103200 14005dd68 103141->103200 103149 14005d546 SetFocus 103142->103149 103150 14005d54f 103142->103150 103152 14005d4a6 103143->103152 103153 14005d25d 103143->103153 103144->103134 103145->103134 103159 14005d6c7 103145->103159 103161 14005d5b6 103146->103161 103162 14005d5ec 103146->103162 103146->103182 103148->103182 103218 14005e36c 21 API calls _raise_exc 103148->103218 103149->103150 103214 14005e36c 21 API calls _raise_exc 103150->103214 103154 14005d4d9 103152->103154 103163 14005d4b1 GetClientRect FillRect 103152->103163 103156 14005d265 103153->103156 103157 14005d47b 103153->103157 103213 14005e36c 21 API calls _raise_exc 103154->103213 103166 14005d3a8 103156->103166 103167 14005d26e 103156->103167 103175 14005d48e EnumChildWindows 103157->103175 103157->103182 103168 14005d7b7 PostMessageW 103158->103168 103221 14005e36c 21 API calls _raise_exc 103158->103221 103220 14005ddbc 13 API calls 103159->103220 103161->103134 103164 14005d606 103161->103164 103174 14005d5c8 103161->103174 103162->103164 103216 14005e36c 21 API calls _raise_exc 103162->103216 103163->103154 103217 14005e810 17 API calls _raise_exc 103164->103217 103172 14005d3b1 SetRect GetWindowLongPtrW GetWindowLongPtrW AdjustWindowRectEx 103166->103172 103166->103182 103167->103128 103173 14005d277 103167->103173 103168->103182 103177 14005d416 GetWindowLongPtrW 103172->103177 103172->103182 103178 14005d280 GetPropW 103173->103178 103173->103182 103215 14005e36c 21 API calls _raise_exc 103174->103215 103175->103182 103177->103182 103180 14005d29e 103178->103180 103178->103182 103181 1400721f0 2 API calls 103180->103181 103183 14005d2b0 103181->103183 103182->103114 103182->103115 103210 14005e8cc 6 API calls 103183->103210 103185 14005d2bb RemovePropW RemovePropW RemovePropW 103186 14005d2f0 RevokeDragDrop 103185->103186 103187 14005d2f9 103185->103187 103186->103187 103188 14005d302 HeapFree DestroyAcceleratorTable 103187->103188 103189 14005d31b 103187->103189 103188->103189 103190 14005d324 DeleteObject 103189->103190 103191 14005d32a _raise_exc 103189->103191 103190->103191 103192 14005d356 103191->103192 103193 14005d344 UnregisterClassW 103191->103193 103211 14005e938 17 API calls _raise_exc 103192->103211 103193->103192 103196 14005d177 103195->103196 103197 140071fda RtlAllocateHeap TlsSetValue 103195->103197 103196->103123 103196->103127 103198 14007200c 103197->103198 103223 140109050 103198->103223 103201 14005dd92 IsDlgButtonChecked 103200->103201 103202 14005dd80 IsDlgButtonChecked 103200->103202 103203 14005ddb5 103201->103203 103204 14005dd8a IsDlgButtonChecked 103201->103204 103202->103203 103202->103204 103203->103150 103204->103203 103207 140072214 103206->103207 103208 140072222 RtlLeaveCriticalSection 103206->103208 103207->103208 103209 140072231 103208->103209 103209->103127 103210->103185 103211->103182 103212->103182 103213->103182 103214->103182 103215->103134 103216->103164 103217->103134 103218->103182 103219->103137 103220->103182 103221->103168 103222->103182 103224 14010909d TlsGetValue 103223->103224 103228 14010907e _raise_exc 103223->103228 103225 140109172 RtlAllocateHeap 103224->103225 103226 1401090b5 RtlAllocateHeap 103224->103226 103227 14010918a 103225->103227 103226->103227 103229 1401090d5 RtlAcquirePebLock 103226->103229 103227->103196 103228->103224 103230 1401090ea 103229->103230 103231 1401090ed 7 API calls 103229->103231 103230->103231 103231->103225 103232 140059267 103233 1400592a2 103232->103233 103234 14005952e GetParent 103232->103234 103236 1400594ea GetParent GetUpdateRect MapWindowPoints InvalidateRect 103233->103236 103237 1400592ab 103233->103237 103254 14005a4a4 25 API calls _raise_exc 103234->103254 103238 140059541 CallWindowProcW 103236->103238 103237->103238 103239 1400592c0 103237->103239 103241 140059305 GetClassNameW _wcsicmp 103237->103241 103240 1400592e5 103238->103240 103239->103238 103239->103240 103242 140059358 NtdllDefWindowProc_W CallWindowProcW 103241->103242 103243 14005932c _wcsicmp 103241->103243 103242->103238 103245 140059391 SetBkMode 103242->103245 103243->103242 103244 140059340 _wcsicmp 103243->103244 103244->103238 103244->103242 103246 140071fb4 _raise_exc 14 API calls 103245->103246 103247 1400593ab 103246->103247 103248 1400593b7 DeleteObject 103247->103248 103249 1400593bd 6 API calls 103247->103249 103248->103249 103249->103240 103250 140059412 CreateCompatibleBitmap 103249->103250 103251 1400594c8 DeleteDC 103250->103251 103252 14005942e SelectObject CreateWindowExW 103250->103252 103251->103240 103253 14005949d DestroyWindow CreateBrushIndirect DeleteObject 103252->103253 103253->103251 103254->103238 103255 1400500a4 103256 140050164 103255->103256 103257 1400500d4 103255->103257 103260 1400501e1 103256->103260 103261 14005016c GetPropW 103256->103261 103258 140050227 CallWindowProcW 103257->103258 103259 1400500de IsDlgButtonChecked 103257->103259 103264 14005015d 103258->103264 103259->103258 103263 1400500f8 GetWindowLongPtrW 103259->103263 103262 1400501e9 GetPropW 103260->103262 103270 1400501dc 103260->103270 103261->103258 103265 140050182 103261->103265 103262->103258 103266 1400501fb ReleaseCapture RemovePropW 103262->103266 103267 140050128 SetPropW SetCapture GetWindowLongPtrW 103263->103267 103268 14005010d IsDlgButtonChecked 103263->103268 103265->103258 103269 1400501c1 ReleaseCapture RemovePropW 103265->103269 103266->103270 103267->103258 103267->103264 103268->103258 103268->103267 103269->103270 103270->103258 103272 14005a520 25 API calls 103270->103272 103272->103258 103273 14005f8e4 GetLocalTime 103276 14005f928 103273->103276 103278 14005f968 103276->103278 103277 14005f922 103278->103277 103279 14005fad3 _mktime64 103278->103279 103279->103277 103280 140042ef0 GetPropW 103281 140042fe6 CallWindowProcW 103280->103281 103282 140042f3a GetParent GetPropW 103280->103282 103283 1400721f0 2 API calls 103282->103283 103284 140042f66 103283->103284 103284->103281 103285 140042f6e RemovePropW GetParent RemovePropW 103284->103285 103286 140042fc3 HeapFree 103285->103286 103287 140042f9e 103285->103287 103288 140072184 103286->103288 103290 140042fbe 103287->103290 103291 14006b6c8 DeleteObject 103287->103291 103288->103281 103290->103286 103291->103287 103292 14005826c 103293 140071fb4 _raise_exc 14 API calls 103292->103293 103294 14005829e 103293->103294 103295 1400582a6 IsDlgButtonChecked 103294->103295 103296 1400582bd 103294->103296 103295->103296 103297 1400582df CreateWindowExW IsDlgButtonChecked SetWindowLongPtrW IsDlgButtonChecked 103296->103297 103309 1400583c4 59 API calls 103296->103309 103302 140059124 IsDlgButtonChecked 103297->103302 103300 1400582d7 103300->103297 103303 1400583a4 103302->103303 103304 14005915b 103302->103304 103310 1400585a0 IsDlgButtonChecked IsDlgButtonChecked 103304->103310 103306 14005916c IsDlgButtonChecked IsDlgButtonChecked ShowWindow EnableWindow 103311 140058e8c GetClientRect 103306->103311 103308 1400591c7 EnableWindow ShowWindow 103308->103303 103309->103300 103310->103306 103312 140058ebd IsDlgButtonChecked 103311->103312 103313 140058efa IsDlgButtonChecked IsDlgButtonChecked 103311->103313 103314 140058f54 SetWindowPos 103312->103314 103313->103314 103314->103308 103315 7ffdff1e6cc0 103316 7ffdff1e6d25 103315->103316 103317 7ffdff1e6cd2 103315->103317 103318 7ffdff1e6d03 103317->103318 103333 7ffdff1e8d48 HideCaret DestroyCaret DeleteObject 103317->103333 103324 7ffdff1c9d20 103318->103324 103321 7ffdff1e6cfb 103334 7ffdff1e8c74 61 API calls 2 library calls 103321->103334 103335 7ffdff1c9898 103324->103335 103326 7ffdff1c9d4c 103332 7ffdff1c9d52 SetCaretPos 103326->103332 103345 7ffdff1c8f48 103326->103345 103330 7ffdff1c9da1 103330->103332 103350 7ffdff1ccb70 121 API calls 3 library calls 103330->103350 103332->103316 103333->103321 103334->103318 103336 7ffdff1c9916 103335->103336 103337 7ffdff1c98b0 103335->103337 103336->103326 103338 7ffdff1c8f48 58 API calls 103337->103338 103339 7ffdff1c98c1 103338->103339 103344 7ffdff1c98fa 103339->103344 103362 7ffdff1ea9ac GetSysColor GetSysColor 103339->103362 103342 7ffdff1c98d7 103363 7ffdff1dc5b4 60 API calls _RunAllParam 103342->103363 103351 7ffdff1d1b44 103344->103351 103346 7ffdff1c8f68 103345->103346 103348 7ffdff1c8f6d 103345->103348 103374 7ffdff1de04c 103346->103374 103349 7ffdff1cca10 58 API calls 103348->103349 103349->103330 103350->103332 103352 7ffdff1c9898 127 API calls 103351->103352 103353 7ffdff1d1b5b 103352->103353 103364 7ffdff1e6dfc 103353->103364 103356 7ffdff1d1c22 103356->103336 103357 7ffdff1d1bf0 103357->103356 103372 7ffdff1ca73c InvalidateRect 103357->103372 103359 7ffdff1d1b91 103359->103357 103371 7ffdff1ca73c InvalidateRect 103359->103371 103362->103342 103363->103344 103365 7ffdff1e6e5a 103364->103365 103366 7ffdff1e6f25 SetScrollInfo 103365->103366 103368 7ffdff1d1b7e 103365->103368 103367 7ffdff1e6f65 103366->103367 103366->103368 103373 7ffdff1cb15c InvalidateRect 103367->103373 103368->103359 103370 7ffdff1d5dd0 127 API calls 103368->103370 103370->103359 103371->103357 103372->103356 103373->103368 103377 7ffdff22e0dc 103374->103377 103380 7ffdff22e0e7 malloc 103377->103380 103379 7ffdff1de05a 103379->103348 103380->103379 103383 7ffdff22e106 _RunAllParam 103380->103383 103388 7ffdff22ff04 103380->103388 103381 7ffdff22e14d 103403 7ffdff22fe1c 47 API calls malloc 103381->103403 103383->103381 103402 7ffdff22f194 57 API calls _cinit 103383->103402 103384 7ffdff22e15e 103404 7ffdff22fff8 RaiseException __initmbctable 103384->103404 103387 7ffdff22e174 103389 7ffdff22ff98 malloc 103388->103389 103390 7ffdff22ff1c malloc 103388->103390 103410 7ffdff232324 47 API calls _errno 103389->103410 103391 7ffdff22ff54 RtlAllocateHeap 103390->103391 103392 7ffdff22ff34 103390->103392 103396 7ffdff22ff7d 103390->103396 103399 7ffdff22ff82 103390->103399 103391->103390 103395 7ffdff22ff8d 103391->103395 103392->103391 103405 7ffdff231344 47 API calls 2 library calls 103392->103405 103406 7ffdff23111c 47 API calls 2 library calls 103392->103406 103407 7ffdff232c40 GetModuleHandleW GetProcAddress ExitProcess malloc 103392->103407 103395->103380 103408 7ffdff232324 47 API calls _errno 103396->103408 103409 7ffdff232324 47 API calls _errno 103399->103409 103402->103381 103403->103384 103404->103387 103405->103392 103406->103392 103408->103399 103409->103395 103410->103395 103411 140058cb8 103412 140058cd5 103411->103412 103413 140058d24 GetUpdateRect 103411->103413 103414 140058ce8 CallWindowProcW 103412->103414 103415 140058cfd CallWindowProcW 103412->103415 103425 1400585a0 IsDlgButtonChecked IsDlgButtonChecked 103413->103425 103423 140058d20 103414->103423 103424 1400585a0 IsDlgButtonChecked IsDlgButtonChecked 103415->103424 103417 140058d44 103426 140058878 12 API calls 103417->103426 103420 140058d15 103422 140058e8c 5 API calls 103420->103422 103421 140058d54 CallWindowProcW 103421->103423 103422->103423 103424->103420 103425->103417 103426->103421 103427 140043bf8 103428 140043c21 103427->103428 103429 140043c04 CallWindowProcW 103427->103429 103432 14005a520 25 API calls 103428->103432 103430 140043c2b 103429->103430 103432->103430 103433 7ffdff1d9c1b 103436 7ffdff1d8f1f 103433->103436 103435 7ffdff1d8f27 103436->103435 103437 7ffdff1c9860 103436->103437 103442 7ffdff1cb934 103437->103442 103441 7ffdff1c987e 103444 7ffdff1cb978 103442->103444 103443 7ffdff1c9876 103446 7ffdff1c97c0 128 API calls _RunAllParam 103443->103446 103444->103443 103447 7ffdff1e6aac 103444->103447 103446->103441 103448 7ffdff1e6b01 103447->103448 103449 7ffdff1e6abd 103447->103449 103448->103443 103450 7ffdff1e6ae8 KillTimer 103449->103450 103451 7ffdff1e6ac1 SetTimer 103449->103451 103450->103448 103451->103448 103452 140025b32 103482 140073140 103452->103482 103454 140025bed 103493 140072e00 GetLastError TlsGetValue SetLastError 103454->103493 103456 140025bf7 103494 140072e00 GetLastError TlsGetValue SetLastError 103456->103494 103458 140025c0b 103495 140066510 103458->103495 103463 140072e50 TlsGetValue RtlAllocateHeap RtlReAllocateHeap 103471 140025b44 103463->103471 103464 140025c36 103506 1400732b0 103464->103506 103466 140072e00 GetLastError TlsGetValue SetLastError 103466->103471 103468 140073020 wcslen TlsGetValue RtlReAllocateHeap RtlReAllocateHeap 103468->103471 103470 140025c64 103511 140073020 103470->103511 103471->103454 103471->103463 103471->103466 103471->103468 103501 140053708 9 API calls 103471->103501 103473 140025c73 103474 140072e50 3 API calls 103473->103474 103475 140025c84 103474->103475 103516 140073280 103475->103516 103478 140073280 HeapFree 103479 140025caf 103478->103479 103480 140073280 HeapFree 103479->103480 103481 140025cc1 103480->103481 103483 14007316f TlsGetValue 103482->103483 103484 14007314d 103482->103484 103486 140073180 103483->103486 103492 14007316d 103483->103492 103519 140072d90 HeapCreate 103484->103519 103523 140073b90 RtlAllocateHeap RtlAllocateHeap TlsSetValue 103486->103523 103489 140073185 TlsGetValue 103491 140109050 _raise_exc 11 API calls 103489->103491 103490 140109050 _raise_exc 11 API calls 103490->103492 103491->103492 103492->103471 103493->103456 103494->103458 103496 140066520 103495->103496 103497 14006657c 103496->103497 103529 1401091e0 WideCharToMultiByte _malloc_dbg WideCharToMultiByte 103496->103529 103525 140066c70 103497->103525 103501->103471 103502 140072e50 TlsGetValue 103503 140072eb6 RtlReAllocateHeap 103502->103503 103504 140072e91 RtlAllocateHeap 103502->103504 103505 140072ee1 103503->103505 103504->103505 103505->103464 103507 1400732c6 wcscmp 103506->103507 103509 140025c47 103507->103509 103510 140072e00 GetLastError TlsGetValue SetLastError 103509->103510 103510->103470 103512 140073047 103511->103512 103513 140073039 wcslen 103511->103513 103514 140073360 3 API calls 103512->103514 103513->103512 103515 140073055 103514->103515 103515->103473 103517 140025c9d 103516->103517 103518 140073291 HeapFree 103516->103518 103517->103478 103518->103517 103520 140072db1 _raise_exc 103519->103520 103524 140073b90 RtlAllocateHeap RtlAllocateHeap TlsSetValue 103520->103524 103522 140072dbc TlsGetValue 103522->103490 103523->103489 103524->103522 103526 140066c8e 103525->103526 103530 140073360 TlsGetValue 103526->103530 103529->103497 103531 140073384 103530->103531 103532 140073402 103531->103532 103533 1400733bd RtlReAllocateHeap 103531->103533 103534 140025c27 103532->103534 103535 140073423 RtlReAllocateHeap 103532->103535 103533->103534 103534->103502 103535->103534 103536 14004a980 103538 14004aa13 103536->103538 103539 14004a99f 103536->103539 103537 14004aab0 103538->103537 103562 1400dd520 20 API calls 103538->103562 103540 14004a9b7 fseek 103539->103540 103540->103538 103542 14004a9cd RtlAllocateHeap 103540->103542 103542->103537 103544 14004a9ee fread 103542->103544 103543 14004aa4b 103543->103537 103545 14004aa57 103543->103545 103546 14004aaa8 103543->103546 103544->103538 103545->103546 103563 1400dda90 103545->103563 103553 14004aad0 103546->103553 103550 14004aa76 103550->103537 103551 1400dda90 24 API calls 103552 14004aa71 103551->103552 103552->103546 103552->103550 103575 1400dc4b0 103553->103575 103555 14004aae4 103556 14004aaed HeapFree 103555->103556 103557 14004aafc 103555->103557 103556->103557 103558 14004ab05 HeapFree 103557->103558 103559 14004ab14 103557->103559 103558->103559 103560 14004ab32 103559->103560 103561 14004ab1d HeapFree 103559->103561 103560->103537 103561->103560 103562->103543 103570 1400ddab0 103563->103570 103566 14004aa64 103566->103550 103566->103551 103567 1400ddb27 fread 103567->103570 103568 1400dcbd0 fread fread 103572 1400ddb4b 103568->103572 103570->103566 103570->103567 103570->103572 103573 1400dd010 fread fread fread fread 103570->103573 103603 1400dd190 103570->103603 103608 1400dccb0 103570->103608 103640 1400de4a0 103570->103640 103571 1400dddd0 _malloc_dbg _malloc_dbg memcpy _errno _realloc_dbg 103571->103572 103572->103566 103572->103568 103572->103570 103572->103571 103574 1400ddbfa 103572->103574 103573->103570 103574->103566 103576 1400dc4c9 103575->103576 103577 1400dc5a6 103575->103577 103576->103577 103578 1400dc4e9 103576->103578 103600 1400ddf00 ??3@YAXPEAX ??3@YAXPEAX 103576->103600 103577->103555 103580 1400dc4fb 103578->103580 103601 1400ddf00 ??3@YAXPEAX ??3@YAXPEAX 103578->103601 103582 1400dc50d 103580->103582 103591 1400ddf30 103580->103591 103602 1400dde80 ??3@YAXPEAX ??3@YAXPEAX 103582->103602 103585 1400dc51e 103586 1400dc527 ??3@YAXPEAX ??3@YAXPEAX 103585->103586 103587 1400dc53d fclose 103585->103587 103588 1400dc577 ??3@YAXPEAX ??3@YAXPEAX 103585->103588 103586->103555 103587->103586 103587->103588 103590 1400dc58f 103588->103590 103590->103555 103592 1400de029 103591->103592 103596 1400ddf39 103591->103596 103592->103582 103593 1400de016 ??3@YAXPEAX 103593->103592 103594 1400ddf7f ??3@YAXPEAX ??3@YAXPEAX 103594->103596 103595 1400ddf9e ??3@YAXPEAX 103595->103596 103596->103592 103596->103593 103596->103594 103596->103595 103597 1400ddfe3 ??3@YAXPEAX 103596->103597 103598 1400de011 103596->103598 103599 1400ddfc0 ??3@YAXPEAX 103596->103599 103597->103596 103598->103593 103599->103597 103599->103599 103600->103578 103601->103580 103602->103585 103604 1400dd1be 103603->103604 103605 1400dd1aa 103603->103605 103606 1400dd1d8 fread 103604->103606 103607 1400dd1c7 103604->103607 103605->103570 103606->103607 103607->103570 103609 1400dccd6 103608->103609 103610 1400dccc5 103608->103610 103645 1400dd490 fread 103609->103645 103610->103570 103612 1400dccee 103613 1400dcd85 103612->103613 103646 1400dd490 fread 103612->103646 103613->103570 103615 1400dcd02 103615->103613 103647 1400dd490 fread 103615->103647 103617 1400dcd16 103617->103613 103648 1400dd490 fread 103617->103648 103619 1400dcd2a 103619->103613 103620 1400dcd3f 103619->103620 103621 1400dcd53 fread 103619->103621 103622 1400dcd79 103620->103622 103623 1400dcd92 103620->103623 103621->103620 103649 1400ddf00 ??3@YAXPEAX ??3@YAXPEAX 103622->103649 103624 1400dcdb8 103623->103624 103650 1400ddf00 ??3@YAXPEAX ??3@YAXPEAX 103623->103650 103627 1400dce78 103624->103627 103651 1400de040 _malloc_dbg _calloc_dbg ??3@YAXPEAX memcpy 103624->103651 103628 1400dceda _malloc_dbg 103627->103628 103629 1400dce81 103627->103629 103628->103613 103633 1400dce94 103628->103633 103631 1400de4a0 2 API calls 103629->103631 103631->103633 103632 1400dcddc 103632->103613 103632->103627 103637 1400dce14 fread 103632->103637 103638 1400dcea3 103632->103638 103633->103613 103634 1400dcf1d 103633->103634 103653 1400de040 _malloc_dbg _calloc_dbg ??3@YAXPEAX memcpy 103633->103653 103634->103613 103654 1400dd990 fread 103634->103654 103637->103632 103652 1400ddf00 ??3@YAXPEAX ??3@YAXPEAX 103638->103652 103641 1400de4b6 103640->103641 103642 1400de4e1 _realloc_dbg 103641->103642 103643 1400de4ce _errno 103641->103643 103644 1403975fc 103642->103644 103643->103570 103645->103612 103646->103615 103647->103617 103648->103619 103649->103613 103650->103624 103651->103632 103652->103613 103653->103634 103654->103613 103655 7ffdff1e8f90 GetWindowLongPtrA 103656 7ffdff1e8fc5 103655->103656 103657 7ffdff1e9022 103655->103657 103659 7ffdff1e8fca 103656->103659 103660 7ffdff1e900f 103656->103660 103658 7ffdff1e9055 103657->103658 103664 7ffdff1e9031 SetWindowLongA 103657->103664 103670 7ffdff1e59f8 204 API calls 103658->103670 103662 7ffdff22e0dc _RunAllParam 58 API calls 103659->103662 103661 7ffdff1e9011 DefWindowProcA 103660->103661 103663 7ffdff1e900d 103661->103663 103665 7ffdff1e8fd4 103662->103665 103664->103661 103666 7ffdff1e8fe7 SetWindowLongPtrA 103665->103666 103672 7ffdff1e51d4 103665->103672 103675 7ffdff1e59f8 103666->103675 103669 7ffdff1e8fe4 103669->103666 103670->103663 103831 7ffdff1e32e4 103672->103831 103677 7ffdff1e5a39 103675->103677 103676 7ffdff1e5a73 103684 7ffdff1e6942 103676->103684 103685 7ffdff1e5aa4 103676->103685 103732 7ffdff1e6701 SetFocus 103676->103732 103747 7ffdff1e5ab6 103676->103747 103677->103676 103678 7ffdff1e5bf8 103677->103678 103679 7ffdff1e6391 103677->103679 103682 7ffdff1e6385 103678->103682 103683 7ffdff1e5bfe 103678->103683 103680 7ffdff1e672d 103679->103680 103689 7ffdff1e63a4 103679->103689 103680->103676 103686 7ffdff1e6746 103680->103686 103987 7ffdff1e7eb0 131 API calls __initmbctable 103682->103987 103691 7ffdff1e5c0b 103683->103691 103692 7ffdff1e5ed0 103683->103692 103699 7ffdff1e695b 103684->103699 103709 7ffdff22e0dc _RunAllParam 58 API calls 103684->103709 103694 7ffdff1e686a 103685->103694 103695 7ffdff1e5aaf 103685->103695 103696 7ffdff1e674c 103686->103696 103724 7ffdff1e681f 103686->103724 103697 7ffdff1e64e6 103689->103697 103698 7ffdff1e63b1 103689->103698 103690 7ffdff1e69e2 103690->103663 103705 7ffdff1e5c1a 103691->103705 103706 7ffdff1e5d75 103691->103706 103785 7ffdff1e62be 103691->103785 103693 7ffdff1e5edd 103692->103693 103725 7ffdff1e6088 103692->103725 103701 7ffdff1e5ee3 103693->103701 103742 7ffdff1e6039 103693->103742 103713 7ffdff1e6895 MsgWaitForMultipleObjects 103694->103713 103714 7ffdff1e68b8 103694->103714 103694->103747 103695->103747 103910 7ffdff1e4a68 103695->103910 103711 7ffdff1e6804 103696->103711 103735 7ffdff1e676d 103696->103735 103696->103785 103707 7ffdff1e670a 103697->103707 103708 7ffdff1e64f2 103697->103708 103703 7ffdff1e64d9 103698->103703 103704 7ffdff1e63b7 103698->103704 103710 7ffdff22e0dc _RunAllParam 58 API calls 103699->103710 103700 7ffdff1e67e9 DefWindowProcA 103700->103747 103734 7ffdff1e5fad 103701->103734 103759 7ffdff1e5d90 103701->103759 103701->103785 103997 7ffdff1e843c InvalidateRect SetTimer KillTimer __initmbctable 103703->103997 103715 7ffdff1e63c6 103704->103715 103716 7ffdff1e64cd 103704->103716 103728 7ffdff1e5d3a GetDlgCtrlID SystemParametersInfoA RegisterDragDrop 103705->103728 103729 7ffdff1e5c2b 103705->103729 103705->103747 103720 7ffdff1e5ec6 103706->103720 103721 7ffdff1e5d7e 103706->103721 104000 7ffdff1d654c 129 API calls 103707->104000 103718 7ffdff1e6678 ImmGetContext 103708->103718 103719 7ffdff1e64fe 103708->103719 103709->103699 103723 7ffdff1e6987 103710->103723 103711->103747 104003 7ffdff1e85f8 131 API calls 103711->104003 103712 7ffdff1e62c8 GetKeyState GetKeyState GetKeyState 103737 7ffdff1e6318 103712->103737 103713->103714 103713->103747 103714->103747 104005 7ffdff1cba9c 103714->104005 103726 7ffdff1e64bd 103715->103726 103727 7ffdff1e63cf 103715->103727 103991 7ffdff1cb8b4 103716->103991 103730 7ffdff22db58 103718->103730 103738 7ffdff1e650a 103719->103738 103739 7ffdff1e6642 GetMessageTime 103719->103739 103980 7ffdff1c97c0 128 API calls _RunAllParam 103720->103980 103740 7ffdff1e5ea7 103721->103740 103741 7ffdff1e5d87 103721->103741 103723->103732 103733 7ffdff1e698c 103723->103733 103724->103747 104004 7ffdff1caa60 127 API calls 103724->104004 103725->103712 103744 7ffdff1e6170 103725->103744 103745 7ffdff1e60b0 103725->103745 103725->103747 103725->103785 103990 7ffdff1e57b4 133 API calls __initmbctable 103726->103990 103727->103747 103763 7ffdff1e63dd 103727->103763 103727->103785 103728->103747 103748 7ffdff1e5c34 103729->103748 103729->103785 103750 7ffdff1e6696 ImmReleaseContext GetKeyState GetMessageTime 103730->103750 103732->103663 104019 7ffdff1daec8 67 API calls 2 library calls 103733->104019 103755 7ffdff1e5fbd 103734->103755 103734->103785 103735->103695 103753 7ffdff1e67ca 103735->103753 103986 7ffdff1d4c58 127 API calls 103737->103986 103756 7ffdff1e6546 103738->103756 103738->103759 103999 7ffdff1d68d4 127 API calls 103739->103999 103979 7ffdff1c97c0 128 API calls _RunAllParam 103740->103979 103758 7ffdff1e5dbd 103741->103758 103741->103759 103982 7ffdff1caa60 127 API calls 103742->103982 103766 7ffdff1e6196 IsWindowUnicode 103744->103766 103983 7ffdff22ea00 69 API calls __initmbctable 103744->103983 103745->103695 103745->103712 104020 7ffdff22db70 103747->104020 103764 7ffdff1e5cc8 _RunAllParam 103748->103764 103765 7ffdff1e5c3d 103748->103765 103750->103732 104001 7ffdff1e8794 GetDeviceCaps GetDeviceCaps GetDC ReleaseDC 103753->104001 103770 7ffdff1e6027 103755->103770 103797 7ffdff1c9d20 127 API calls 103755->103797 103756->103785 103821 7ffdff1e6555 103756->103821 103761 7ffdff1e5dc7 103758->103761 103758->103785 103759->103695 103759->103747 103759->103785 103761->103747 103774 7ffdff1e5ddd GetCursorPos ScreenToClient 103761->103774 103762 7ffdff1e68d5 103762->103747 103775 7ffdff1e68e5 GetTickCount 103762->103775 103776 7ffdff1e63f8 103763->103776 103777 7ffdff1e63e2 103763->103777 103805 7ffdff1d1b44 127 API calls 103764->103805 103778 7ffdff1e5c42 103765->103778 103779 7ffdff1e5ca1 103765->103779 103781 7ffdff1e61a9 103766->103781 103782 7ffdff1e626d 103766->103782 103767 7ffdff1e5eac SystemParametersInfoA 103767->103747 103768 7ffdff1e6997 103768->103732 103981 7ffdff1e4504 DestroyMenu CreatePopupMenu TrackPopupMenu DestroyMenu 103770->103981 103787 7ffdff1e5e16 103774->103787 103775->103747 103788 7ffdff1e68fc 103775->103788 103790 7ffdff1e6417 103776->103790 103791 7ffdff1e63fd 103776->103791 103777->103695 103789 7ffdff1e63eb 103777->103789 103792 7ffdff1e5c5c 103778->103792 103793 7ffdff1e5c47 103778->103793 103965 7ffdff1d6c4c 103779->103965 103781->103747 103984 7ffdff1e5968 11 API calls __initmbctable 103781->103984 103782->103747 103985 7ffdff1e80f8 72 API calls 103782->103985 103783 7ffdff1e67d2 103783->103785 103796 7ffdff1e67f4 103783->103796 103785->103700 103785->103747 103787->103747 103977 7ffdff1d5c04 127 API calls 103787->103977 103788->103747 103808 7ffdff1e6914 PostMessageA 103788->103808 103988 7ffdff1e8518 InvalidateRect 103789->103988 103790->103747 103811 7ffdff1e6431 SendMessageA 103790->103811 103791->103747 103989 7ffdff1d6b64 129 API calls 103791->103989 103801 7ffdff1e5c81 103792->103801 103802 7ffdff1e5c6b IsChild 103792->103802 103793->103695 103800 7ffdff1e5c4f 103793->103800 103794 7ffdff1e6184 103794->103747 103794->103766 104002 7ffdff1e86b4 130 API calls 103796->104002 103807 7ffdff1e5fee ClientToScreen 103797->103807 103948 7ffdff1e55c4 CreateRectRgn 103800->103948 103801->103747 103812 7ffdff1d6c4c 3 API calls 103801->103812 103802->103747 103802->103801 103824 7ffdff1e5cd5 103805->103824 103807->103770 103808->103747 103811->103747 103817 7ffdff1e5c94 103812->103817 103814 7ffdff1e6221 WideCharToMultiByte 103814->103747 103972 7ffdff1e8d48 HideCaret DestroyCaret DeleteObject 103817->103972 103818 7ffdff1e5cb3 103974 7ffdff1e8d48 HideCaret DestroyCaret DeleteObject 103818->103974 103821->103747 103998 7ffdff1cb0a4 InvalidateRect SetTimer KillTimer 103821->103998 103822 7ffdff1e5e3f 103822->103747 103978 7ffdff1ca25c 127 API calls 103822->103978 103823 7ffdff1e5cbb 103975 7ffdff1e8c74 61 API calls 2 library calls 103823->103975 103824->103747 103828 7ffdff1cb934 2 API calls 103824->103828 103829 7ffdff1e5d2d 103828->103829 103976 7ffdff1ca73c InvalidateRect 103829->103976 103838 7ffdff1c9090 103831->103838 103834 7ffdff22e0dc _RunAllParam 58 API calls 103835 7ffdff1e3368 __initmbctable 103834->103835 103836 7ffdff22e0dc _RunAllParam 58 API calls 103835->103836 103837 7ffdff1e35ea RegisterClipboardFormatA RegisterClipboardFormatA OleInitialize 103835->103837 103836->103835 103837->103669 103867 7ffdff1e9d60 103838->103867 103842 7ffdff1c90e4 103875 7ffdff1e0140 103842->103875 103844 7ffdff1c9134 103845 7ffdff22e0dc _RunAllParam 58 API calls 103844->103845 103847 7ffdff1c9166 103845->103847 103848 7ffdff1c91f9 103847->103848 103879 7ffdff1db378 103847->103879 103849 7ffdff1de04c 58 API calls 103848->103849 103850 7ffdff1c9427 103849->103850 103851 7ffdff1de04c 58 API calls 103850->103851 103852 7ffdff1c9433 103851->103852 103853 7ffdff1de04c 58 API calls 103852->103853 103854 7ffdff1c943f 103853->103854 103855 7ffdff1de04c 58 API calls 103854->103855 103856 7ffdff1c944b 103855->103856 103857 7ffdff1de04c 58 API calls 103856->103857 103858 7ffdff1c9457 103857->103858 103859 7ffdff22e0dc _RunAllParam 58 API calls 103858->103859 103860 7ffdff1c94db 103859->103860 103861 7ffdff1c94e8 103860->103861 103891 7ffdff1c44f0 80 API calls _RunAllParam 103860->103891 103883 7ffdff1c7a34 103861->103883 103864 7ffdff1c950a _RunAllParam 103887 7ffdff1e09d0 103864->103887 103868 7ffdff22e0dc _RunAllParam 58 API calls 103867->103868 103869 7ffdff1e9d8a 103868->103869 103892 7ffdff1ea494 103869->103892 103872 7ffdff1dc3a4 103873 7ffdff22e0dc _RunAllParam 58 API calls 103872->103873 103874 7ffdff1dc3da 103873->103874 103874->103842 103874->103874 103876 7ffdff1e0158 103875->103876 103877 7ffdff22e0dc _RunAllParam 58 API calls 103876->103877 103878 7ffdff1e0190 103876->103878 103877->103878 103878->103844 103878->103878 103880 7ffdff1db3aa 103879->103880 103881 7ffdff1db3c6 103879->103881 103882 7ffdff22e0dc _RunAllParam 58 API calls 103880->103882 103881->103847 103882->103881 103884 7ffdff1c7a5c 103883->103884 103885 7ffdff22e0dc _RunAllParam 58 API calls 103884->103885 103886 7ffdff1c7a9c 103884->103886 103885->103886 103886->103864 103889 7ffdff1e09f3 _RunAllParam 103887->103889 103888 7ffdff22e0dc _RunAllParam 58 API calls 103890 7ffdff1c9599 103888->103890 103889->103888 103890->103834 103891->103861 103898 7ffdff1eab6c 103892->103898 103894 7ffdff1ea4b7 _RunAllParam 103901 7ffdff1eacac 103894->103901 103896 7ffdff1ea4c7 GetSysColor GetSysColor GetSysColor 103897 7ffdff1c90d8 103896->103897 103897->103872 103899 7ffdff22e0dc _RunAllParam 58 API calls 103898->103899 103900 7ffdff1eabad _RunAllParam 103899->103900 103900->103894 103904 7ffdff1e9c48 103901->103904 103903 7ffdff1eacc1 103903->103896 103905 7ffdff1e9c75 103904->103905 103909 7ffdff1e9c6e 103904->103909 103906 7ffdff22e0dc _RunAllParam 58 API calls 103905->103906 103907 7ffdff1e9cca malloc 103905->103907 103905->103909 103906->103907 103908 7ffdff22e0dc _RunAllParam 58 API calls 103907->103908 103908->103909 103909->103903 103911 7ffdff1e4c17 103910->103911 103912 7ffdff1e4a92 103910->103912 103914 7ffdff1e4dcb 103911->103914 103922 7ffdff1e4c24 103911->103922 103913 7ffdff1e4aa7 103912->103913 103943 7ffdff1e4cbb __initmbctable 103912->103943 103915 7ffdff1c9d20 127 API calls 103913->103915 103916 7ffdff1e4f0a 103914->103916 103917 7ffdff1e50e0 103914->103917 103914->103943 103918 7ffdff1e4c04 103915->103918 103919 7ffdff1e50c3 103916->103919 103920 7ffdff1e4f13 103916->103920 103930 7ffdff1e50e9 103917->103930 104039 7ffdff1e47dc 80 API calls 2 library calls 103917->104039 104031 7ffdff1e42fc 64 API calls 103918->104031 104038 7ffdff1e1104 58 API calls 2 library calls 103919->104038 103923 7ffdff1e4f1c 103920->103923 103940 7ffdff1e5074 103920->103940 103927 7ffdff1e4c4a 103922->103927 103928 7ffdff1e4d1c 103922->103928 103936 7ffdff1e4c61 103922->103936 103922->103943 103932 7ffdff1e4fc4 103923->103932 103933 7ffdff1e4f2e 103923->103933 103923->103943 103925 7ffdff1e4c12 103925->103943 103927->103936 103937 7ffdff1e4cc0 103927->103937 103927->103943 104032 7ffdff1c1c28 DestroyWindow 103928->104032 103929 7ffdff1c9860 130 API calls 103929->103943 103930->103943 104040 7ffdff1ca73c InvalidateRect 103930->104040 104036 7ffdff1e1254 58 API calls malloc 103932->104036 103938 7ffdff1e4fb1 103933->103938 103939 7ffdff1e4f33 103933->103939 103936->103929 103936->103943 103937->103943 103944 7ffdff1e4cf4 InvalidateRect 103937->103944 104035 7ffdff1e15c0 58 API calls 103938->104035 103939->103943 104033 7ffdff1e15c0 58 API calls 103939->104033 103940->103943 104037 7ffdff1e1614 66 API calls 3 library calls 103940->104037 103943->103747 103944->103943 103946 7ffdff1e4f7c 103946->103943 104034 7ffdff22f960 69 API calls __initmbctable 103946->104034 103949 7ffdff1e562c GetUpdateRgn BeginPaint 103948->103949 103950 7ffdff1e5650 103948->103950 103949->103950 104041 7ffdff1c8fe4 103950->104041 103953 7ffdff1e5729 103955 7ffdff1e573b 103953->103955 103956 7ffdff1e572e EndPaint 103953->103956 103954 7ffdff1e571b DeleteObject 103954->103953 103957 7ffdff1e5744 GetDC 103955->103957 103959 7ffdff1e5769 103955->103959 103956->103955 104068 7ffdff1e86b4 130 API calls 103957->104068 103961 7ffdff22db70 __initmbctable 8 API calls 103959->103961 103960 7ffdff1e575c ReleaseDC 103960->103959 103964 7ffdff1e579b 103961->103964 103963 7ffdff1e5705 103963->103953 103963->103954 103964->103747 103966 7ffdff1d6c64 103965->103966 103967 7ffdff1d6c77 103966->103967 103968 7ffdff1d6c70 103966->103968 104106 7ffdff1cb8fc InvalidateRect 103967->104106 103969 7ffdff1cb8b4 3 API calls 103968->103969 103970 7ffdff1d6c75 103969->103970 103973 7ffdff1e85f8 131 API calls 103970->103973 103972->103747 103973->103818 103974->103823 103975->103747 103976->103747 103977->103822 103978->103747 103979->103767 103980->103747 103981->103747 103983->103794 103984->103814 103985->103747 103986->103785 103987->103785 103988->103747 103989->103747 103990->103747 103992 7ffdff1cb8c7 103991->103992 103993 7ffdff1cb8e0 103991->103993 104107 7ffdff1e6a3c 103992->104107 104112 7ffdff1ca950 InvalidateRect 103993->104112 103995 7ffdff1cb925 103997->103747 103998->103747 103999->103747 104000->103747 104001->103783 104002->103747 104003->103747 104006 7ffdff1cbabe 104005->104006 104009 7ffdff1cbc52 104006->104009 104010 7ffdff1cbb18 104006->104010 104014 7ffdff1cbb54 104006->104014 104008 7ffdff1d1b44 127 API calls 104008->104010 104011 7ffdff1c9898 127 API calls 104009->104011 104010->103762 104012 7ffdff1cbcd6 104011->104012 104013 7ffdff1c8f48 58 API calls 104012->104013 104016 7ffdff1cbce6 104013->104016 104018 7ffdff1cbc41 104014->104018 104113 7ffdff1c3bc0 58 API calls _RunAllParam 104014->104113 104114 7ffdff1e2dec 58 API calls 104014->104114 104016->104018 104115 7ffdff1cb9f4 121 API calls 104016->104115 104018->104008 104018->104010 104019->103768 104021 7ffdff22db79 104020->104021 104022 7ffdff22db84 104021->104022 104023 7ffdff22fc00 RtlCaptureContext RtlLookupFunctionEntry 104021->104023 104022->103690 104024 7ffdff22fc44 RtlVirtualUnwind 104023->104024 104025 7ffdff22fc85 104023->104025 104026 7ffdff22fca7 IsDebuggerPresent 104024->104026 104025->104026 104116 7ffdff234324 104026->104116 104028 7ffdff22fd06 SetUnhandledExceptionFilter UnhandledExceptionFilter 104029 7ffdff22fd2e GetCurrentProcess TerminateProcess 104028->104029 104030 7ffdff22fd24 _FF_MSGBANNER 104028->104030 104029->103690 104030->104029 104031->103925 104032->103925 104033->103946 104034->103943 104035->103943 104036->103943 104037->103943 104038->103943 104039->103930 104040->103943 104042 7ffdff1c900c 104041->104042 104044 7ffdff1c9011 104041->104044 104043 7ffdff1de04c 58 API calls 104042->104043 104043->104044 104044->103963 104045 7ffdff1d0130 104044->104045 104046 7ffdff1d0168 104045->104046 104047 7ffdff1c9898 127 API calls 104046->104047 104048 7ffdff1d0170 104047->104048 104049 7ffdff1d0316 104048->104049 104050 7ffdff1dc3a4 58 API calls 104048->104050 104051 7ffdff1cba9c 127 API calls 104049->104051 104053 7ffdff1d0296 104050->104053 104054 7ffdff1d0349 104051->104054 104056 7ffdff1c9898 127 API calls 104053->104056 104062 7ffdff1d0445 __initmbctable 104054->104062 104069 7ffdff1cc1a8 104054->104069 104057 7ffdff1d02c5 104056->104057 104083 7ffdff1dc40c 59 API calls _RunAllParam 104057->104083 104058 7ffdff1d044a 104058->104062 104075 7ffdff1ce214 104058->104075 104084 7ffdff1c9c7c 127 API calls 104058->104084 104085 7ffdff1cca10 58 API calls 104058->104085 104086 7ffdff1ccb70 121 API calls 3 library calls 104058->104086 104087 7ffdff1cfb7c 9 API calls 104058->104087 104059 7ffdff1d0412 104060 7ffdff1cb934 2 API calls 104059->104060 104059->104062 104060->104062 104062->103963 104068->103960 104072 7ffdff1cc957 104069->104072 104074 7ffdff1cc1f6 malloc 104069->104074 104070 7ffdff22db70 __initmbctable 8 API calls 104071 7ffdff1cc9ee 104070->104071 104071->104058 104071->104059 104072->104070 104073 7ffdff22eab8 84 API calls 104073->104074 104074->104072 104074->104073 104077 7ffdff1ce286 104075->104077 104088 7ffdff1e0544 104077->104088 104078 7ffdff1e0544 58 API calls 104082 7ffdff1ceba3 104078->104082 104079 7ffdff1ce69c 104079->104078 104081 7ffdff1cf556 104082->104081 104101 7ffdff22eab8 84 API calls 3 library calls 104082->104101 104083->104049 104084->104058 104085->104058 104086->104058 104087->104058 104089 7ffdff22e0dc _RunAllParam 58 API calls 104088->104089 104090 7ffdff1e059e 104089->104090 104091 7ffdff1e0646 104090->104091 104102 7ffdff1e0454 58 API calls _RunAllParam 104090->104102 104104 7ffdff1e0454 58 API calls _RunAllParam 104091->104104 104094 7ffdff1e0632 104103 7ffdff1e0454 58 API calls _RunAllParam 104094->104103 104095 7ffdff1e0656 104105 7ffdff1e0454 58 API calls _RunAllParam 104095->104105 104098 7ffdff1e06bb 104098->104079 104099 7ffdff1e0663 104099->104098 104100 7ffdff1e0454 58 API calls 104099->104100 104100->104099 104101->104082 104102->104094 104103->104091 104104->104095 104105->104099 104108 7ffdff1e6a51 104107->104108 104109 7ffdff1e6a8c 104107->104109 104110 7ffdff1e6a7b KillTimer 104108->104110 104111 7ffdff1e6a5e SetTimer 104108->104111 104109->103993 104110->104109 104111->104109 104112->103995 104113->104014 104114->104014 104115->104016 104116->104028 104117 14005a27c GetWindowLongPtrW 104118 14005a2bf 104117->104118 104119 14005a36c NtdllDefWindowProc_W 104117->104119 104120 1400721f0 2 API calls 104118->104120 104127 14005a358 104119->104127 104121 14005a2ce CallWindowProcW 104120->104121 104122 14005a2f4 RemovePropW RemovePropW 104121->104122 104121->104127 104124 14005a334 SetWindowLongPtrW 104122->104124 104125 14005a32b RevokeDragDrop 104122->104125 104128 14005e810 17 API calls _raise_exc 104124->104128 104125->104124 104128->104127 104129 140001000 104130 140042000 104129->104130 104131 14000101d 104130->104131 104132 140001025 104131->104132 104133 14000103e 104132->104133 104134 140072d90 4 API calls 104133->104134 104135 14000105b 104134->104135 104136 140001060 104135->104136 105168 140071640 HeapCreate 104136->105168 104138 140001065 105169 14006fa60 104138->105169 104142 14000106f 104143 140001074 104142->104143 105175 14006ba0c LoadLibraryW 104143->105175 104145 140001079 105180 14006928c 104145->105180 104147 140001083 104148 140001088 104147->104148 104149 14000108d 104148->104149 105183 14005f3cc 104149->105183 104151 140001092 104152 140001097 104151->104152 105186 14005df94 memset RegisterClassW CreateWindowExW RegisterClipboardFormatW 104152->105186 104154 14000109c 105191 14005be44 104154->105191 104156 1400010a1 105198 14004f3e4 104156->105198 104158 1400010a6 104159 1400010ab OleInitializeWOW 104158->104159 105208 14004b91c LoadLibraryW 104159->105208 105168->104138 105232 14007204c 105169->105232 105172 14006cf64 105173 14007204c 6 API calls 105172->105173 105174 14006cf7e 105173->105174 105174->104142 105176 14006ba40 105175->105176 105177 14006ba29 GetProcAddress 105175->105177 105240 14006af58 LoadLibraryW 105176->105240 105177->105176 105250 140072318 RtlAllocateHeap RtlAllocateHeap 105180->105250 105182 1400692a4 105182->104147 105184 14005f43d 105183->105184 105185 14005f3db GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 105183->105185 105184->104151 105185->105184 105187 14007204c 6 API calls 105186->105187 105188 14005e07f 105187->105188 105252 14005e9d8 105188->105252 105190 14005e0a4 _raise_exc 105190->104154 105192 140072318 2 API calls 105191->105192 105193 14005be5c 105192->105193 105194 14007204c 6 API calls 105193->105194 105195 14005be70 105194->105195 105196 14007204c 6 API calls 105195->105196 105197 14005be84 LoadIconW LoadCursorW 105196->105197 105197->104156 105201 14004f3f5 _raise_exc 105198->105201 105199 14004f498 GetStockObject 105200 14004f4a3 105199->105200 105203 140072318 2 API calls 105200->105203 105201->105199 105202 14004f42a MulDiv CreateFontW 105201->105202 105202->105200 105204 14004f4be 105203->105204 105205 14007204c 6 API calls 105204->105205 105206 14004f4dd memset 105205->105206 105207 14004f51b 105206->105207 105207->104158 105209 1400010b5 105208->105209 105210 14004b939 GetProcAddress 105208->105210 105211 1400497d4 105209->105211 105210->105209 105212 140072318 2 API calls 105211->105212 105213 1400497ec 105212->105213 105214 14007204c 6 API calls 105213->105214 105215 1400010ba 105214->105215 105216 140047704 105215->105216 105217 140072318 2 API calls 105216->105217 105218 14004771c 105217->105218 105219 14007204c 6 API calls 105218->105219 105220 1400010bf 105219->105220 105221 140046dc4 105220->105221 105222 140072318 2 API calls 105221->105222 105223 1400010c4 105222->105223 105224 140045120 105223->105224 105225 14007204c 6 API calls 105224->105225 105226 1400010c9 105225->105226 105227 140044638 105226->105227 105228 14007204c 6 API calls 105227->105228 105229 140044649 105228->105229 105230 140072318 2 API calls 105229->105230 105231 140044664 RtlInitializeCriticalSection 105230->105231 105233 14007206d _raise_exc 105232->105233 105234 1400720b9 TlsGetValue RtlReAllocateHeap TlsSetValue 105233->105234 105236 140072088 RtlAllocateHeap TlsSetValue 105233->105236 105235 140072108 105234->105235 105238 14000106a 105235->105238 105239 140072ce0 RtlAllocateHeap 105235->105239 105236->105234 105238->105172 105239->105238 105241 14006af86 GetProcAddress 105240->105241 105242 14006afd9 LoadLibraryW 105240->105242 105245 14006afd0 FreeLibrary 105241->105245 105246 14006af9e memset 105241->105246 105243 14006b01f 105242->105243 105244 14006afee GetProcAddress 105242->105244 105243->104145 105247 14006b016 FreeLibrary 105244->105247 105249 14006b003 105244->105249 105245->105242 105248 14006afbd 105246->105248 105247->105243 105248->105245 105249->105247 105251 140072387 _raise_exc 105250->105251 105251->105182 105261 14005f000 105252->105261 105255 14005ea23 RtlAllocateHeap 105257 14005ea51 105255->105257 105258 14005eacc HeapFree 105255->105258 105256 14005eae0 105256->105190 105270 140072864 105257->105270 105258->105256 105260 14005ea9e RtlAllocateHeap 105260->105256 105262 14005ea04 RtlAllocateHeap 105261->105262 105263 14005f009 105261->105263 105262->105255 105262->105256 105283 14005ecac 6 API calls 105263->105283 105265 14005f01b 105284 1400729d0 9 API calls 105265->105284 105267 14005f024 HeapFree HeapFree 105268 14005f053 HeapFree 105267->105268 105269 14005f06d HeapFree 105267->105269 105268->105268 105268->105269 105269->105262 105271 140072893 105270->105271 105272 1400728a3 105271->105272 105273 14007296b RtlAllocateHeap 105271->105273 105285 140072b74 LoadLibraryW 105272->105285 105275 140072988 _raise_exc 105273->105275 105275->105260 105277 1400728ca 105278 1400728eb RtlAllocateHeap 105277->105278 105280 14007295c RtlLeaveCriticalSection 105277->105280 105279 140072906 105278->105279 105278->105280 105281 140072864 4 API calls 105279->105281 105280->105275 105282 14007291f 105281->105282 105282->105280 105283->105265 105284->105267 105286 140072ba7 GetProcAddress 105285->105286 105289 140072be0 105285->105289 105287 140072bd3 FreeLibrary 105286->105287 105288 140072bbc 105286->105288 105287->105289 105291 1400728b6 RtlAcquirePebLock 105287->105291 105288->105287 105290 140072bf4 Sleep 105289->105290 105289->105291 105290->105289 105291->105277 105292 1400c3790 105293 1400c37df 105292->105293 105294 1400c3795 105292->105294 105294->105293 105302 1400c15f0 memset ??3@YAXPEAX 105294->105302 105296 1400c37bd 105303 1400c15f0 memset ??3@YAXPEAX 105296->105303 105298 1400c37c8 105304 1400c65e0 105298->105304 105302->105296 105303->105298 105328 1400c1470 105304->105328 105309 1400cea70 ??3@YAXPEAX 105310 1400c6619 105309->105310 105311 1400cea70 ??3@YAXPEAX 105310->105311 105312 1400c662f 105311->105312 105313 1400cea70 ??3@YAXPEAX 105312->105313 105314 1400c6645 105313->105314 105315 1400cea70 ??3@YAXPEAX 105314->105315 105316 1400c665b 105315->105316 105317 1400c66a9 105316->105317 105318 1400cea70 ??3@YAXPEAX 105316->105318 105351 140081410 105317->105351 105318->105317 105320 1400c66c6 105321 1400cea70 ??3@YAXPEAX 105320->105321 105322 1400c66d5 105321->105322 105323 1400cea70 ??3@YAXPEAX 105322->105323 105324 1400c66eb 105323->105324 105325 1400cea70 ??3@YAXPEAX 105324->105325 105326 1400c37d7 105325->105326 105327 1400ce9a0 _setjmp longjmp memset ??3@YAXPEAX ??3@YAXPEAX 105326->105327 105327->105293 105329 1400cea70 ??3@YAXPEAX 105328->105329 105333 1400c1497 105329->105333 105330 1400c14fa 105332 1400cea70 ??3@YAXPEAX 105330->105332 105331 1400c14eb 105334 1400cea70 ??3@YAXPEAX 105331->105334 105335 1400c1510 105332->105335 105333->105330 105333->105331 105336 1400cea70 ??3@YAXPEAX 105333->105336 105334->105330 105337 1400cea70 ??3@YAXPEAX 105335->105337 105336->105333 105338 1400c1526 105337->105338 105339 1400c156b 105338->105339 105342 1400cea70 ??3@YAXPEAX 105338->105342 105343 1400c157a 105338->105343 105340 1400cea70 ??3@YAXPEAX 105339->105340 105340->105343 105341 1400c15bd 105345 1400cea70 ??3@YAXPEAX 105341->105345 105342->105338 105343->105341 105344 1400cea70 ??3@YAXPEAX 105343->105344 105346 1400c15cc 105343->105346 105344->105343 105345->105346 105347 1400cea70 105346->105347 105348 1400cea75 105347->105348 105349 1400c6601 105347->105349 105348->105349 105350 1400cea89 ??3@YAXPEAX 105348->105350 105349->105309 105350->105349 105352 140081474 105351->105352 105353 14008141e 105351->105353 105352->105320 105353->105352 105354 140081459 ??3@YAXPEAX 105353->105354 105355 140081452 ??3@YAXPEAX 105353->105355 105354->105320 105355->105354 105356 14004b3c8 105359 14004b23c 105356->105359 105358 14004b3d1 105386 140109580 105359->105386 105362 140109580 4 API calls 105363 14004b26f 105362->105363 105393 1400de700 105363->105393 105365 14004b277 105366 14004b383 105365->105366 105368 14004b2ba 105365->105368 105385 14004b355 105365->105385 105459 1400dead0 ??3@YAXPEAX 105365->105459 105366->105358 105370 14004b2d3 105368->105370 105460 1400dead0 ??3@YAXPEAX 105368->105460 105371 14004b309 105370->105371 105461 1400dead0 ??3@YAXPEAX 105370->105461 105407 1400dead0 ??3@YAXPEAX 105371->105407 105375 14004b319 105408 1400dead0 ??3@YAXPEAX 105375->105408 105376 14004b2f5 105462 1400dead0 ??3@YAXPEAX 105376->105462 105379 14004b329 105409 1400dead0 ??3@YAXPEAX 105379->105409 105381 14004b33d 105410 1400dead0 ??3@YAXPEAX 105381->105410 105383 14004b34d 105411 1400de890 105383->105411 105432 1400de500 105385->105432 105387 1401095a6 WideCharToMultiByte 105386->105387 105388 14010962d _malloc_dbg 105386->105388 105387->105388 105391 1401095ea _malloc_dbg 105387->105391 105389 14004b263 105388->105389 105389->105362 105391->105388 105392 1401095fd WideCharToMultiByte 105391->105392 105392->105389 105394 1400de7a5 105393->105394 105395 1400de714 _calloc_dbg 105393->105395 105463 1400e0510 _calloc_dbg 105394->105463 105473 1400e86e0 7 API calls 105395->105473 105398 1400de769 105400 1400de76d WSAStartup 105398->105400 105401 1400de7d3 105398->105401 105399 1400de7b2 105399->105365 105400->105401 105402 1400de781 105400->105402 105401->105365 105403 1400de7cd WSACleanup 105402->105403 105404 1400de792 105402->105404 105403->105401 105474 1400e8da0 7 API calls 105404->105474 105406 1400de797 105406->105394 105406->105401 105407->105375 105408->105379 105409->105381 105410->105383 105412 1400ded80 105411->105412 105413 1400ded95 105412->105413 105414 1400dedaa 105412->105414 105415 1400dedc6 105412->105415 105413->105385 105493 1400e9230 11 API calls 105414->105493 105416 1400dede2 105415->105416 105494 1400e9ea0 214 API calls 105415->105494 105422 1400dedea 105416->105422 105483 1400ea9f0 9 API calls 105416->105483 105420 1400dedb6 105420->105385 105421 1400dee1d 105484 1400ea200 21 API calls 105421->105484 105422->105385 105424 1400dee28 105425 1400dee2e 105424->105425 105426 1400dee48 105424->105426 105495 1400ea3b0 105425->105495 105428 1400dee51 105426->105428 105485 1400dee90 105426->105485 105520 1400ea800 76 API calls 105428->105520 105431 1400dee36 105431->105385 105433 1400df7e0 105432->105433 105434 1400de509 105432->105434 105435 1400df9e2 105433->105435 105436 1400e9b60 16 API calls 105433->105436 105434->105366 105435->105366 105437 1400df7fe 105436->105437 105438 1400df820 105437->105438 105440 1400ea3b0 186 API calls 105437->105440 105439 1400df835 105438->105439 105672 1400f6160 ??3@YAXPEAX ??3@YAXPEAX 105438->105672 105442 1400df84b ??3@YAXPEAX 105439->105442 105443 1400df858 ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX 105439->105443 105440->105438 105442->105443 105444 1400e80b0 7 API calls 105443->105444 105445 1400df8a3 ??3@YAXPEAX ??3@YAXPEAX 105444->105445 105446 1400e84f0 3 API calls 105445->105446 105447 1400df8d3 ??3@YAXPEAX 105446->105447 105448 1400df8f0 ??3@YAXPEAX 105447->105448 105449 1400df90b 105447->105449 105448->105449 105450 1400df91b ??3@YAXPEAX 105449->105450 105451 1400df936 ??3@YAXPEAX 105449->105451 105450->105451 105452 1400e69b0 104 API calls 105451->105452 105453 1400df95e 105452->105453 105454 1400f6470 ??3@YAXPEAX 105453->105454 105455 1400df966 ??3@YAXPEAX ??3@YAXPEAX 105454->105455 105458 1400df99d 105455->105458 105456 1400e01a0 3 API calls 105457 1400df9d9 ??3@YAXPEAX 105456->105457 105457->105435 105458->105456 105459->105368 105460->105370 105461->105376 105462->105371 105464 1400e054d _malloc_dbg 105463->105464 105465 1400e053a 105463->105465 105466 1400e056e 105464->105466 105467 1400e0573 105464->105467 105465->105399 105468 1400e05ca ??3@YAXPEAX 105466->105468 105471 1400e05fa 105466->105471 105475 1400e0330 __iob_func __iob_func __iob_func ??3@YAXPEAX 105467->105475 105476 1400e01a0 105468->105476 105471->105399 105473->105398 105474->105406 105475->105466 105477 1400e01c5 ??3@YAXPEAX 105476->105477 105477->105477 105478 1400e01da 105477->105478 105479 1400e01fe 105478->105479 105480 1400e01e3 ??3@YAXPEAX 105478->105480 105481 1400e020e ??3@YAXPEAX 105479->105481 105482 1400e0222 ??3@YAXPEAX 105479->105482 105480->105479 105481->105482 105482->105399 105483->105421 105484->105424 105491 1400deeb0 105485->105491 105486 1400def76 105486->105428 105488 1400ef4c0 GetTickCount 105488->105491 105491->105486 105491->105488 105492 1400ef3f0 WSASetLastError Sleep 105491->105492 105521 1400eac80 105491->105521 105534 1400ea6c0 69 API calls 105491->105534 105535 1400ea640 ??3@YAXPEAX 105491->105535 105492->105491 105493->105420 105494->105416 105496 1400ea4e4 105495->105496 105497 1400ea3c2 105495->105497 105496->105431 105497->105496 105498 1400ea40f 105497->105498 105603 1400dfb40 54 API calls 105497->105603 105499 1400ea436 105498->105499 105573 1400ee420 105498->105573 105604 1400fcbd0 ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX 105499->105604 105503 1400ea42d 105577 1400df7e0 105503->105577 105504 1400ea43f 105605 1400f58c0 ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX 105504->105605 105507 1400ea448 105606 1400f6160 ??3@YAXPEAX ??3@YAXPEAX 105507->105606 105509 1400ea453 105607 1400f6160 ??3@YAXPEAX ??3@YAXPEAX 105509->105607 105511 1400ea49f 105608 1400fcbd0 ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX 105511->105608 105513 1400ea45e 105513->105511 105515 1400ee420 3 API calls 105513->105515 105514 1400ea4ad 105609 1400f5560 9 API calls 105514->105609 105515->105513 105517 1400ea4bb 105610 1400f54b0 _malloc_dbg ??3@YAXPEAX ??3@YAXPEAX _malloc_dbg 105517->105610 105519 1400ea4c9 ??3@YAXPEAX 105519->105431 105520->105431 105522 1400eaf3b 105521->105522 105523 1400eacb1 105521->105523 105522->105491 105523->105522 105536 1400ec1c0 105523->105536 105525 1400ead58 _malloc_dbg 105526 1400ead6c 105525->105526 105530 1400ead87 105525->105530 105526->105491 105527 1400eacca 105527->105525 105527->105530 105533 1400eaeb8 ??3@YAXPEAX 105530->105533 105541 1400e9360 105530->105541 105531 1400eaeab 105548 1400eecb0 105531->105548 105533->105522 105534->105491 105535->105491 105537 1400ec1db 105536->105537 105538 1400ec268 105536->105538 105569 1400ef4c0 GetTickCount 105537->105569 105538->105527 105540 1400ec1e5 105540->105527 105542 1400e9435 105541->105542 105543 1400e9369 105541->105543 105542->105531 105543->105542 105570 1400fb1a0 9 API calls 105543->105570 105545 1400e93aa 105546 1400e93f5 fwrite fwrite 105545->105546 105547 1400e93c8 105545->105547 105546->105542 105547->105531 105549 1400eed02 105548->105549 105551 1400eece6 105548->105551 105550 1400ef06b 105549->105550 105552 1400eed11 WSASetLastError 105549->105552 105553 1400ef062 Sleep 105549->105553 105550->105533 105551->105549 105554 1400eed32 105551->105554 105552->105533 105553->105550 105556 1400eed4f 105554->105556 105571 1400ef4c0 GetTickCount 105554->105571 105557 1400eee95 105556->105557 105563 1400eeed8 105556->105563 105559 1400eeeb5 105557->105559 105561 1400eeeac Sleep 105557->105561 105562 1400eee9c WSASetLastError 105557->105562 105558 1400eef25 select 105560 1400eef62 WSAGetLastError 105558->105560 105566 1400eefcb 105558->105566 105559->105533 105560->105563 105561->105559 105562->105559 105563->105558 105563->105566 105572 1400ef4c0 GetTickCount 105563->105572 105565 1400ef05b 105565->105553 105566->105565 105567 1400ef011 __WSAFDIsSet 105566->105567 105568 1400ef029 __WSAFDIsSet 105566->105568 105567->105566 105567->105568 105568->105566 105569->105540 105570->105545 105571->105556 105572->105563 105574 1400ee435 105573->105574 105611 1400fca00 105574->105611 105576 1400ee455 105576->105503 105578 1400df9e2 105577->105578 105579 1400df7f2 105577->105579 105578->105499 105617 1400e9b60 105579->105617 105581 1400df7fe 105582 1400df820 105581->105582 105584 1400ea3b0 173 API calls 105581->105584 105583 1400df835 105582->105583 105661 1400f6160 ??3@YAXPEAX ??3@YAXPEAX 105582->105661 105586 1400df84b ??3@YAXPEAX 105583->105586 105587 1400df858 ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX 105583->105587 105584->105582 105586->105587 105633 1400e80b0 105587->105633 105592 1400df8f0 ??3@YAXPEAX 105593 1400df90b 105592->105593 105594 1400df91b ??3@YAXPEAX 105593->105594 105595 1400df936 ??3@YAXPEAX 105593->105595 105594->105595 105645 1400e69b0 105595->105645 105603->105497 105604->105504 105605->105507 105606->105509 105607->105513 105608->105514 105609->105517 105610->105519 105612 1400fca56 ??3@YAXPEAX 105611->105612 105614 1400fca1b 105611->105614 105612->105576 105615 1400fca51 105614->105615 105616 1400f6160 ??3@YAXPEAX ??3@YAXPEAX 105614->105616 105615->105612 105616->105614 105618 1400e9b8d 105617->105618 105624 1400e9bf6 105617->105624 105619 1400e9c00 105618->105619 105621 1400e9b91 105618->105621 105663 1400ef4c0 GetTickCount 105619->105663 105622 1400e9bcf 105621->105622 105621->105624 105625 1400e9360 11 API calls 105621->105625 105622->105624 105662 1400f63b0 ??3@YAXPEAX 105622->105662 105623 1400e9c05 105623->105624 105627 1400e9c80 105623->105627 105628 1400e9c8c 105623->105628 105624->105581 105625->105622 105664 1400eb010 _malloc_dbg ??3@YAXPEAX _malloc_dbg 105627->105664 105665 1400eb010 _malloc_dbg ??3@YAXPEAX _malloc_dbg 105628->105665 105631 1400e9c94 105631->105624 105632 1400e9360 11 API calls 105631->105632 105632->105624 105634 1400df8a3 ??3@YAXPEAX ??3@YAXPEAX 105633->105634 105636 1400e80c7 105633->105636 105639 1400e84f0 105634->105639 105635 1400e81af ??3@YAXPEAX 105635->105634 105636->105634 105636->105635 105637 1400e81a5 105636->105637 105638 1400e8126 6 API calls 105636->105638 105637->105635 105638->105636 105640 1400df8d3 ??3@YAXPEAX 105639->105640 105642 1400e8503 105639->105642 105640->105592 105640->105593 105641 1400e854e ??3@YAXPEAX 105641->105640 105642->105641 105644 1400e8549 105642->105644 105666 1400e7390 ??3@YAXPEAX ??3@YAXPEAX 105642->105666 105644->105641 105646 1400e69c9 105645->105646 105647 1400e6a17 105645->105647 105648 1400e69d8 105646->105648 105667 1400e6750 97 API calls 105646->105667 105653 1400e6a2c 105647->105653 105669 1400e7390 ??3@YAXPEAX ??3@YAXPEAX 105647->105669 105668 1400e6a90 27 API calls 105648->105668 105652 1400df95e 105658 1400f6470 105652->105658 105653->105652 105670 1400e5f50 11 API calls 105653->105670 105654 1400e69fb 105654->105653 105656 1400e9360 11 API calls 105654->105656 105657 1400e6a15 105656->105657 105657->105653 105671 140107760 ??3@YAXPEAX 105658->105671 105660 1400f6485 105661->105583 105662->105622 105663->105623 105664->105624 105665->105631 105666->105642 105667->105648 105668->105654 105669->105653 105670->105652 105671->105660 105672->105439 105673 14004ca50 105691 140072250 RtlAcquirePebLock 105673->105691 105675 14004ca98 105676 14004cab6 CreateFileW 105675->105676 105677 14004cafb 105675->105677 105685 14004cc4d 105675->105685 105687 14004cbb7 105676->105687 105679 14004cb42 105677->105679 105680 14004cb00 105677->105680 105683 14004cb5f CreateFileW 105679->105683 105684 14004cb5b 105679->105684 105679->105687 105681 14004cb17 CreateFileW 105680->105681 105682 14004cb13 105680->105682 105681->105687 105682->105681 105686 14004cb8d CreateFileW 105683->105686 105683->105687 105684->105683 105686->105687 105687->105685 105688 14004cbf9 105687->105688 105689 14004cbe1 RtlAllocateHeap 105687->105689 105688->105685 105690 14004cc36 SetFilePointer 105688->105690 105689->105688 105690->105685 105692 140072278 105691->105692 105693 14007228b 105691->105693 105700 140072ce0 RtlAllocateHeap 105692->105700 105694 140072291 RtlReAllocateHeap 105693->105694 105695 1400722ba 105693->105695 105694->105695 105697 1400722d5 RtlAllocateHeap 105695->105697 105698 140072286 RtlLeaveCriticalSection 105695->105698 105697->105698 105698->105675 105700->105698 105701 14004b14c 105702 14004b158 105701->105702 105703 14004b184 RtlAllocateHeap _wcsdup _wcsdup 105702->105703 105704 14004b205 105702->105704 105705 14004b1c8 CreateThread 105703->105705 105706 14004b20a 105703->105706 105708 14004b1f2 CloseHandle 105705->105708 105709 14004b1fd 105705->105709 105707 14004b23c 262 API calls 105706->105707 105707->105709 105708->105709 105709->105704 105711 14004b4a0 ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX HeapFree 105709->105711 105712 1400524d8 105713 140052519 GetWindowLongPtrW CallWindowProcW 105712->105713 105714 1400524fc SetWindowPos 105712->105714 105714->105713 105715 1400cec20 105716 1400cec2e 105715->105716 105717 1400cec40 105715->105717 105716->105717 105718 1400cec44 _malloc_dbg 105716->105718 105718->105717 105719 1400240d7 105723 140024076 105719->105723 105720 1400240a3 105853 140072e00 GetLastError TlsGetValue SetLastError 105720->105853 105722 1400240fd 105854 140072e00 GetLastError TlsGetValue SetLastError 105722->105854 105723->105720 105725 140024091 105723->105725 105726 1400240ce 105723->105726 105852 14004b474 ??3@YAXPEAX ??3@YAXPEAX ??3@YAXPEAX HeapFree 105725->105852 105730 140073280 HeapFree 105726->105730 105728 140024111 105855 14004ba80 105728->105855 105732 140024667 105730->105732 105734 140073280 HeapFree 105732->105734 105733 140072e50 3 API calls 105735 140024130 105733->105735 105736 140024679 105734->105736 105738 14002413b GetTempFileNameW 105735->105738 105737 140073280 HeapFree 105736->105737 105739 14002468b 105737->105739 105864 140072e00 GetLastError TlsGetValue SetLastError 105738->105864 105741 140024168 105865 140072e00 GetLastError TlsGetValue SetLastError 105741->105865 105743 14002417c 105866 1400716b0 105743->105866 105746 140072e50 3 API calls 105747 1400241a0 105746->105747 105872 14004bb28 105747->105872 105753 1400241d2 105883 140072e00 GetLastError TlsGetValue SetLastError 105753->105883 105755 1400241e6 105756 140072e50 3 API calls 105755->105756 105757 14002420c 105756->105757 105884 140072e00 GetLastError TlsGetValue SetLastError 105757->105884 105759 140024225 105885 140072e00 GetLastError TlsGetValue SetLastError 105759->105885 105761 140024246 105762 140073020 4 API calls 105761->105762 105763 140024255 105762->105763 105764 140073020 4 API calls 105763->105764 105765 140024267 105764->105765 105886 1400730c0 TlsGetValue 105765->105886 105767 140024271 105887 14003f690 105767->105887 105769 140024286 105898 140072e00 GetLastError TlsGetValue SetLastError 105769->105898 105771 1400242a4 105899 140072e00 GetLastError TlsGetValue SetLastError 105771->105899 105773 1400242c2 105774 140073020 4 API calls 105773->105774 105775 1400242d1 105774->105775 105776 140073020 4 API calls 105775->105776 105777 1400242e3 105776->105777 105900 140073220 TlsGetValue 105777->105900 105779 1400242ec 105901 1400730c0 TlsGetValue 105779->105901 105781 1400242f7 105902 140046efc RtlAcquirePebLock RtlReAllocateHeap RtlAllocateHeap RtlLeaveCriticalSection RtlAllocateHeap 105781->105902 105783 14002430d 105851 140024618 105783->105851 105903 140046f9c RtlAcquirePebLock RtlLeaveCriticalSection 105783->105903 105786 140024649 105786->105726 105787 1400243fa 105909 140046d64 RtlAcquirePebLock RtlLeaveCriticalSection 105787->105909 105790 140024405 105910 140072e00 GetLastError TlsGetValue SetLastError 105790->105910 105792 14002440f 105911 140072e00 GetLastError TlsGetValue SetLastError 105792->105911 105794 140072e00 GetLastError TlsGetValue SetLastError 105811 140024335 105794->105811 105795 140024428 105796 140073020 4 API calls 105795->105796 105798 140024437 105796->105798 105797 140073020 4 API calls 105797->105811 105799 140073020 4 API calls 105798->105799 105800 14002444e 105799->105800 105912 1400730c0 TlsGetValue 105800->105912 105802 140024458 105913 1400231be 105802->105913 105805 14002446a 105925 140072e00 GetLastError TlsGetValue SetLastError 105805->105925 105809 14002448d 105926 140072e00 GetLastError TlsGetValue SetLastError 105809->105926 105811->105787 105811->105794 105811->105797 105904 140046fc8 RtlAcquirePebLock RtlLeaveCriticalSection 105811->105904 105905 140046ff4 RtlAcquirePebLock RtlLeaveCriticalSection 105811->105905 105906 140073220 TlsGetValue 105811->105906 105907 1400730c0 TlsGetValue 105811->105907 105908 140047060 RtlAcquirePebLock RtlLeaveCriticalSection 105811->105908 105813 1400244a1 105927 140072e00 GetLastError TlsGetValue SetLastError 105813->105927 105815 1400244b1 105928 140072e00 GetLastError TlsGetValue SetLastError 105815->105928 105817 1400244c1 105929 1400717c0 6 API calls 105817->105929 105819 1400244e7 105930 1400730c0 TlsGetValue 105819->105930 105821 1400244f1 105931 1400702f0 TlsGetValue RtlReAllocateHeap RtlReAllocateHeap TlsGetValue TlsGetValue 105821->105931 105823 140024504 105824 140072e50 3 API calls 105823->105824 105825 140024513 105824->105825 105825->105851 105932 140072e00 GetLastError TlsGetValue SetLastError 105825->105932 105827 14002453f 105933 140072e00 GetLastError TlsGetValue SetLastError 105827->105933 105829 140024553 105934 140072e00 GetLastError TlsGetValue SetLastError 105829->105934 105831 140024563 105935 140072e00 GetLastError TlsGetValue SetLastError 105831->105935 105833 140024573 105936 140072e00 GetLastError TlsGetValue SetLastError 105833->105936 105835 140024588 105937 140072e00 GetLastError TlsGetValue SetLastError 105835->105937 105837 14002459c 105938 140070e90 10 API calls 105837->105938 105839 1400245bc 105939 1400730c0 TlsGetValue 105839->105939 105841 1400245c6 105940 140070470 TlsGetValue RtlReAllocateHeap RtlReAllocateHeap TlsGetValue TlsGetValue 105841->105940 105843 1400245db 105941 1400730c0 TlsGetValue 105843->105941 105845 1400245e5 105942 1400702f0 TlsGetValue RtlReAllocateHeap RtlReAllocateHeap TlsGetValue TlsGetValue 105845->105942 105847 1400245f8 105848 140072e50 3 API calls 105847->105848 105849 140024607 105848->105849 105850 1400732b0 wcscmp 105849->105850 105850->105851 105943 14004c42c 28 API calls 105851->105943 105852->105720 105853->105722 105854->105728 105856 140073360 3 API calls 105855->105856 105857 14004baa7 GetTempPathW LoadLibraryW 105856->105857 105858 14004bacf GetProcAddress 105857->105858 105859 14004bafa 105857->105859 105860 14004baf1 FreeLibrary 105858->105860 105861 14004bae4 GetLongPathNameW 105858->105861 105944 1400734a0 TlsGetValue 105859->105944 105860->105859 105861->105860 105863 140024121 105863->105733 105864->105741 105865->105743 105867 1400716d0 105866->105867 105868 140073360 3 API calls 105867->105868 105869 1400716e4 105868->105869 105870 140024191 105869->105870 105871 1400716eb memcpy 105869->105871 105870->105746 105871->105870 105873 14004bb30 105872->105873 105874 1400241b4 PathAddBackslashW 105873->105874 105875 14004bb43 SetFileAttributesW 105873->105875 105876 14004bb4e DeleteFileW 105873->105876 105877 14004bb64 105874->105877 105875->105876 105876->105874 105878 14004bb74 wcsncpy wcslen 105877->105878 105879 1400241c8 105877->105879 105880 14004bbda CreateDirectoryW 105878->105880 105881 14004bbac 105878->105881 105882 140072e00 GetLastError TlsGetValue SetLastError 105879->105882 105880->105879 105881->105880 105882->105753 105883->105755 105884->105759 105885->105761 105886->105767 105945 1400731b0 105887->105945 105889 14003f6c0 105948 14004cca0 105889->105948 105891 14003f6d4 105897 14003f705 105891->105897 105956 14004d6e0 105891->105956 105893 140073280 HeapFree 105895 14003f73e 105893->105895 105894 14003f6f6 105965 14004c930 105894->105965 105895->105769 105897->105893 105898->105771 105899->105773 105900->105779 105901->105781 105902->105783 105903->105811 105904->105811 105906->105811 105907->105811 105908->105811 105909->105790 105910->105792 105911->105795 105912->105802 105914 1400731b0 2 API calls 105913->105914 105916 1400231e4 105914->105916 105915 140023253 105918 140073280 HeapFree 105915->105918 105916->105915 105996 14004d770 WriteFile GetFileSize RtlAcquirePebLock RtlLeaveCriticalSection 105916->105996 105920 14002326c 105918->105920 105919 140023216 105921 140023225 105919->105921 105922 140023249 105919->105922 105920->105805 105997 14004d000 9 API calls 105921->105997 105923 14004c930 7 API calls 105922->105923 105923->105915 105925->105809 105926->105813 105927->105815 105928->105817 105929->105819 105930->105821 105931->105823 105932->105827 105933->105829 105934->105831 105935->105833 105936->105835 105937->105837 105938->105839 105939->105841 105940->105843 105941->105845 105942->105847 105943->105786 105944->105863 105946 1400731c6 wcslen RtlAllocateHeap 105945->105946 105947 140073211 105945->105947 105946->105947 105947->105889 105949 140072250 5 API calls 105948->105949 105950 14004cccc 105949->105950 105951 14004ccd8 CreateFileW 105950->105951 105952 14004cd65 105950->105952 105953 14004cd0f CreateFileW 105951->105953 105954 14004cd3d 105951->105954 105952->105891 105953->105952 105953->105954 105954->105952 105955 14004cd4d RtlAllocateHeap 105954->105955 105955->105952 105957 14004d754 105956->105957 105958 14004d700 105956->105958 105957->105894 105958->105957 105959 1400721f0 2 API calls 105958->105959 105960 14004d714 105959->105960 105960->105957 105961 14004d725 105960->105961 105962 14004d741 WriteFile 105960->105962 105978 14004d980 105961->105978 105962->105957 105964 14004d72d 105964->105894 105966 14004c93f 105965->105966 105967 14004c950 105965->105967 105969 14007217d 105966->105969 105994 140072b24 RtlAcquirePebLock 105966->105994 105968 1400721f0 2 API calls 105967->105968 105971 14004c964 105968->105971 105969->105897 105972 14004c98e CloseHandle 105971->105972 105973 14004c9c0 WriteFile 105971->105973 105974 14004c9a6 105971->105974 105972->105974 105976 14004c97b HeapFree 105973->105976 105974->105897 105976->105972 105977 140072161 105977->105969 105995 140072ab8 RtlLeaveCriticalSection 105977->105995 105979 14004d9a4 105978->105979 105980 14004dabe 105978->105980 105981 14004d9d3 105979->105981 105982 14004d9aa SetFilePointer 105979->105982 105980->105964 105983 14004da5f 105981->105983 105985 14004d9de 105981->105985 105982->105981 105991 14004c9c0 105983->105991 105987 14004da17 105985->105987 105988 14004d9f9 memcpy 105985->105988 105986 14004da67 105989 14004da71 WriteFile 105986->105989 105990 14004da99 memcpy 105986->105990 105987->105964 105988->105964 105989->105964 105990->105964 105992 14004ca04 105991->105992 105993 14004c9d4 WriteFile 105991->105993 105992->105986 105993->105986 105994->105977 105995->105977 105996->105919 105997->105922 105998 140051e94 IsDlgButtonChecked 105999 140051ede GetWindowRect 105998->105999 106000 140051ef9 105998->106000 106021 14005f77c 105999->106021 106008 140050890 106000->106008 106006 140051f38 IsDlgButtonChecked 106007 140051f4c 106006->106007 106009 1400508d2 GetWindowRect GetParent MapWindowPoints 106008->106009 106010 1400508be 106008->106010 106011 1400508ff 106009->106011 106010->106009 106010->106011 106012 14005f8b4 floor 106011->106012 106013 140050931 106011->106013 106012->106013 106014 140050990 106013->106014 106015 14005f8b4 floor 106013->106015 106016 1400509bd MoveWindow InvalidateRect 106014->106016 106015->106016 106017 140050a08 106016->106017 106018 1400509f4 RedrawWindow 106016->106018 106019 140050a23 106017->106019 106020 140050a0d IsDlgButtonChecked 106017->106020 106018->106019 106024 14005f8b4 106019->106024 106020->106019 106022 14005f7a4 106021->106022 106023 14005f789 ceil 106021->106023 106022->106000 106023->106022 106025 14005f8c1 floor 106024->106025 106026 140051f1d IsDlgButtonChecked 106024->106026 106025->106026 106026->106006 106026->106007 106027 140057e94 106028 140071fb4 _raise_exc 14 API calls 106027->106028 106029 140057ebf 106028->106029 106030 140057ec4 106029->106030 106031 140057f09 106029->106031 106040 14005a4a4 25 API calls _raise_exc 106030->106040 106033 140057f0e GetWindowLongPtrW 106031->106033 106034 140057ed9 CallWindowProcW 106031->106034 106037 140057f44 NtdllDefWindowProc_W 106033->106037 106038 140057f24 GetClientRect FillRect 106033->106038 106036 140057ef4 106034->106036 106035 140057ece 106041 14005a4a4 25 API calls _raise_exc 106035->106041 106037->106036 106038->106036 106040->106035 106041->106034 106042 14004f714 106043 14004f71d ValidateRect 106042->106043 106044 14004f729 CallWindowProcW 106042->106044 106045 14004f744 106043->106045 106044->106045 106046 7ffdff22faa8 106048 7ffdff22face 106046->106048 106047 7ffdff22fb0b 106055 7ffdff22fad6 106047->106055 106100 7ffdff1e9378 22 API calls 106047->106100 106048->106047 106048->106055 106058 7ffdff22f96c 106048->106058 106051 7ffdff22fb24 106052 7ffdff22fb4d 106051->106052 106101 7ffdff1e9378 22 API calls 106051->106101 106053 7ffdff22f96c 128 API calls 106052->106053 106052->106055 106053->106055 106056 7ffdff22fb40 106057 7ffdff22f96c 128 API calls 106056->106057 106057->106052 106059 7ffdff22f9f9 106058->106059 106060 7ffdff22f97a 106058->106060 106062 7ffdff22fa36 106059->106062 106066 7ffdff22f9fd 106059->106066 106102 7ffdff234010 HeapCreate 106060->106102 106063 7ffdff22fa91 106062->106063 106064 7ffdff22fa3b 106062->106064 106086 7ffdff22f985 106063->106086 106191 7ffdff230f4c 49 API calls 106063->106191 106178 7ffdff232a80 106064->106178 106066->106086 106187 7ffdff233988 48 API calls free 106066->106187 106072 7ffdff22fa2a 106076 7ffdff230c90 50 API calls 106072->106076 106074 7ffdff22fa5b FlsSetValue 106077 7ffdff22fa71 106074->106077 106078 7ffdff22fa87 106074->106078 106079 7ffdff22fa2f 106076->106079 106189 7ffdff230cb8 47 API calls 3 library calls 106077->106189 106190 7ffdff22fd4c 47 API calls 2 library calls 106078->106190 106188 7ffdff23405c HeapDestroy 106079->106188 106085 7ffdff22fa78 GetCurrentThreadId 106085->106086 106086->106047 106100->106051 106101->106056 106103 7ffdff234034 HeapSetInformation 106102->106103 106104 7ffdff22f981 106102->106104 106103->106104 106104->106086 106105 7ffdff230f8c 106104->106105 106192 7ffdff232f38 106105->106192 106179 7ffdff232aa5 106178->106179 106181 7ffdff22fa4f 106179->106181 106182 7ffdff232ac3 Sleep 106179->106182 106297 7ffdff236340 106179->106297 106181->106074 106181->106086 106182->106179 106182->106181 106187->106072 106188->106086 106189->106085 106190->106086 106191->106086 106202 7ffdff230c7c EncodePointer 106192->106202 106298 7ffdff236387 malloc 106297->106298 106299 7ffdff236355 106297->106299 106302 7ffdff23639f RtlAllocateHeap 106298->106302 106305 7ffdff236383 106298->106305 106299->106298 106300 7ffdff236363 106299->106300 106306 7ffdff232324 47 API calls _errno 106300->106306 106302->106298 106302->106305 106303 7ffdff236368 106307 7ffdff232254 9 API calls 2 library calls 106303->106307 106305->106179 106306->106303 106307->106305 106308 140052f20 106310 140052f46 106308->106310 106309 140052f5b CallWindowProcW 106310->106309 106312 14005a520 25 API calls 106310->106312 106312->106309 106313 14005621c 106314 140056242 106313->106314 106315 140056270 106313->106315 106316 140056257 RemovePropW 106314->106316 106317 140056247 106314->106317 106318 140056277 RemovePropW 106315->106318 106316->106318 106319 14005627d CallWindowProcW 106317->106319 106322 14005a520 25 API calls 106317->106322 106318->106319 106321 140056255 106321->106319 106322->106321 106323 14005aa9c RtlAllocateHeap RtlAllocateHeap 106324 14005aba6 GetSystemMetrics GetSystemMetrics 106323->106324 106325 14005ab03 CreateDCW 106323->106325 106330 14005abda 106324->106330 106325->106324 106326 14005ab24 CreateCompatibleDC 106325->106326 106327 14005ab34 GetSystemMetrics GetSystemMetrics 106326->106327 106328 14005ab9d DeleteDC 106326->106328 106336 14005a6ec CreateCompatibleBitmap SelectObject GetStockObject FillRect 106327->106336 106328->106324 106332 14005abf5 GetSystemMetrics GetSystemMetrics 106330->106332 106334 14005ac1d 106330->106334 106331 14005ab5d GetSystemMetrics GetSystemMetrics 106337 14005a6ec CreateCompatibleBitmap SelectObject GetStockObject FillRect 106331->106337 106332->106334 106335 14005ab8d DeleteDC 106335->106328 106336->106331 106337->106335

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1482 140001000-1400011b7 call 140042000 call 140042006 call 14004200c call 140072d90 call 140071cf4 call 140071640 call 14006fa60 call 14006cf64 call 14006c430 call 14006ba0c call 14006a114 call 14006928c call 1400674a4 call 1400670cc call 14005f3cc call 14005e9ac call 14005df94 call 14005be44 call 14004f3e4 call 14004e288 OleInitializeWOW call 14004b91c call 1400497d4 call 140047704 call 140046dc4 call 140045120 call 140044638 call 140043c34 call 140042eb8 call 140042b14 call 140042364 call 1400663fc call 140065838 call 14006409c call 1400601f0 call 14004a8b0 call 14004b010 call 1400462ac call 140046080 call 140042012 call 140042018 call 140049888 1565 140001235-140002afe call 140072f30 call 140072e00 call 140073020 * 3 call 140072e50 call 140072f30 * 2 call 140072e00 call 140073020 * 3 call 140072e50 call 140072f30 * 32 GetDesktopWindow GetDC GetDeviceCaps call 140072f30 * 9 call 14006fe60 call 140071660 call 140072f30 * 60 call 140072e00 call 140073020 * 2 call 140072e50 call 140072f30 * 10 call 140072e00 call 140073020 * 2 call 140072e50 call 140072e00 call 140073020 * 2 call 140072e50 call 140072e00 call 140073020 * 2 call 140072e50 call 140072e00 call 140073020 call 140072e50 call 140072f30 * 12 call 140072e00 * 2 call 140066510 call 140072e50 call 140072f30 * 2 call 140072e00 call 140073020 call 140072e50 call 140072f30 * 2 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14005e9d8 * 11 call 140067108 * 7 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 14006a220 call 14006a140 call 140072f30 call 140067108 call 140072f30 * 27 call 14004b5ec GetDesktopWindow GetDC GetDeviceCaps 1482->1565 1566 1400011b9-1400011ed call 140072e00 * 2 call 14006fe00 1482->1566 2054 140002b0c-140002b17 1565->2054 2055 140002b00-140002b0a 1565->2055 1577 1400011f2-140001230 call 140072e50 call 140049910 call 140049774 1566->1577 1577->1565 2057 140002b25-140002b30 2054->2057 2058 140002b19-140002b23 2054->2058 2056 140002b48-140003a7b call 140072f30 * 5 call 140039637 call 1400471b0 call 14000d073 call 140072e00 call 140073020 * 2 call 140072e50 call 140072e00 call 140073020 * 2 call 140072e50 call 140072e00 call 140073020 * 2 call 140072e50 call 140072e00 call 140073020 * 2 call 140072e50 call 140072e00 call 140073020 * 2 call 140072e50 PathAddBackslashW call 140072e00 * 2 call 14004ba80 call 140072e50 call 140071660 GetTempFileNameW call 140072e00 * 2 call 1400716b0 call 140072e50 call 140071720 call 14004bb28 PathAddBackslashW call 14004bb64 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 140072e00 call 140073020 * 4 call 140072e50 call 14003f690 call 140022781 call 14002ba02 call 14001dd11 call 14002a6a7 2055->2056 2418 140003a80-140004087 call 14003884f call 14003d112 call 140023278 call 1400692b0 * 38 call 140069470 * 3 call 1400692b0 call 140072e00 * 3 call 140039486 call 1400730c0 call 14006ff00 call 140040ff4 call 140072e00 * 3 call 140039486 call 1400730c0 call 14006ff00 call 140040ff4 2056->2418 2059 140002b32-140002b3c 2057->2059 2060 140002b3e 2057->2060 2058->2056 2059->2056 2060->2056 2537 14000408e call 140038b04 2418->2537 2538 140004093-1400040eb call 1400040b5 call 140072dd0 HeapDestroy ExitProcess call 140042ac4 call 140045104 call 140046db8 call 140047390 call 1400497c8 call 14004b5ac call 14004b904 call 14004bbfc call 14004ca10 OleUninitialize call 14004f380 2537->2538 2563 1400040f0-140004121 call 14005be14 call 14005df68 call 14005f3b0 call 140069280 call 14006b9fc call 14006fa90 call 140071dbc call 140071f6c call 140071630 2538->2563
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$Allocate$AddressProc$FreeLoad$Library$Create$CapsDeviceInitializePathmemset$ByteCharDeleteFileMultiObjectValueWideWindow$AllocBackslashCriticalDesktopDestroyErrorIconLastNameRegisterSectionTempwcslen$AttributesClassClipboardCursorDirectoryExitFontFormatInfoLongProcessReleaseStartupUninitializememcpywcsncpy
                                                                            • String ID: = $%b2eprogramfilename%$&x=1$(n.n.n.n)$*.*$*.* (*.*)|*.*$--lzma --best $...$/b2e/downloads/v.zip$1 VERSIONINFO $2019-07-30$3.2$@call:extd$@set $BAT (*.bat)|*.bat;*.bat|CMD (*.cmd)|*.cmd;*.cmd$BAT (*.bat)|*.bat;*.bat|CMD (*.cmd)|*.cmd;*.cmd|Session (*.session)|*.session;*.session$Bat To Exe Converter$Bat To Exe Online Converter$CMD Tools$Codepage$Consolas$Courier$Deutsch (German)$Directory * does not exist$EXE (*.exe)|*.exe$English$Exe To Bat$File * not found$Franais (French)$Github$GoLink.exe$GoRC.exe$ICO (*.ico)|*.ico$Image To Icon Converter$Incorrect command line$Italiano (Italian)$Japanese Shift-JIS$Korean Johab$Korean Unified Hangul Code$Magyar (Hungarian)$Nederlands (Dutch)$Password prompt*Please enter the correct password to continue:*Wrong password$Portugus Brasileiro (Portuguese Brazilian)$Scilexer.dll$Session (*.session)|*.session$Simplified Chinese GBK$Traditional Chinese Big5$UTF-8$Verdana$ZeroNet$\\StringFileInfo\\$\\StringFileInfo\\040904E4\\$\\VarFileInfo\\Translation$_9999$_wfullpath$attributes$b2e$b2e.tmp$b2eextd$b2etempfile$b80605434f3c0bb515408f6f0edcdd13$bat$cmd$comments$company$copyright$count$delonexit$description$display$donate$edir$editorfont$editorfontsize$exe$extd$extd.chm$files.ini$fileversion$font$fontsize$fontstyle$format$http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/$http://www.godevtool.com$http://www.godevtool.com/GolinkFrame.htm$http://www.godevtool.com/GorcFrame.htm$https://github.com/99fk$https://upx.github.io$https://upx.github.io/upx-license.html$https://www.everaldo.com/$https://www.scintilla.org/$https://www.scintilla.org/License.txt$icon$include$internalfilename$lang$lastfiles$lng$method$msvcrt.dll$originalfilename$overwrite$packer$password$privatebuild$productname$productversion$resource.exe$resource.rc$resource.res$save$session$session.ini$settings.ini$specialbuild$trademark$uac$upx.exe$useicon$usepassword$vinfo$wdir$0 = 32 Bit1 = 64 Bit2 = Een bestand met dezelfde naam is al geopend.3 = Een nieuwere versie kan gedownload worden.4 = Over5 = Over...6 = Toevoegen7 = Voeg bestanden en mappen toe die u in uw exe-bestand wil insluiten.8 = Icon toevoegen$0 = 32 1 = 64 2 = 3 = 4 = 5 = $0 = 32 1 = 64 2 = 3 = 4 = 5 = $0 = 32 1 = 64 2 = .3 =
                                                                            • API String ID: 3914532251-510742641
                                                                            • Opcode ID: abe88015203d56ed36c4a046761f0f5474ef6f78783db1ab7499cbd515e2dff1
                                                                            • Instruction ID: a1a737bb9e7fde856bcd06934ef0d572b52eb744c8e9f57cbaaacb1175981cec
                                                                            • Opcode Fuzzy Hash: abe88015203d56ed36c4a046761f0f5474ef6f78783db1ab7499cbd515e2dff1
                                                                            • Instruction Fuzzy Hash: FE2309B1B2190098FA03BB67ED963EA1621A79CBC4F904535BB0D4B7B7DE3CC1568781
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 2582 140059267-14005929c 2583 1400592a2-1400592a5 2582->2583 2584 14005952e-14005953c GetParent call 14005a4a4 2582->2584 2586 1400594ea-14005952c GetParent GetUpdateRect MapWindowPoints InvalidateRect 2583->2586 2587 1400592ab-1400592ae 2583->2587 2588 140059541-140059556 CallWindowProcW 2584->2588 2586->2588 2589 1400592b4-1400592b9 2587->2589 2590 1400594da-1400594e1 2587->2590 2592 14005955c-140059578 2588->2592 2593 1400592f8-1400592ff 2589->2593 2594 1400592bb-1400592be 2589->2594 2590->2588 2591 1400594e3-1400594e8 2590->2591 2591->2592 2593->2588 2595 140059305-14005932a GetClassNameW _wcsicmp 2593->2595 2594->2593 2596 1400592c0-1400592c5 2594->2596 2597 140059358-14005938b NtdllDefWindowProc_W CallWindowProcW 2595->2597 2598 14005932c-14005933e _wcsicmp 2595->2598 2596->2588 2599 1400592cb-1400592d2 2596->2599 2597->2588 2601 140059391-1400593b5 SetBkMode call 140071fb4 2597->2601 2598->2597 2600 140059340-140059352 _wcsicmp 2598->2600 2599->2588 2602 1400592d8-1400592df 2599->2602 2600->2588 2600->2597 2606 1400593b7 DeleteObject 2601->2606 2607 1400593bd-14005940c GetParent GetClientRect GetWindowRect ScreenToClient * 2 CreateCompatibleDC 2601->2607 2602->2588 2604 1400592e5-1400592f3 2602->2604 2604->2592 2606->2607 2609 140059412-140059428 CreateCompatibleBitmap 2607->2609 2610 1400594d1-1400594d5 2607->2610 2611 1400594c8-1400594cb DeleteDC 2609->2611 2612 14005942e-1400594c2 SelectObject CreateWindowExW DestroyWindow CreateBrushIndirect DeleteObject 2609->2612 2610->2592 2611->2610 2612->2611
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$CreateRect$ClientDeleteObjectParent_wcsicmp$CallCompatibleProcScreen$BitmapBrushClassDestroyIndirectInvalidateModeNameNtdllPointsProc_SelectUpdate
                                                                            • String ID: STATIC$button$msctls_trackbar32$static
                                                                            • API String ID: 1446471921-3385832338
                                                                            • Opcode ID: caf1627c4eec0285cad871bf6b9a161c2e5edae6a8d33164866596f98c95c671
                                                                            • Instruction ID: 658ba7a2724baf115e960d496c5c2b151a09405456175dc92f309caa3d01d9a0
                                                                            • Opcode Fuzzy Hash: caf1627c4eec0285cad871bf6b9a161c2e5edae6a8d33164866596f98c95c671
                                                                            • Instruction Fuzzy Hash: 66812775310A418AFB16DF27E958BE867A1B74DBC8F444025EE0A57BB8DF39C949CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Prop$Window$LongRemove$HeapRectValue$AcceleratorAdjustAllocateChildClassDeleteDestroyDragDropEnumFreeObjectParentRevokeTableUnregisterWindows
                                                                            • String ID: PB_DropAccept$PB_Focus$PB_WindowID$WindowClass_%I64d
                                                                            • API String ID: 165210820-3545793471
                                                                            • Opcode ID: 08f565460399752b6f029ff1de711b9bb46fbb3b2db891c088fcb8ad64e78e01
                                                                            • Instruction ID: 8d0fb6a0b4315c38fe2879c529041f097c5000b754124243fd5d7eecf97aa347
                                                                            • Opcode Fuzzy Hash: 08f565460399752b6f029ff1de711b9bb46fbb3b2db891c088fcb8ad64e78e01
                                                                            • Instruction Fuzzy Hash: C4028B3520564486FB7ADB67A954BE977A1FB8DBC4F444027AF0A07BF4EA3AC6448301
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: State$Message$ByteCharClientContextInfoMultiParametersScreenSystemTimeWideWindow$ChildCountCtrlCursorDragDropFocusMultipleObjectsPostProcRegisterReleaseTickUnicodeWait
                                                                            • String ID:
                                                                            • API String ID: 498337836-0
                                                                            • Opcode ID: 62c81bc4dd386dcafd3e2b56fbedac2edf3f562c4a80de3ff49f12db06bf8903
                                                                            • Instruction ID: b0b0aca75606f33c621fa605cf29010ba9e09b7af07a01f2f76a28fe89970dd2
                                                                            • Opcode Fuzzy Hash: 62c81bc4dd386dcafd3e2b56fbedac2edf3f562c4a80de3ff49f12db06bf8903
                                                                            • Instruction Fuzzy Hash: F792BF23F1C18286EB689B298574ABD63A1BB85B44F944331D97E976DDCF3CF8418B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3177 1400451e8-14004526f call 140071fb4 call 1400457b0 CreateFileW 3183 140045275-1400452a1 CreateFileW 3177->3183 3184 14004531f-14004533f GetFileSize 3177->3184 3185 1400452a3-1400452c8 CreateFileW 3183->3185 3186 1400452cb-1400452d3 3183->3186 3187 140045341-14004535d ReadFile 3184->3187 3188 14004539f-1400453a2 3184->3188 3185->3186 3186->3184 3191 1400452d5-140045309 wcslen RtlAllocateHeap 3186->3191 3192 14004535f-140045374 call 140042162 3187->3192 3193 14004538a-14004539b SetFilePointer 3187->3193 3189 1400453a8-1400453b9 3188->3189 3190 14004544f-140045456 3188->3190 3194 14004548f-14004549c RtlAllocateHeap 3189->3194 3195 1400453bf-1400453cb RtlAllocateHeap 3189->3195 3197 14004560c-140045626 3190->3197 3198 14004545c-14004547a 3190->3198 3196 14004530f-14004531a wcscpy 3191->3196 3191->3197 3192->3193 3208 140045376-140045388 3192->3208 3193->3188 3201 14004544b 3194->3201 3204 14004549e-1400454bf ReadFile 3194->3204 3200 1400453cd-1400453ef RtlAllocateHeap 3195->3200 3195->3201 3196->3197 3198->3197 3202 140045480-140045483 3198->3202 3200->3201 3205 1400453f1-140045445 ReadFile call 1400734e0 HeapFree 3200->3205 3201->3190 3206 140045485-140045488 3202->3206 3207 14004548a-14004548d 3202->3207 3204->3190 3205->3201 3206->3207 3210 1400454c1-1400454c5 3206->3210 3207->3202 3208->3188 3212 1400454c7-1400454cd 3210->3212 3213 14004550b-14004550d 3210->3213 3214 1400454d2-1400454ea call 140045628 3212->3214 3215 1400454cf 3212->3215 3216 14004556f-140045572 3213->3216 3217 14004550f-140045527 call 140045628 3213->3217 3228 140045501-140045504 3214->3228 3215->3214 3219 1400455f8-1400455fb 3216->3219 3220 140045578-14004557b 3216->3220 3230 14004553c-14004553f 3217->3230 3222 1400455f5 3219->3222 3223 1400455fd-140045600 3219->3223 3220->3219 3225 14004557d-140045580 3220->3225 3222->3219 3223->3222 3227 140045602-140045606 3223->3227 3229 14004559f-1400455a1 3225->3229 3227->3197 3227->3202 3233 140045506 3228->3233 3234 1400454ec-1400454ef 3228->3234 3235 140045582-140045584 3229->3235 3236 1400455a3-1400455a7 3229->3236 3231 140045541-140045544 3230->3231 3232 140045529-14004552d 3230->3232 3238 1400455f2 3231->3238 3239 14004554a-14004554d 3231->3239 3232->3239 3243 14004552f-140045532 3232->3243 3233->3238 3234->3238 3240 1400454f5-1400454f8 3234->3240 3241 140045586-140045598 3235->3241 3242 14004559a-14004559d 3235->3242 3237 1400455b6-1400455b9 3236->3237 3244 1400455a9-1400455ac 3237->3244 3245 1400455bb 3237->3245 3238->3222 3246 140045561-140045568 3239->3246 3240->3238 3247 1400454fe 3240->3247 3241->3236 3241->3242 3242->3229 3243->3231 3248 140045534-140045537 3243->3248 3250 1400455b3 3244->3250 3251 1400455ae-1400455b1 3244->3251 3252 1400455bf-1400455c5 3245->3252 3253 14004554f-140045552 3246->3253 3254 14004556a 3246->3254 3247->3228 3248->3231 3249 140045539 3248->3249 3249->3230 3250->3237 3251->3245 3251->3250 3252->3252 3256 1400455c7-1400455ca 3252->3256 3253->3222 3255 140045558-14004555b 3253->3255 3254->3219 3255->3219 3255->3246 3256->3252 3257 1400455cc-1400455de call 140045628 3256->3257 3260 1400455ed-1400455f0 3257->3260 3260->3238 3261 1400455e0-1400455e3 3260->3261 3261->3238 3262 1400455e5-1400455e8 3261->3262 3262->3238 3263 1400455ea 3262->3263 3263->3260
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Heap$Allocate$CreateRead$Value$FreePointerSizewcscpywcslen
                                                                            • String ID: 1 VERSIONINFO
                                                                            • API String ID: 3925826109-1896404603
                                                                            • Opcode ID: 4bfc43e50e2c1553a3323a8df169fbb2b7b992d8c8d2c43e8cee915d4ead33e3
                                                                            • Instruction ID: 323a95fbaabbf88ee1aed4e977743c01f4a21cc0717a2b55bfe3a20a1e08ceb9
                                                                            • Opcode Fuzzy Hash: 4bfc43e50e2c1553a3323a8df169fbb2b7b992d8c8d2c43e8cee915d4ead33e3
                                                                            • Instruction Fuzzy Hash: 76D1C672601B808AFB22AF23E9543E97BA2F74DBD9F494525EB4D077A6CB38C055C304
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ButtonChecked$PropWindow$AcquireCreateCriticalIconLeaveLoadLockLongSection
                                                                            • String ID: $pb_toolbar_callback$pb_toolbar_id$tooltips_class32
                                                                            • API String ID: 1722330429-1814761405
                                                                            • Opcode ID: 942f98de3ede40f0b571863ba787d693c317c502c17d3e6ef69ff86931313903
                                                                            • Instruction ID: 75d574d1209dc3edef0b441d2a779c6ec036a4a3ca95a3e041f5a3cdefd3d71a
                                                                            • Opcode Fuzzy Hash: 942f98de3ede40f0b571863ba787d693c317c502c17d3e6ef69ff86931313903
                                                                            • Instruction Fuzzy Hash: 09615E71310B918AEB118F16E854B8A7BA4F78CBA0F554629EFA907BB4DF3CC515CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3556 14004c1bc-14004c1e8 call 140073360 3559 14004c1ee-14004c201 LoadLibraryW 3556->3559 3560 14004c29f-14004c2a1 3556->3560 3563 14004c203-14004c21d GetProcAddress 3559->3563 3564 14004c279-14004c29d call 14004c8a4 wcscat wcslen 3559->3564 3561 14004c2a3-14004c2a5 3560->3561 3562 14004c2fa 3560->3562 3565 14004c2a7-14004c2aa 3561->3565 3566 14004c2f3-14004c2f8 3561->3566 3567 14004c2fd-14004c300 call 14004c8a4 3562->3567 3568 14004c268-14004c273 FreeLibrary 3563->3568 3569 14004c21f-14004c234 3563->3569 3576 14004c305 3564->3576 3572 14004c2ec-14004c2f1 3565->3572 3573 14004c2ac-14004c2ae 3565->3573 3566->3567 3567->3576 3568->3564 3575 14004c307-14004c32a call 1400734a0 3568->3575 3569->3568 3584 14004c236-14004c262 wcscpy wcscat wcslen call 14039808c 3569->3584 3572->3567 3577 14004c2e5-14004c2ea 3573->3577 3578 14004c2b0-14004c2b2 3573->3578 3576->3575 3577->3567 3581 14004c2b4-14004c2b6 3578->3581 3582 14004c2de-14004c2e3 3578->3582 3585 14004c2d7-14004c2dc 3581->3585 3586 14004c2b8-14004c2ba 3581->3586 3582->3567 3584->3568 3585->3567 3588 14004c2d0-14004c2d5 3586->3588 3589 14004c2bc-14004c2be 3586->3589 3588->3567 3590 14004c2c0-14004c2c2 3589->3590 3591 14004c2c9-14004c2ce 3589->3591 3590->3575 3592 14004c2c4-14004c2c7 3590->3592 3591->3567 3592->3567
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Librarywcscatwcslen$AddressAllocateFreeHeapLoadProcValuewcscpy
                                                                            • String ID: Downloads\$SHGetKnownFolderPath$Shell32.DLL
                                                                            • API String ID: 1264281023-287042676
                                                                            • Opcode ID: a63b801b5fdd5e4726106f3a32050b51207b42f0109926440ea8784a8a5929ed
                                                                            • Instruction ID: 8c02ef76267d68b6ccf2442072aca322582b9f51f9fb56f3b38c27db039d0bd1
                                                                            • Opcode Fuzzy Hash: a63b801b5fdd5e4726106f3a32050b51207b42f0109926440ea8784a8a5929ed
                                                                            • Instruction Fuzzy Hash: 2E41A63132464582FAA79FD7E554BE952A1E78DBC0F460239FB0A177F5DEF8C8059208
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$Allocate$wcscatwcslen$CriticalErrorFileFindFirstFreeInitializeLastSectionwcscpy
                                                                            • String ID: *.*
                                                                            • API String ID: 3300757111-438819550
                                                                            • Opcode ID: 5736d66417ce6c243f3b3a5bc0d2d1ea22073a2a6189a526501c791dcfec24f5
                                                                            • Instruction ID: 1be9772cc1c903d97576badce6299f15b96f4e7be925bbeda0cb7c239c86d568
                                                                            • Opcode Fuzzy Hash: 5736d66417ce6c243f3b3a5bc0d2d1ea22073a2a6189a526501c791dcfec24f5
                                                                            • Instruction Fuzzy Hash: 81418B31300B4085EA56EF63AD453E967A1BB8CBE4F898625AF29073F5DE3CC4468344
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$LongPropRemove$AcquireCallCriticalDragDropLeaveLockNtdllProcProc_RevokeSection
                                                                            • String ID: PB_DropAccept$PB_ID
                                                                            • API String ID: 2869421363-3688647018
                                                                            • Opcode ID: ddf95e830567a1a3ff46b0a7b6b64d9a2c72c01e06cad03798cd952e3f533678
                                                                            • Instruction ID: 8d6d055c06ec53bb66c5a4d4b3ffd782926bf2b2ba21a79e116fadad93140a5e
                                                                            • Opcode Fuzzy Hash: ddf95e830567a1a3ff46b0a7b6b64d9a2c72c01e06cad03798cd952e3f533678
                                                                            • Instruction Fuzzy Hash: 06215C75301B8082EA15DF57E8447A9BBA1B789FE4F448625AF6A077F8CE3CC102C304
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ValueWindowmemset$AllocateButtonCheckedCreateHeapLongVersion
                                                                            • String ID: Scintilla
                                                                            • API String ID: 932971817-657330430
                                                                            • Opcode ID: 027ea70b2156778a3ca974a5032721b1c153c0757e1c1bf4f80ca5030ce8eee4
                                                                            • Instruction ID: 361b5bb1b0f5858c3006a8782bcbad1945b171b3278f5a7701eabe37d690238e
                                                                            • Opcode Fuzzy Hash: 027ea70b2156778a3ca974a5032721b1c153c0757e1c1bf4f80ca5030ce8eee4
                                                                            • Instruction Fuzzy Hash: AC414A31204B8589EA12DF17F9547DABBA1F78CBE4F444626EB69477B4DB3CC1058B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$Iconic$AcquireActiveCriticalLeaveLockSectionShowZoomed
                                                                            • String ID:
                                                                            • API String ID: 1935891359-0
                                                                            • Opcode ID: e168c34a740619cd620a19c87c13f75022538ae979ab2c4ff71f1ae7602d2b50
                                                                            • Instruction ID: fefe5df98ba9cbf6f3b3df8c2d886920af55957ff77efe9c8d2cbc8430ac7adf
                                                                            • Opcode Fuzzy Hash: e168c34a740619cd620a19c87c13f75022538ae979ab2c4ff71f1ae7602d2b50
                                                                            • Instruction Fuzzy Hash: A2216035628A088AFB66DB27D554BA962D1FBCDBC0F14C121EB0A47BB8DF39C8458705
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Prop$ErrorFrameLastNtdllParentProcProc_RemoveWindow
                                                                            • String ID: PB_MDI_Gadget
                                                                            • API String ID: 3534055887-983833826
                                                                            • Opcode ID: 73ed6c27279a81bcb74f4072f52a5ff1b40b514d95983472f437c2e7eadeb7c8
                                                                            • Instruction ID: 4794eff79031289fd958da7dc70ce1f03a54d1bb29baae4f62bc3f913dab499d
                                                                            • Opcode Fuzzy Hash: 73ed6c27279a81bcb74f4072f52a5ff1b40b514d95983472f437c2e7eadeb7c8
                                                                            • Instruction Fuzzy Hash: EB11AC30600B0086EA769B57A9803ADB6A1B34EFC0F584217EF1903BF4DF7AC5428349
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$LongRectValue$AllocateCallClientFillHeapNtdllProcProc_Prop
                                                                            • String ID:
                                                                            • API String ID: 2238256497-0
                                                                            • Opcode ID: 18cab80f140554fc767359f2bb6d71375fe89ca78f85a7049b6bc299c0ce170d
                                                                            • Instruction ID: a63723faf5f90f6f98c812b8803360b0bff4a2f725e821f47f1e462c91d44cfd
                                                                            • Opcode Fuzzy Hash: 18cab80f140554fc767359f2bb6d71375fe89ca78f85a7049b6bc299c0ce170d
                                                                            • Instruction Fuzzy Hash: FA111631614B8186EA16DF17F844BDAA762BB8DBD0F488065EF4A03BA9DE3CC5158604
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ExceptionHandlerVectored$Remove
                                                                            • String ID: P%_
                                                                            • API String ID: 3670940754-2161797920
                                                                            • Opcode ID: 562bd430401dd225abc9ce45866009821a6949765fc5e4bcefe9fea4a951548d
                                                                            • Instruction ID: 7cca246f69d76dfe07f3a072409c1ae4f2e560ad1152d573ec622672e67efdc5
                                                                            • Opcode Fuzzy Hash: 562bd430401dd225abc9ce45866009821a6949765fc5e4bcefe9fea4a951548d
                                                                            • Instruction Fuzzy Hash: 43F01270201E44C9FE2B4F93B9047E566A1BB4CB80F4505759B0E0B6B09B7C8454C218
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %2X
                                                                            • API String ID: 0-1225248942
                                                                            • Opcode ID: 6b5b5ae962265b27804f2945618446264a62fc4cd0759498a95de1d67e8e6c13
                                                                            • Instruction ID: bb21cadd7134c5ae9e6693dafc10cf4c99eaab35638c5c6c6fa468a7874aaf37
                                                                            • Opcode Fuzzy Hash: 6b5b5ae962265b27804f2945618446264a62fc4cd0759498a95de1d67e8e6c13
                                                                            • Instruction Fuzzy Hash: BCE26C37A086C18AD771CF19E094BEEB7A6F788B44F144225DAA953B98DB3CE545CF00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: MetricsSystem$Create$AllocateCompatibleDeleteHeapObject$BitmapFillRectSelectStock
                                                                            • String ID: DISPLAY
                                                                            • API String ID: 945146972-865373369
                                                                            • Opcode ID: b4c46c7983044e4ae41496883975320106f061bdf85e6da9a99c5717251bc317
                                                                            • Instruction ID: eb27f52c0ccd5446c3c3e634acd2294e8d99a21491a9c033efc2871a762fb7d6
                                                                            • Opcode Fuzzy Hash: b4c46c7983044e4ae41496883975320106f061bdf85e6da9a99c5717251bc317
                                                                            • Instruction Fuzzy Hash: 89413935711A118AEB269F23E858B99BBA5F78CF81F4480299F4A43BB0DF7DD405CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Prop$ButtonCheckedHeapLibrary$AddressAllocateFreeLoadLongProcValueWindow$AcquireClientCriticalLeaveLockRectSectionmemset
                                                                            • String ID: pb_statusbar_callback$pb_statusbar_id
                                                                            • API String ID: 191362439-3395164763
                                                                            • Opcode ID: 823bd31dd6397a4683aa67939e3887ce7ad1bb8791906cac6ae5108e03393625
                                                                            • Instruction ID: 11f8e8a6b54701c08dc54cb03ae52074999b8a3f4b420dad9b31fd5536de160f
                                                                            • Opcode Fuzzy Hash: 823bd31dd6397a4683aa67939e3887ce7ad1bb8791906cac6ae5108e03393625
                                                                            • Instruction Fuzzy Hash: 9C415B72300A418AEB16AF63E9187DA6BA1B78DFD5F448524DF1917BB8DE3CC5068740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3328 1400500a4-1400500ce 3329 140050164-14005016a 3328->3329 3330 1400500d4-1400500d8 3328->3330 3333 1400501e1-1400501e7 3329->3333 3334 14005016c-14005017c GetPropW 3329->3334 3331 140050227-14005023c CallWindowProcW 3330->3331 3332 1400500de-1400500f2 IsDlgButtonChecked 3330->3332 3338 140050242-14005025c 3331->3338 3332->3331 3337 1400500f8-14005010b GetWindowLongPtrW 3332->3337 3335 140050215-14005021b 3333->3335 3336 1400501e9-1400501f9 GetPropW 3333->3336 3334->3331 3339 140050182-1400501a8 3334->3339 3335->3331 3341 14005021d 3335->3341 3336->3331 3340 1400501fb-140050213 ReleaseCapture RemovePropW 3336->3340 3342 140050128-140050157 SetPropW SetCapture GetWindowLongPtrW 3337->3342 3343 14005010d-140050122 IsDlgButtonChecked 3337->3343 3344 1400501c1-1400501d7 ReleaseCapture RemovePropW 3339->3344 3345 1400501aa-1400501af 3339->3345 3346 1400501dc-1400501df 3340->3346 3347 140050222 call 14005a520 3341->3347 3342->3331 3348 14005015d-14005015f 3342->3348 3343->3331 3343->3342 3344->3346 3345->3344 3349 1400501b1-1400501b9 3345->3349 3346->3347 3347->3331 3348->3338 3349->3344 3351 1400501bb-1400501bf 3349->3351 3351->3331 3351->3344
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Prop$CaptureWindow$ButtonCheckedLongReleaseRemove$CallProc
                                                                            • String ID: PB_MouseDown
                                                                            • API String ID: 3342513413-1480470280
                                                                            • Opcode ID: ba44510f76d55d8c4331bad268e00d244994606d40a2f2ae7efebf52f0be5efc
                                                                            • Instruction ID: 155dd207d7193abad236b30b39cb59d21343c42e98b4ab13da1170a505124cfd
                                                                            • Opcode Fuzzy Hash: ba44510f76d55d8c4331bad268e00d244994606d40a2f2ae7efebf52f0be5efc
                                                                            • Instruction Fuzzy Hash: 9E416D34310A968AFA16DF67E948BED27A1B78DBC0F585424EF0A477F9DE79C4058600
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3352 14005bfc8-14005c0d7 call 140072250 call 140109660 memset RegisterClassW 3357 14005c0d9 3352->3357 3358 14005c0db-14005c0df 3352->3358 3357->3358 3359 14005c0e8-14005c0f9 3358->3359 3360 14005c0e1-14005c0e5 3358->3360 3361 14005c10d-14005c171 call 14005f884 call 14005f8b4 AdjustWindowRectEx 3359->3361 3362 14005c0fb-14005c10b 3359->3362 3360->3359 3367 14005c1b7-14005c1bc 3361->3367 3368 14005c173-14005c179 3361->3368 3362->3361 3371 14005c1be-14005c226 CreateWindowExW 3367->3371 3369 14005c181-14005c18c 3368->3369 3370 14005c17b-14005c17f 3368->3370 3374 14005c19e-14005c1b5 call 14005f884 call 14005f8b4 3369->3374 3375 14005c18e call 14005d8f4 3369->3375 3370->3367 3370->3369 3372 14005c357-14005c377 UnregisterClassW call 140072184 3371->3372 3373 14005c22c-14005c24b SetPropW 3371->3373 3389 14005c379-14005c38c 3372->3389 3376 14005c24d-14005c255 call 14005d9f8 3373->3376 3377 14005c25a-14005c25d 3373->3377 3374->3371 3385 14005c193-14005c19b call 14005f7ac 3375->3385 3376->3377 3383 14005c27d 3377->3383 3384 14005c25f-14005c266 3377->3384 3391 14005c283-14005c308 RtlAllocateHeap CreateAcceleratorTableW 3383->3391 3387 14005c320-14005c324 3384->3387 3388 14005c26c-14005c274 3384->3388 3385->3374 3398 14005c336-14005c34d ShowWindow 3387->3398 3399 14005c326-14005c331 3387->3399 3393 14005c277 ShowWindow 3388->3393 3394 14005c312-14005c319 3391->3394 3395 14005c30a-14005c30d call 1401097a0 3391->3395 3393->3383 3401 14005c352-14005c355 3394->3401 3402 14005c31b-14005c31e 3394->3402 3395->3394 3398->3391 3399->3393 3401->3389 3402->3389
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$Prop$ClassCreateHeapShow$AcceleratorAcquireAdjustAllocateCriticalFreeLeaveLockRectRegisterSectionTableUnregistermemset
                                                                            • String ID: PB_WindowID$WindowClass_%I64d
                                                                            • API String ID: 676206387-780217238
                                                                            • Opcode ID: e2f75005e19bfe89b76a6393ed77f64917fb27f59e3f1e452ee5042d8ff111c5
                                                                            • Instruction ID: 35df488138f021de680914c759e51184770106a4a2a8c40daebb526356380349
                                                                            • Opcode Fuzzy Hash: e2f75005e19bfe89b76a6393ed77f64917fb27f59e3f1e452ee5042d8ff111c5
                                                                            • Instruction Fuzzy Hash: 08B16D33610B848EEB21CF66E8847D977E1F78C798F108229EB5A47BA4DB39C544CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateCursorHeapLoadParentValueWindowmemset$ClassCreateInvalidateLongRectRegister
                                                                            • String ID: PureSplitter
                                                                            • API String ID: 814377489-3781326138
                                                                            • Opcode ID: 49fe0d503b67e54adf8d7cc63483ec5abdf4ca0b06acef512a735b2d4e076d7a
                                                                            • Instruction ID: a927639da4846324ff2a4cc4cf4688c7537fd99f41acdfbaa194b16e75f33a1f
                                                                            • Opcode Fuzzy Hash: 49fe0d503b67e54adf8d7cc63483ec5abdf4ca0b06acef512a735b2d4e076d7a
                                                                            • Instruction Fuzzy Hash: 2B810776610A008AEB12DF26E8547D97BA5F78CB98F504226EF5E477B8DF39C405C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ??3@
                                                                            • String ID:
                                                                            • API String ID: 613200358-0
                                                                            • Opcode ID: 61263546a891eb812b6a26d0e714812a3d778fbdc5cade975e1c443c94daf1dc
                                                                            • Instruction ID: 181c8228ccc516e777d6a3a58bd83488c814d1b7392a1f05392304153b2a1b47
                                                                            • Opcode Fuzzy Hash: 61263546a891eb812b6a26d0e714812a3d778fbdc5cade975e1c443c94daf1dc
                                                                            • Instruction Fuzzy Hash: 8551E936206A8095E755DF32D8903ED37A1FB89FC8F489035EF8A4B769CF3984558361
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Current$AllocateCriticalHeapProcessSectionValue$AcquireAllocDuplicateHandleInitializeLeaveLockObjectRegisterSingleThreadWait
                                                                            • String ID:
                                                                            • API String ID: 4033017058-0
                                                                            • Opcode ID: 9428ee6f4bbde05629422076c9a105266dee3d648fdafaeb44e6f58e3978a438
                                                                            • Instruction ID: 140b43686b5a253201a77e60fd68929639ab6021d67050e4009ccc20a6755d4a
                                                                            • Opcode Fuzzy Hash: 9428ee6f4bbde05629422076c9a105266dee3d648fdafaeb44e6f58e3978a438
                                                                            • Instruction Fuzzy Hash: 9E41F276204B41CAEB128F23EC587997BA0F78CB99F084525AB9D03BB4DF78C559C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3475 14004eb70-14004ebae GetPropW 3476 14004ebb4-14004ebb7 3475->3476 3477 14004ec80-14004ec83 3475->3477 3480 14004edd4-14004edec 3476->3480 3481 14004ebbd-14004ebc4 3476->3481 3478 14004ed30-14004ed3b 3477->3478 3479 14004ec89-14004eca2 RtlAllocateHeap 3477->3479 3485 14004ed95-14004ed99 3478->3485 3486 14004ed3d-14004ed41 3478->3486 3479->3480 3482 14004eca8-14004ece3 RegisterDragDrop 3479->3482 3483 14004ebf5-14004ebf9 3481->3483 3484 14004ebc6-14004ebcd 3481->3484 3488 14004ece5-14004ecf4 RevokeDragDrop RegisterDragDrop 3482->3488 3489 14004ecfa-14004ecfc 3482->3489 3487 14004ec04-14004ec07 3483->3487 3491 14004ebcf 3484->3491 3492 14004ec4c-14004ec51 3484->3492 3490 14004eda3-14004eda6 3485->3490 3493 14004ed4b-14004ed4e 3486->3493 3496 14004ec09 3487->3496 3497 14004ebfb-14004ebff 3487->3497 3488->3489 3498 14004ecfe-14004ed1a SetPropW 3489->3498 3499 14004ed1c-14004ed25 3489->3499 3500 14004eda8 3490->3500 3501 14004ed9b-14004ed9e 3490->3501 3502 14004ebd3-14004ebd7 3491->3502 3492->3480 3503 14004ec57-14004ec5c 3492->3503 3494 14004ed43-14004ed46 3493->3494 3495 14004ed50-14004ed69 RtlAllocateHeap 3493->3495 3508 14004edaa-14004edae 3494->3508 3511 14004ed48 3494->3511 3495->3480 3504 14004ed6b-14004ed6d 3495->3504 3496->3492 3505 14004ec01 3497->3505 3506 14004ec0b-14004ec15 3497->3506 3524 14004ed27-14004ed2a 3498->3524 3499->3524 3500->3495 3507 14004eda0 3501->3507 3501->3508 3509 14004ebe3-14004ebed 3502->3509 3510 14004ebd9-14004ebdf 3502->3510 3503->3480 3512 14004ec62-14004ec7b RemovePropW RevokeDragDrop 3503->3512 3515 14004ed6f-14004ed76 3504->3515 3516 14004edb0-14004edb7 3504->3516 3505->3487 3514 14004ec2a-14004ec33 3506->3514 3517 14004ec17 3506->3517 3507->3490 3508->3480 3513 14004ebef-14004ebf3 3509->3513 3509->3514 3510->3502 3520 14004ebe1 3510->3520 3511->3493 3512->3480 3521 14004ec1b-14004ec21 3513->3521 3525 14004ec35-14004ec39 3514->3525 3526 14004ec3d-14004ec46 HeapFree 3514->3526 3522 14004ed78 3515->3522 3523 14004ed7c-14004ed93 3515->3523 3527 14004edbd-14004edd0 3516->3527 3528 14004edb9 3516->3528 3517->3521 3520->3492 3521->3526 3529 14004ec23-14004ec28 3521->3529 3522->3523 3523->3480 3524->3478 3524->3480 3525->3526 3526->3492 3527->3480 3528->3527 3529->3526
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DragDrop$HeapProp$AllocateRegisterRevoke$FreeRemove
                                                                            • String ID: PB_DropAccept
                                                                            • API String ID: 588632010-2550732394
                                                                            • Opcode ID: e6bfa1a3efc291ca0f0142d14dc48d1db63e13b70bba36630f4c5ec7b24087fb
                                                                            • Instruction ID: 5e0e5b29fffe5bd054d3dc22a33a9390846405c128d21c3a6fb726b9e6ff5ece
                                                                            • Opcode Fuzzy Hash: e6bfa1a3efc291ca0f0142d14dc48d1db63e13b70bba36630f4c5ec7b24087fb
                                                                            • Instruction Fuzzy Hash: 9F811672605B8486EF668F16EA943A877A4F74CFC4F26852AEF09073B4DB38C845C345
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3530 140051b00-140051b3e call 140071fb4 3533 140051c71-140051c8d call 14005f7dc 3530->3533 3534 140051b44-140051c6a call 14005a17c memset 3530->3534 3539 140051df1-140051e00 3533->3539 3540 140051c93 3533->3540 3534->3533 3541 140051c9a 3539->3541 3542 140051e06-140051e0c 3539->3542 3540->3541 3543 140051c9f-140051ca2 3541->3543 3542->3543 3544 140051ca4 3543->3544 3545 140051caa-140051cfe CreateWindowExW 3543->3545 3544->3545 3546 140051d04-140051d19 call 140072250 3545->3546 3547 140051dda-140051df0 3545->3547 3550 140051d62-140051dd4 call 14005a3e4 IsDlgButtonChecked GetWindowRect IsDlgButtonChecked 3546->3550 3551 140051d1b-140051d2b GetWindow 3546->3551 3550->3547 3552 140051d2d-140051d35 GetWindow 3551->3552 3553 140051d3b-140051d5c GetWindowLongPtrW SetWindowLongPtrW 3551->3553 3552->3553 3553->3550
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$Library$AddressButtonCheckedLoadLongProcValuememset$AllocateCreateFreeHeapRect
                                                                            • String ID: ComboBox$ComboBoxEx32
                                                                            • API String ID: 1123204175-1907415764
                                                                            • Opcode ID: 53cfcb25ca43c8e24804be34910d93b575a823d27fc4a9e2955256f5e001c160
                                                                            • Instruction ID: e334482a374c4d62dfb3b64f5212f7795842bcfaa1e0c8b25b6060b12cc45cda
                                                                            • Opcode Fuzzy Hash: 53cfcb25ca43c8e24804be34910d93b575a823d27fc4a9e2955256f5e001c160
                                                                            • Instruction Fuzzy Hash: 42912971221B008AEB12DF66E8807DA3BA4F78DBA4F50462AEB5D077B4DF39C545C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressProc$AllocateHeap$CriticalInitializeLibraryLoadSectionStartup
                                                                            • String ID: WSAStringToAddressA$freeaddrinfo$getaddrinfo$getnameinfo$ws2_32.dll
                                                                            • API String ID: 2601949007-3312996600
                                                                            • Opcode ID: 5ba5cfb9711941f1d54b8b0693867105c55f0bb43ba028a2bbaf9c7ea9d29b8c
                                                                            • Instruction ID: 099806b76bf9bae8c32851a6e416f5f235b397a828727b93cba6a1c37db9afb9
                                                                            • Opcode Fuzzy Hash: 5ba5cfb9711941f1d54b8b0693867105c55f0bb43ba028a2bbaf9c7ea9d29b8c
                                                                            • Instruction Fuzzy Hash: B331C674202B458AFA129F12FE947E43BE5F78CB84F84016ADB49432B8EB7C8455C714
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Library$AddressFreeLoadProc$memset
                                                                            • String ID: COMCTL32.DLL$DllGetVersion$IsAppThemed$uxtheme.dll
                                                                            • API String ID: 4277437538-2634860346
                                                                            • Opcode ID: 86d897256496a63417ceb7d3867a75213c74a56ce373c79eace759b15224e07f
                                                                            • Instruction ID: c21bf3b63801ef545a544740c19475e3919847166ec579082611992a7a775ee8
                                                                            • Opcode Fuzzy Hash: 86d897256496a63417ceb7d3867a75213c74a56ce373c79eace759b15224e07f
                                                                            • Instruction Fuzzy Hash: A9213771205B4186FB269B6BE8443AA67E1FB8CBC4F484425AB4D437A8EF3CC545DB21
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Prop$ParentRemove$AcquireCallCriticalDeleteFreeHeapLeaveLockObjectProcSectionWindow
                                                                            • String ID: pb_statusbar_callback$pb_statusbar_id
                                                                            • API String ID: 4274217687-3395164763
                                                                            • Opcode ID: f7e171a33a8f220ea0c6cbc038c0cfb9685c2d018f2257efdb0433b094da8998
                                                                            • Instruction ID: 2978f9610ec0be769d8d77013a6a62ef60f499d3317b1d631a4d9f8d2c77fd8c
                                                                            • Opcode Fuzzy Hash: f7e171a33a8f220ea0c6cbc038c0cfb9685c2d018f2257efdb0433b094da8998
                                                                            • Instruction Fuzzy Hash: 7A314536201B4596EA02DF23E948B99B761F78CFD4F858026EE5A077B8DF78C14AC340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressCapsDeviceProc$LibraryLoadRelease
                                                                            • String ID: DwmGetWindowAttribute$DwmIsCompositionEnabled$dwmapi.dll
                                                                            • API String ID: 2286125855-3767204498
                                                                            • Opcode ID: 8f73be39c96b45b4c1b593e37275115602087021babc49e2a4b4e66be1061437
                                                                            • Instruction ID: a79f731339f5b4f7f8d54a46f45f1d1b6a9ecfe26da46b6a31388cd1d690f1ae
                                                                            • Opcode Fuzzy Hash: 8f73be39c96b45b4c1b593e37275115602087021babc49e2a4b4e66be1061437
                                                                            • Instruction Fuzzy Hash: 6C211A76611A069EFB43DF23F8557D53BA1BB4D781F40412A960B223B4EF3D9489CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ClassLongValueWindowmemset$AllocateCreateCursorHeapInvalidateLoadRectRegister
                                                                            • String ID: PureContainer
                                                                            • API String ID: 481525289-2295191815
                                                                            • Opcode ID: 0c1ee3fd1d2f01dcae2ad156badc699a86c7d7869b87812eff6904008fbdd564
                                                                            • Instruction ID: c1c61671dae80b1931d49294047bd8cafc6887e6a43e3a5175261d78cff3fcbf
                                                                            • Opcode Fuzzy Hash: 0c1ee3fd1d2f01dcae2ad156badc699a86c7d7869b87812eff6904008fbdd564
                                                                            • Instruction Fuzzy Hash: 65514872210B408AEB12DF66E9447DA7BA5F78CB98F404226EF1D47BB4DB39C506C744
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$ButtonCheckedLongValue$AllocateCreateHeapParentmemset
                                                                            • String ID: @$tooltips_class32
                                                                            • API String ID: 3252620959-517154873
                                                                            • Opcode ID: c2b980bf1f65dfe69ca701bf5bfd5b55a748c2ef79e4a03383ca7c7a15c1e3c0
                                                                            • Instruction ID: 904af95b8a58caedbb48ad19bfb5e9f87698ebc37ed36b1d9bb9e18f2c75ff39
                                                                            • Opcode Fuzzy Hash: c2b980bf1f65dfe69ca701bf5bfd5b55a748c2ef79e4a03383ca7c7a15c1e3c0
                                                                            • Instruction Fuzzy Hash: F0315E72204B8086E711CF22F84478AB7B4F78CB94F605126EB8D43BA8DF39C545CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ButtonChecked$Object$Delete$00007D200E118Type
                                                                            • String ID:
                                                                            • API String ID: 1600253914-0
                                                                            • Opcode ID: e045d8da5406927a0ee704104aac2c8bb9d9ebeadf38646ce5cc85e47236e1f2
                                                                            • Instruction ID: 4e73422f702b30a200f546e06cb342d2bdac94c2be405ab5d577e57a18b4fb70
                                                                            • Opcode Fuzzy Hash: e045d8da5406927a0ee704104aac2c8bb9d9ebeadf38646ce5cc85e47236e1f2
                                                                            • Instruction Fuzzy Hash: F8518B767006518AEB16CF67E850BEA7BA0F38CB88F844425DF0A53BA4DF38C916C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ButtonChecked$ValueWindow$AcquireAllocateCreateCriticalHeapLeaveLockLongSectionmemset
                                                                            • String ID: SysListView32
                                                                            • API String ID: 1338147022-78025650
                                                                            • Opcode ID: 5d3cc716793b466e2a0f6717c96c355dbff5b4a86847cef3406031d4152f4dc3
                                                                            • Instruction ID: 154e25eabb41d866b907840bd9a7566b1e79f5e9d118594eff7b4a1c62514d8b
                                                                            • Opcode Fuzzy Hash: 5d3cc716793b466e2a0f6717c96c355dbff5b4a86847cef3406031d4152f4dc3
                                                                            • Instruction Fuzzy Hash: C2A1E375621B849AEB12DF26F8917D67BA8F74CB90F804226AB4D037B1EF3AC554C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$AllocateProp$Value$FreeLongWindow
                                                                            • String ID: PB_GadgetStack_%I64i
                                                                            • API String ID: 1265686114-1095576542
                                                                            • Opcode ID: 241260f12132a6e29b6d92f5cf9ddcc7d100ba6d9c5115a787008eca9544931f
                                                                            • Instruction ID: e1c3a845f48a7e410ee9814ab618b6363a5fb151770200a54f528270a1753ccd
                                                                            • Opcode Fuzzy Hash: 241260f12132a6e29b6d92f5cf9ddcc7d100ba6d9c5115a787008eca9544931f
                                                                            • Instruction Fuzzy Hash: 2B410276200B449AEB25CF26E99439877A4F38CF84F04822ADB8D47BA4DF38D565C780
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressLibraryProcWindow$LoadValuememset$AllocateCreateFreeHeapLong
                                                                            • String ID: DrawThemeParentBackground$SysTabControl32
                                                                            • API String ID: 442367357-4092177286
                                                                            • Opcode ID: c54b15d8e2843f8c06e82ae3c0851dd48198f4103a134a537228db6631910028
                                                                            • Instruction ID: f3322bfa9bbdf17a09ea2b75bd7bbea5a663799ec573e32df6ebb6dc9273ff05
                                                                            • Opcode Fuzzy Hash: c54b15d8e2843f8c06e82ae3c0851dd48198f4103a134a537228db6631910028
                                                                            • Instruction Fuzzy Hash: 1261E275625B448AEB22CF16F8803C67BA5F78CB91F804226AE4D437B4EF79C544C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap$Value$Register$AllocClassClipboardCreateCriticalFormatInitializeSectionWindowmemset
                                                                            • String ID: PB_PostEventMessage$PostEventClass
                                                                            • API String ID: 258285246-297677326
                                                                            • Opcode ID: 6a58de0acd6f206d3b57b0bef602eba99f44720a4b0cc21f5f44cc6013f01001
                                                                            • Instruction ID: 550606e72bcdf02e498d1b934216786abb347d511b38ba93430ad8505d41d3a6
                                                                            • Opcode Fuzzy Hash: 6a58de0acd6f206d3b57b0bef602eba99f44720a4b0cc21f5f44cc6013f01001
                                                                            • Instruction Fuzzy Hash: 0131F672524B858AF761DF22F8457DAB7A0F389348F50422AE789476B4EB7DC548CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LibraryPath$AddressAllocateFreeHeapLoadLongNameProcTempValue
                                                                            • String ID: GetLongPathNameW$Kernel32.DLL
                                                                            • API String ID: 1993255246-2943376620
                                                                            • Opcode ID: 4743885935dc812359e953faffabf66b57151c8f8aac2e96d88b203d47865623
                                                                            • Instruction ID: 5a51a99228b08336346173a4317904e71d006373386f9db8efc49d681fbd52c8
                                                                            • Opcode Fuzzy Hash: 4743885935dc812359e953faffabf66b57151c8f8aac2e96d88b203d47865623
                                                                            • Instruction Fuzzy Hash: F5118731311B808AEA159F27A9883A96BE4FB8DFC0F491038EF0E477A5DF38C8118340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLast$Sleepselect
                                                                            • String ID:
                                                                            • API String ID: 2806104629-0
                                                                            • Opcode ID: 58f9871f29e71f77ded5fa447ee5438e033b34a5764f64bd78a7200432dac9c5
                                                                            • Instruction ID: eb90eef2e2a672e789385642242beea13e1c946a1988183ce592405c9629faed
                                                                            • Opcode Fuzzy Hash: 58f9871f29e71f77ded5fa447ee5438e033b34a5764f64bd78a7200432dac9c5
                                                                            • Instruction Fuzzy Hash: 1DB1E432214AD889EB7B4E2B98047E96295FB887F8F104215FF2667BF4DB358D418740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$Rect$ButtonCheckedInvalidateMoveParentPointsRedraw
                                                                            • String ID:
                                                                            • API String ID: 4125024068-0
                                                                            • Opcode ID: efd139ec7a36dd794eae97a742bd94443965ee313206be8c78494827fbd2c0f3
                                                                            • Instruction ID: 2c5198e7fa0d60cdc02624bbba74c2d4e3516abf1f2d3f88931a11e2c7f1468a
                                                                            • Opcode Fuzzy Hash: efd139ec7a36dd794eae97a742bd94443965ee313206be8c78494827fbd2c0f3
                                                                            • Instruction Fuzzy Hash: 41515E7721468086EB66DF27E450BADB762F788FC4F149015EB8A0B7A9CF3AC845C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Paint$BeginCreateDeleteObjectRectReleaseUpdate
                                                                            • String ID:
                                                                            • API String ID: 3275953111-0
                                                                            • Opcode ID: bc2ed0a4efbc00f23fb1a545f4c3ee6bb74701635c29940619d124c1e5abefe8
                                                                            • Instruction ID: 039542817234f84c0a0f228454fafe33becf8cd98554d87988b5e2fbdda65638
                                                                            • Opcode Fuzzy Hash: bc2ed0a4efbc00f23fb1a545f4c3ee6bb74701635c29940619d124c1e5abefe8
                                                                            • Instruction Fuzzy Hash: B0517473B08A8587EB64CB25E460BAA73A1FB89B84F544131DBAE87749DF3CE551C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: MetricsSystemValueWindow$AllocateCreateHeapLongmemset
                                                                            • String ID: ListBox
                                                                            • API String ID: 198341745-2763449597
                                                                            • Opcode ID: be6f786469d105c692e39b572f726dcef0e2168a73edaedd226e26172ac05f55
                                                                            • Instruction ID: af53b9aea2e6e3c761b26a3f95a30f70905366bd5922f7e247fa14984f52da02
                                                                            • Opcode Fuzzy Hash: be6f786469d105c692e39b572f726dcef0e2168a73edaedd226e26172ac05f55
                                                                            • Instruction Fuzzy Hash: 2461B075201B849AEA12CF12F9803D67BA8FB8CB90F404266EB8C43775EF79D654C784
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$CreateValue$AllocateHeapLongmemset
                                                                            • String ID: Button$Static
                                                                            • API String ID: 10632734-2498952662
                                                                            • Opcode ID: 4fd24cf6bb5ed7c9f519d6832c1d3bbd19b8c63182ef49504c0620ccda19f878
                                                                            • Instruction ID: 8733b975503b3ef00de5011feb298643a247a5fd059819487f5096c5dbd6fac9
                                                                            • Opcode Fuzzy Hash: 4fd24cf6bb5ed7c9f519d6832c1d3bbd19b8c63182ef49504c0620ccda19f878
                                                                            • Instruction Fuzzy Hash: 6B511D71604B848AEB51CF2AE9807D97BA0F74CBA8F54022AFB5D877A5DB3DD544CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Value$AcquireAllocateCriticalHeapLeaveLockMessagePeekSection
                                                                            • String ID:
                                                                            • API String ID: 4200393714-0
                                                                            • Opcode ID: e82325cca8cd40e73bbc46cab73e35183e356610e67812e4f3f0e8b3a6855461
                                                                            • Instruction ID: 8047c18a988b397fc34a16b7c0fef95ea3b58854854b377072509b16625dde32
                                                                            • Opcode Fuzzy Hash: e82325cca8cd40e73bbc46cab73e35183e356610e67812e4f3f0e8b3a6855461
                                                                            • Instruction Fuzzy Hash: A1414832620A508AFB22CF67E854BAD37E1B74CB88F544126EF0A43BA4DF39C941C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                              • Part of subcall function 00007FFDFF234010: HeapCreate.KERNEL32(?,?,?,?,00007FFDFF22F981), ref: 00007FFDFF234022
                                                                              • Part of subcall function 00007FFDFF234010: HeapSetInformation.KERNEL32 ref: 00007FFDFF23404C
                                                                            • _RTC_Initialize.LIBCMT ref: 00007FFDFF22F99C
                                                                            • GetCommandLineA.KERNEL32 ref: 00007FFDFF22F9A1
                                                                              • Part of subcall function 00007FFDFF233DEC: GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FFDFF22F9B3), ref: 00007FFDFF233E1B
                                                                              • Part of subcall function 00007FFDFF233DEC: GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FFDFF22F9B3), ref: 00007FFDFF233E5B
                                                                              • Part of subcall function 00007FFDFF233698: GetStartupInfoA.KERNEL32 ref: 00007FFDFF2336BD
                                                                            • __setargv.LIBCMT ref: 00007FFDFF22F9CA
                                                                            • _cinit.LIBCMT ref: 00007FFDFF22F9DE
                                                                              • Part of subcall function 00007FFDFF230C90: FlsFree.KERNEL32(?,?,?,?,00007FFDFF22FA2F), ref: 00007FFDFF230C9F
                                                                              • Part of subcall function 00007FFDFF230C90: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF22FA2F), ref: 00007FFDFF2343EE
                                                                              • Part of subcall function 00007FFDFF230C90: free.LIBCMT ref: 00007FFDFF2343F7
                                                                              • Part of subcall function 00007FFDFF230C90: DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FFDFF22FA2F), ref: 00007FFDFF234417
                                                                              • Part of subcall function 00007FFDFF232A80: Sleep.KERNEL32(?,?,?,00007FFDFF230D9F,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF232AC5
                                                                            • FlsSetValue.KERNEL32 ref: 00007FFDFF22FA64
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00007FFDFF22FA78
                                                                            • free.LIBCMT ref: 00007FFDFF22FA87
                                                                              • Part of subcall function 00007FFDFF22FD4C: HeapFree.KERNEL32(?,?,00000000,00007FFDFF230DD8,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF22FD62
                                                                              • Part of subcall function 00007FFDFF22FD4C: _errno.LIBCMT ref: 00007FFDFF22FD6C
                                                                              • Part of subcall function 00007FFDFF22FD4C: GetLastError.KERNEL32(?,?,00000000,00007FFDFF230DD8,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF22FD74
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Heapfree$CriticalDeleteEnvironmentFreeSectionStrings$CommandCreateCurrentErrorInfoInformationInitializeLastLineSleepStartupThreadValue__setargv_cinit_errno
                                                                            • String ID:
                                                                            • API String ID: 1549890855-0
                                                                            • Opcode ID: d02bd2081d09607085ce5f1d8e92870cb961d8c80d51ae04639e7c8ea05c089b
                                                                            • Instruction ID: ed8f598b52a35c734b433b3350756ef00cf83900493219b530a1efb40aebdcbb
                                                                            • Opcode Fuzzy Hash: d02bd2081d09607085ce5f1d8e92870cb961d8c80d51ae04639e7c8ea05c089b
                                                                            • Instruction Fuzzy Hash: 9C3102A4F0D20391FB6467A15872EBD23959F45350FA44734DD3EC92CEEE2CB6808661
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ButtonChecked$ValueWindow$AllocateCreateHeapLong
                                                                            • String ID: STATIC
                                                                            • API String ID: 3753272263-1882779555
                                                                            • Opcode ID: c66a4028819e81026db6c771bf8a244cf24110de1135da88c698416fbf5cf41c
                                                                            • Instruction ID: 06e45d2796808ec676c540834266b69a5d38237d787692eeebebfa8e6b4e820f
                                                                            • Opcode Fuzzy Hash: c66a4028819e81026db6c771bf8a244cf24110de1135da88c698416fbf5cf41c
                                                                            • Instruction Fuzzy Hash: 4F313B36204B908AE721DF62F944B9AB7A0F388B95F514525EF9947BA4DF3CC5158B00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _wcsdup$AllocateCloseCreateHandleHeapThread
                                                                            • String ID: Mozilla/5.0 Gecko/41.0 Firefox/41.0
                                                                            • API String ID: 788887786-729255037
                                                                            • Opcode ID: 1fc2f6d1230b4df54c3bb6d386e50a06d3f94aff82c57c00d89704710efc373d
                                                                            • Instruction ID: 17bde691890060f8170b5c679faa5ffe91259d470a97150c82d10960ccfe508f
                                                                            • Opcode Fuzzy Hash: 1fc2f6d1230b4df54c3bb6d386e50a06d3f94aff82c57c00d89704710efc373d
                                                                            • Instruction Fuzzy Hash: 55219A32204B418AEB16DF67A9543ADB7A0F788BD4F454125AF5917BB8CB78C051CB44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateCriticalFontInitializeObjectSectionStockmemset
                                                                            • String ID: Segoe UI
                                                                            • API String ID: 211761664-2515502724
                                                                            • Opcode ID: 36e13b0aa82c524283a2a03f98b98c81a4fc296f5cc65cd4c9a1b484396727e4
                                                                            • Instruction ID: 6e0709f83546fc1477cabec03cc8ef520776481926974f5a432401edeb7a4e3a
                                                                            • Opcode Fuzzy Hash: 36e13b0aa82c524283a2a03f98b98c81a4fc296f5cc65cd4c9a1b484396727e4
                                                                            • Instruction Fuzzy Hash: 77316B72514A80CAF312DF26F8043EA77A0F78979AF924224E78A136B5DF7DC149DB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$ButtonChecked$EnableShow
                                                                            • String ID:
                                                                            • API String ID: 3376149752-0
                                                                            • Opcode ID: bbb477ab043b01b70c70c936481653d31e308410a509dc065d558457bd559593
                                                                            • Instruction ID: 755f413d0e2c847456135941f962d50d377bd1ec4c3a595977a71360b71964fd
                                                                            • Opcode Fuzzy Hash: bbb477ab043b01b70c70c936481653d31e308410a509dc065d558457bd559593
                                                                            • Instruction Fuzzy Hash: 09113A31704A8186EB11DF23E954BAA6762F7CDFD5F048222DF5A57BE8DE39C5028700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Create$AcquireAllocateCriticalHeapLeaveLockPointerSection
                                                                            • String ID:
                                                                            • API String ID: 116771325-0
                                                                            • Opcode ID: 1e58cf1509eb00bdd85570793eba85cc2ec1f94a9f4e8a49ee34421083358480
                                                                            • Instruction ID: 8d667f85ea1d38f99facc649b5ef4d5182df754ce1406b5158efff582e39c563
                                                                            • Opcode Fuzzy Hash: 1e58cf1509eb00bdd85570793eba85cc2ec1f94a9f4e8a49ee34421083358480
                                                                            • Instruction Fuzzy Hash: 0251E3726156908AE7A18F17F941B9A7A90F34CBE8F054739EF6A47BE4DB38C4018B44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • _getptd.LIBCMT ref: 00007FFDFF2306E7
                                                                              • Part of subcall function 00007FFDFF2303C0: GetOEMCP.KERNEL32(?,?,?,?,?,?,?,00007FFDFF230702,?,?,?,?,?,00007FFDFF2308D7), ref: 00007FFDFF2303EA
                                                                              • Part of subcall function 00007FFDFF232A14: malloc.LIBCMT ref: 00007FFDFF232A33
                                                                              • Part of subcall function 00007FFDFF232A14: Sleep.KERNEL32(?,?,00000000,00007FFDFF2344B5,?,?,?,00007FFDFF23455F,?,?,?,?,?,?,00000000,00007FFDFF230DC4), ref: 00007FFDFF232A4A
                                                                            • free.LIBCMT ref: 00007FFDFF230773
                                                                              • Part of subcall function 00007FFDFF22FD4C: HeapFree.KERNEL32(?,?,00000000,00007FFDFF230DD8,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF22FD62
                                                                              • Part of subcall function 00007FFDFF22FD4C: _errno.LIBCMT ref: 00007FFDFF22FD6C
                                                                              • Part of subcall function 00007FFDFF22FD4C: GetLastError.KERNEL32(?,?,00000000,00007FFDFF230DD8,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF22FD74
                                                                            • _lock.LIBCMT ref: 00007FFDFF2307AB
                                                                            • free.LIBCMT ref: 00007FFDFF23085B
                                                                            • free.LIBCMT ref: 00007FFDFF23088B
                                                                            • _errno.LIBCMT ref: 00007FFDFF230890
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: free$_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
                                                                            • String ID:
                                                                            • API String ID: 2878544890-0
                                                                            • Opcode ID: 92579d503bcb9522a044aba3ee9e629867b01f5a482b39ac7e2a5d746da9bbac
                                                                            • Instruction ID: ebbe088e421171e2448f278590d6ddf9566604075d5653f80aff04703f70aac8
                                                                            • Opcode Fuzzy Hash: 92579d503bcb9522a044aba3ee9e629867b01f5a482b39ac7e2a5d746da9bbac
                                                                            • Instruction Fuzzy Hash: 3B51C261F0868286E354CB25A460A79B7A1FB80758F144335DABECB7DECF7CE4818720
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Heap$AllocateCloseCreateFreeHandlePointerRead
                                                                            • String ID:
                                                                            • API String ID: 2129294348-0
                                                                            • Opcode ID: 1fd48308879c3e7f8842d72b2311c466c641abf7d3213963d5bf58884b742784
                                                                            • Instruction ID: bbaf812fd702cff21f4f8bac64f84410c62403cc2cc1b53b97d6ca12e93bae06
                                                                            • Opcode Fuzzy Hash: 1fd48308879c3e7f8842d72b2311c466c641abf7d3213963d5bf58884b742784
                                                                            • Instruction Fuzzy Hash: F8417132305B908AE6658F27A80479AA7A1F78DFE4F588615AF9D47BE8CF38C445C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ??3@
                                                                            • String ID:
                                                                            • API String ID: 613200358-0
                                                                            • Opcode ID: ccac90523a0f3df49a59181c13ccf0ea859f505d6b54c23af7337f901bbcd0b8
                                                                            • Instruction ID: 95e4d3c6a1ec2423a51ec368fcdba8e6c9929043625f8000f9b6339ee68d6249
                                                                            • Opcode Fuzzy Hash: ccac90523a0f3df49a59181c13ccf0ea859f505d6b54c23af7337f901bbcd0b8
                                                                            • Instruction Fuzzy Hash: 4B310436211A4086DF259F16E9943ACB775FB88F88F484526DB4E07B68DF38C466C340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap$MenuValue$Appendwcscpywcslen
                                                                            • String ID:
                                                                            • API String ID: 1872928246-0
                                                                            • Opcode ID: e810fc69685ff0297becd6c2ce6dbdb03662f7e29518e50eb7cc9843a015a7c3
                                                                            • Instruction ID: e60fd4aeb489c0b4cbe5c3822b1d9ed90bb9fc42e30d786500ef31406249a77d
                                                                            • Opcode Fuzzy Hash: e810fc69685ff0297becd6c2ce6dbdb03662f7e29518e50eb7cc9843a015a7c3
                                                                            • Instruction Fuzzy Hash: 9F210336300A418AEA25DF17E8847A9B7A0F798FC0F588426AF4E47775DF38C896C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FilePointermemcpy
                                                                            • String ID: 0 = 32 1 = 64 2 = 3 = 4 = 5 =
                                                                            • API String ID: 1104741977-3695699275
                                                                            • Opcode ID: 9ccc0d7545e2b4d7292eefb4452d7aaa8241325d1c2e7183530ae5d4901a793f
                                                                            • Instruction ID: cbebe9576e75c766d854539e0036433466d9798f8aca9de44f7ddfd16bd898f0
                                                                            • Opcode Fuzzy Hash: 9ccc0d7545e2b4d7292eefb4452d7aaa8241325d1c2e7183530ae5d4901a793f
                                                                            • Instruction Fuzzy Hash: 2E4182377046408ADB06CF7AE1402ADFBA4EB98BD9F084426EF4C43BA5D678C5A1CB55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: ClipboardFormatRegister$Initialize
                                                                            • String ID: MSDEVColumnSelect$MSDEVLineSelect
                                                                            • API String ID: 4204169304-586212884
                                                                            • Opcode ID: e720e19007854e1a18043cb3f3c74a17eea52210ea24a8b65382159fc26698cf
                                                                            • Instruction ID: 16aced1bad40b82c1446882e40676ce795299e387592bd7e83c84b551f2a1f1b
                                                                            • Opcode Fuzzy Hash: e720e19007854e1a18043cb3f3c74a17eea52210ea24a8b65382159fc26698cf
                                                                            • Instruction Fuzzy Hash: BB21F473718BC1A6D78C8F20EA40699B7A9FB09740F54092AD7BDA3754DFB9A0B5C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LongValueWindow$AllocateButtonCheckedHeapProp
                                                                            • String ID: PB_ID
                                                                            • API String ID: 1240782271-4173770792
                                                                            • Opcode ID: bf392e8224a5fd2b1b01949d83c50be6946f9b1d8e1136e98d8562fd18d435d0
                                                                            • Instruction ID: 6dcdec5b5aa30d21e3c7a0a473bcb5e2756e090560db6381bfbae3244fb89376
                                                                            • Opcode Fuzzy Hash: bf392e8224a5fd2b1b01949d83c50be6946f9b1d8e1136e98d8562fd18d435d0
                                                                            • Instruction Fuzzy Hash: 17114C71300B948AD600DF67E9807997B64F789FE0F588215EF6A17BE4CF38D5568344
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Prop$RemoveWindow$CallLongProc
                                                                            • String ID: PB_RectBottom$PB_RectTop
                                                                            • API String ID: 2368525485-3662301043
                                                                            • Opcode ID: de103062bf5e302b880c65fa1d45f411ca5af83f85b05fe561585bffe61c4ee4
                                                                            • Instruction ID: 321b2123a590a1bbeeac7ca934958c688c4994b505fc9444d311357cc8b513d5
                                                                            • Opcode Fuzzy Hash: de103062bf5e302b880c65fa1d45f411ca5af83f85b05fe561585bffe61c4ee4
                                                                            • Instruction Fuzzy Hash: 5E0178B5204A408AEB12CF2BF844799A760F78CFC0F588422EF4943778DE39C506C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateCriticalHeapSection$AcquireInitializeLeaveLock
                                                                            • String ID:
                                                                            • API String ID: 1976302020-0
                                                                            • Opcode ID: c372412a2e2566c064cc3aae1fa1ebcee3528421d3c343974022e757d930dce7
                                                                            • Instruction ID: 8ff372bcb1f86b2368a3363971e20c69fc20d2968f69f27739243753d5af4954
                                                                            • Opcode Fuzzy Hash: c372412a2e2566c064cc3aae1fa1ebcee3528421d3c343974022e757d930dce7
                                                                            • Instruction Fuzzy Hash: 49414732601B008AEB66DF16E8417A87BF4F79CB80F584129EB4D477A4EF38D8A5C750
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$MetricsSystem$ActiveRect
                                                                            • String ID:
                                                                            • API String ID: 3497069843-0
                                                                            • Opcode ID: 6c3ff8903e48793c812966b0156e19762d78b4567927bc467e7650319938cc6a
                                                                            • Instruction ID: 625f38ed7f49ace5704d1033655c418253bb41cacaa2fde6abe72eb9493aff89
                                                                            • Opcode Fuzzy Hash: 6c3ff8903e48793c812966b0156e19762d78b4567927bc467e7650319938cc6a
                                                                            • Instruction Fuzzy Hash: 0331A4323146418BD721CF39E94478E7BA5F78CB90F594125FF85837A8DE39E8418B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireCloseCreateCriticalHandleLeaveLockObjectSectionSingleThreadWait
                                                                            • String ID:
                                                                            • API String ID: 1076354578-0
                                                                            • Opcode ID: 6b17b4ff8c68f084d7edec882389f0a064dc13ffb3c5964e569178e7a7efeac2
                                                                            • Instruction ID: 3f187c02f36e3f14adddbe3136211ac54604a36991fc35afaae4015438d5f421
                                                                            • Opcode Fuzzy Hash: 6b17b4ff8c68f084d7edec882389f0a064dc13ffb3c5964e569178e7a7efeac2
                                                                            • Instruction Fuzzy Hash: 42211436204A4089EB169F13E9957A977A4F78CBC4F998022DB5D43375DF38C945C300
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Value$ErrorLast_wcsdup$AllocateBackslashCloseCreateFileHandleHeapLocalNamePathTempThreadTimewcslen
                                                                            • String ID: *.*$v.txt
                                                                            • API String ID: 2959618253-1070794288
                                                                            • Opcode ID: 7d4b2b2fc816c92bb1185460eabccae020a26ff1b112a4ceefeb5ceeefcd8df6
                                                                            • Instruction ID: ebd79884b6acf65e273896bca3bd48ee0990bf379aa2e10b6c5a306d0126e119
                                                                            • Opcode Fuzzy Hash: 7d4b2b2fc816c92bb1185460eabccae020a26ff1b112a4ceefeb5ceeefcd8df6
                                                                            • Instruction Fuzzy Hash: 0DF19DB7E69644D5EA1777B3BC8B7E80261D76C3A0F200110FF18077A3AD7898EA4B11
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ??3@_malloc_dbg
                                                                            • String ID: Curl_poll(%d ds, %d ms)$Mozilla/5.0 Gecko/41.0 Firefox/41.0
                                                                            • API String ID: 149304988-3927391783
                                                                            • Opcode ID: bca5ce2e32ccd7a7d44e0ff5c962c3d679696d147c5e8713ec2aebbde70484c3
                                                                            • Instruction ID: 216de19f629e2470ec839688be22b7c39e7fd8db2a665d3cc6ef9c28336ad809
                                                                            • Opcode Fuzzy Hash: bca5ce2e32ccd7a7d44e0ff5c962c3d679696d147c5e8713ec2aebbde70484c3
                                                                            • Instruction Fuzzy Hash: FE71E47230468445EB678B2798407EA6691FB4EBF4F145225EF6A23BE5EB3CDC46C340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ValueWindow$AllocateCreateHeapLongmemset
                                                                            • String ID: Edit
                                                                            • API String ID: 1875252383-554135844
                                                                            • Opcode ID: 49f00f6dd40d4ccb68d246f976e089c637716b8fb9d76dd60d1728b398f8c760
                                                                            • Instruction ID: b9d2b2513eefeffc0882bcf54f21a73e43410916b631438fa165fd4c17e451b4
                                                                            • Opcode Fuzzy Hash: 49f00f6dd40d4ccb68d246f976e089c637716b8fb9d76dd60d1728b398f8c760
                                                                            • Instruction Fuzzy Hash: EC51F872215B809AEB22CF17E8447C67BA4F78DB94F854226AB8C43775EB3DD145C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Prop$LongWindow
                                                                            • String ID: pb_officemenu_callback
                                                                            • API String ID: 3630290438-2649619063
                                                                            • Opcode ID: 021a553a63ca5b9974b5fe52888576ce5c2d709f454171bc0fc44ad295db91db
                                                                            • Instruction ID: d864efedbd5dcebc955101cce65fe6542f53a36e2692cf51cac2a7bedd244af8
                                                                            • Opcode Fuzzy Hash: 021a553a63ca5b9974b5fe52888576ce5c2d709f454171bc0fc44ad295db91db
                                                                            • Instruction Fuzzy Hash: 76E0B6B4601B46CAEE169FA7B845BD42760BB4DF85F845065CB49173B0EF3882998704
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: AlphaBlend$msimg32.dll
                                                                            • API String ID: 2574300362-3639726679
                                                                            • Opcode ID: 2d34e8be6a81e5a4093df39eb0738a71cc46b6fbd4f820317fd7298da2c67ace
                                                                            • Instruction ID: 80d89e19dddfdc166a83be06b3956ba708e072cd6b964baf7a3232d160d9ab68
                                                                            • Opcode Fuzzy Hash: 2d34e8be6a81e5a4093df39eb0738a71cc46b6fbd4f820317fd7298da2c67ace
                                                                            • Instruction Fuzzy Hash: 6CE0E570512A0089FB0AAF13FD463E037E0BB8C741F900528860E423B0DBBC91548B90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AddressLibraryLoadProc
                                                                            • String ID: HtmlHelpW$hhctrl.ocx
                                                                            • API String ID: 2574300362-3773518134
                                                                            • Opcode ID: af41998f4dad1d89bc22652a3260f8d2ad5e3be60e8a2183d632dc01dedbacd0
                                                                            • Instruction ID: 194faf7b0794818a6955e82959a5a85970d0b046ede49be22ddf01e5b23c96ab
                                                                            • Opcode Fuzzy Hash: af41998f4dad1d89bc22652a3260f8d2ad5e3be60e8a2183d632dc01dedbacd0
                                                                            • Instruction Fuzzy Hash: C7E0E278602A02D6EA069F12A99439426E0B74DB40F8100A8860D023B4EF3884168610
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$Free$Allocate
                                                                            • String ID:
                                                                            • API String ID: 3472947110-0
                                                                            • Opcode ID: 10d6d879d30df3dae176e942c680bba3359aa4f0b8af3985456c19bcd3b25fcc
                                                                            • Instruction ID: 690f51f11fd55dd44884fffc0698b0bff0444d4583156c2bb34a6804acaca47b
                                                                            • Opcode Fuzzy Hash: 10d6d879d30df3dae176e942c680bba3359aa4f0b8af3985456c19bcd3b25fcc
                                                                            • Instruction Fuzzy Hash: 4B316B72200B809BE715CF23EA8439977A4F78CB80F588525EF9903B64DF79E465C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$ClipboardFormatRegister$InitializeProcmalloc
                                                                            • String ID:
                                                                            • API String ID: 91366664-0
                                                                            • Opcode ID: aa9b75f5386dfc0db8df2177c9cfcf37b8f39b39492cd4f08124e947a016817e
                                                                            • Instruction ID: 4edd6566ee4a339750a031d0396d905d4ed072ac1afd5d2ff78e88b422afa674
                                                                            • Opcode Fuzzy Hash: aa9b75f5386dfc0db8df2177c9cfcf37b8f39b39492cd4f08124e947a016817e
                                                                            • Instruction Fuzzy Hash: A321D332F08A8082E714DF53A9549AE6356ABC5FD0F544030DE3E47B89CF7EE4828340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ??3@$_calloc_dbg_malloc_dbg
                                                                            • String ID:
                                                                            • API String ID: 3423559903-0
                                                                            • Opcode ID: f314fc00f65b947275321ba1abf922f49c3417c95078a5c6874ccc732330d156
                                                                            • Instruction ID: 4ab6d10a0c1104f9002c9864f9dd137043c3262c7711fc655137db15acea355f
                                                                            • Opcode Fuzzy Hash: f314fc00f65b947275321ba1abf922f49c3417c95078a5c6874ccc732330d156
                                                                            • Instruction Fuzzy Hash: FB214F32616B8085E781CF26E84039A36A0F788BA4F585135EF9E577A8DF38C4908B50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ButtonChecked$RectWindowceil
                                                                            • String ID:
                                                                            • API String ID: 3899230379-0
                                                                            • Opcode ID: 93d39dc2aba75ad2a2f8baef5f6b1f758d232298bb0298e8e96bf0756355cb2a
                                                                            • Instruction ID: 3ed9f3b84781f675329556019227889ef3c52b7b2c02e9b4950f32b30c7b795e
                                                                            • Opcode Fuzzy Hash: 93d39dc2aba75ad2a2f8baef5f6b1f758d232298bb0298e8e96bf0756355cb2a
                                                                            • Instruction Fuzzy Hash: 7211307670468086E751DF2AE841BAA7761F7C8BE4F149311EF6A57BE9CF38C4428B00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CallProcWindow$RectUpdate
                                                                            • String ID:
                                                                            • API String ID: 956583892-0
                                                                            • Opcode ID: 2354f96fc10e7db040eaae6ed6695d54ec97f70ddcc9b22b512919b1beeb0a97
                                                                            • Instruction ID: e988b0b752da5e46e9d4650d23acd5dc3b4c0439c65e876c48dbe4a5af84ef6e
                                                                            • Opcode Fuzzy Hash: 2354f96fc10e7db040eaae6ed6695d54ec97f70ddcc9b22b512919b1beeb0a97
                                                                            • Instruction Fuzzy Hash: 6F115E71634A4086F622DF23F8447A9A760B78DFC5F444521AF4A57BB9DA7DC4018700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Value$AllocateCreateHeapWindowmemset
                                                                            • String ID: Static
                                                                            • API String ID: 2419737561-2272013587
                                                                            • Opcode ID: 42fcea230a7bbd279f7766e9f701b309ba4d49d8920facea435ded5ffc9200cc
                                                                            • Instruction ID: 6ddcfd062129714c094d33133924cac4ec3d52f34d82b7001bd9defbaca30ecb
                                                                            • Opcode Fuzzy Hash: 42fcea230a7bbd279f7766e9f701b309ba4d49d8920facea435ded5ffc9200cc
                                                                            • Instruction Fuzzy Hash: AA411C76615B808AEB62CF16E8807C67BA4F78CB94F84422AAB9C43775DB3DC145CB44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Value$AllocateCreateHeapWindowmemset
                                                                            • String ID: Button
                                                                            • API String ID: 2419737561-1034594571
                                                                            • Opcode ID: 7ea70e526704e5d3c2137e541c402ba5e03b0e297ef175390141bf6614d3e5dd
                                                                            • Instruction ID: c0a8b1e1051e6d8c8a896044b1eeb2ade8e944ba4d66e06d48cfdcf2dee127a5
                                                                            • Opcode Fuzzy Hash: 7ea70e526704e5d3c2137e541c402ba5e03b0e297ef175390141bf6614d3e5dd
                                                                            • Instruction Fuzzy Hash: 9441E972204B848AEB62DF16E9807CA7BA0F78CB94F404126EB5D837B9DB79C545CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Value$AllocateCreateHeapWindowmemset
                                                                            • String ID: Button
                                                                            • API String ID: 2419737561-1034594571
                                                                            • Opcode ID: bc0be5c61b9050d2b30ea71fda43069fd3696cc9296c54b944a2607e50edc1b9
                                                                            • Instruction ID: 7b6e2004c375bad6f8fdd601d3178fefb23a00ba84c055c3d5fc569436a4f360
                                                                            • Opcode Fuzzy Hash: bc0be5c61b9050d2b30ea71fda43069fd3696cc9296c54b944a2607e50edc1b9
                                                                            • Instruction Fuzzy Hash: FD310771605A848AEB22CF16F9403DABBA5F78C790F40422AEB8C477B5EB7DC545CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateFile$AcquireAllocateCriticalHeapLeaveLockSection
                                                                            • String ID:
                                                                            • API String ID: 3315829013-0
                                                                            • Opcode ID: c9be869c75ffcf1ffbfc23eff0d8c888bf9a31b93fa89c7bf280bbb6c50e70b5
                                                                            • Instruction ID: 245f9eccafd189cdcf7c25ff0f5035ea0ebf2e3c30c11a691a0857230a801ebe
                                                                            • Opcode Fuzzy Hash: c9be869c75ffcf1ffbfc23eff0d8c888bf9a31b93fa89c7bf280bbb6c50e70b5
                                                                            • Instruction Fuzzy Hash: 8F3141326157808AEB518F27A944796BAA0F78CBF4F094735AFB947BE4CB78D4118B04
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap$Value
                                                                            • String ID:
                                                                            • API String ID: 2497967046-0
                                                                            • Opcode ID: 49a4dad35a94be57cfac48aa09ba3cbc473bedaa79613bc40b0839159e9dbce1
                                                                            • Instruction ID: 78593fb721e37414f033d63e927ebdbd986d799233c8d4747f5146571deceb17
                                                                            • Opcode Fuzzy Hash: 49a4dad35a94be57cfac48aa09ba3cbc473bedaa79613bc40b0839159e9dbce1
                                                                            • Instruction Fuzzy Hash: 18316336609B44C6DB25CF1AE49135ABBA0F7CCBA8F144216EB8D43778DB78C681CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap$Value
                                                                            • String ID:
                                                                            • API String ID: 2497967046-0
                                                                            • Opcode ID: 17f37e2a8e0ceee9280e77000b53c739a84a8b65e75333f1700e164d1442fef5
                                                                            • Instruction ID: 486f05978c46c03407e230d7dc019030803508d5e334c39bd380dde77f6094a1
                                                                            • Opcode Fuzzy Hash: 17f37e2a8e0ceee9280e77000b53c739a84a8b65e75333f1700e164d1442fef5
                                                                            • Instruction Fuzzy Hash: C721D576609A40C6DA24DF1AE89136ABBB1FBCDB84F104026EB8D87778DF3DC5418B00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$Allocate$Free
                                                                            • String ID:
                                                                            • API String ID: 4277724868-0
                                                                            • Opcode ID: a967ec9a5a5a6dda2fe9fff8d2f2cd491b509e21a8b00e8389956681cc3c30f1
                                                                            • Instruction ID: 552704e9442e3032d94a7e1afa445caf5f344ec3306ab8c86bbf51bd3d4830cc
                                                                            • Opcode Fuzzy Hash: a967ec9a5a5a6dda2fe9fff8d2f2cd491b509e21a8b00e8389956681cc3c30f1
                                                                            • Instruction Fuzzy Hash: C6218336218A8486EB259F16E85439ABBB1F7CDB84F508122EB8D43778DF3DC541CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireChildCriticalEnumLeaveLockParentRectSectionWindowWindows
                                                                            • String ID:
                                                                            • API String ID: 48959757-0
                                                                            • Opcode ID: ef18355e43c21ed366e221ded0eb7d75f480a57ac7b10aa697d46b57cbce97aa
                                                                            • Instruction ID: 3f38871db054c5b69e8cac32b919378c6f5896409bf79de4695afb01aaa78fb5
                                                                            • Opcode Fuzzy Hash: ef18355e43c21ed366e221ded0eb7d75f480a57ac7b10aa697d46b57cbce97aa
                                                                            • Instruction Fuzzy Hash: E5110332214B8486EB118F1BE94079ABBA1F788FC4F089122EF8D47B69CF38C441CB44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FolderFromListLocationPathwcslen
                                                                            • String ID:
                                                                            • API String ID: 376986313-0
                                                                            • Opcode ID: 7e3896b39ac32ff4c2689654c1c15c0d08600e5491f596e8dc0fcf8bffef6527
                                                                            • Instruction ID: 1d8be3c98689690d0c13841c0c9b7b448447928f2e1dc868d082cf9a224d850e
                                                                            • Opcode Fuzzy Hash: 7e3896b39ac32ff4c2689654c1c15c0d08600e5491f596e8dc0fcf8bffef6527
                                                                            • Instruction Fuzzy Hash: 9A018C32320A5092E7618F27E5857AE63B4FB98BC0F558134EF5D83764EF35C8568748
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateDirectorywcslenwcsncpy
                                                                            • String ID:
                                                                            • API String ID: 961886536-0
                                                                            • Opcode ID: ab7810b2da6d2b59c3fe5451aec6b3706cbb6a298658312f5cf4c1ebe3e755af
                                                                            • Instruction ID: b52ac60cc556f6047f29b04c56e8c975d77d484509379350962b5591f2603e39
                                                                            • Opcode Fuzzy Hash: ab7810b2da6d2b59c3fe5451aec6b3706cbb6a298658312f5cf4c1ebe3e755af
                                                                            • Instruction Fuzzy Hash: D801B17621168091EF72DB62D8A43E96250FB9C784F814131AB8D436A8EB7CC24AC708
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Window$CallLongProc
                                                                            • String ID:
                                                                            • API String ID: 4084987330-0
                                                                            • Opcode ID: 324557f9100b9ba659e0572719b2cecf0ee86b8b71a60bb968cb9a8889ed2bd7
                                                                            • Instruction ID: 03a81f10e0d836b133075b4e28697ce2b278e2e5a2988aaf1da04379dcc0a33a
                                                                            • Opcode Fuzzy Hash: 324557f9100b9ba659e0572719b2cecf0ee86b8b71a60bb968cb9a8889ed2bd7
                                                                            • Instruction Fuzzy Hash: F0F06936710B508AE7108F27E844B59BA60F7D9FA4F188125AF4903BA4CF38C8568B44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: fread
                                                                            • String ID: o
                                                                            • API String ID: 1766058891-252678980
                                                                            • Opcode ID: ee0eb557d876965eac43b6ea62f6f9c12b49a3e156a54aac625a2df0ac36c1c8
                                                                            • Instruction ID: e38e6f55ea59656e01a449e665f8ad494bf8d632d45c6a777caaa9fc2e1cf2d3
                                                                            • Opcode Fuzzy Hash: ee0eb557d876965eac43b6ea62f6f9c12b49a3e156a54aac625a2df0ac36c1c8
                                                                            • Instruction Fuzzy Hash: 9D71B2323103858AEF268B2AE4407ED77A2FB497D8F445126EF4947BE5DB38C452C714
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _malloc_dbg
                                                                            • String ID: Out of memory
                                                                            • API String ID: 1527718024-696950042
                                                                            • Opcode ID: 138cb016a45ad1076b4cf82d57bbfd7b353780d121b137148af128cdd958b86b
                                                                            • Instruction ID: d48be999f3bc0458cda334dfa9ab7df9dcf51fc2a39847fc4bacf0e514eaf03e
                                                                            • Opcode Fuzzy Hash: 138cb016a45ad1076b4cf82d57bbfd7b353780d121b137148af128cdd958b86b
                                                                            • Instruction Fuzzy Hash: 83E046B031AB8580FD6FABA7A5D53F502956F5DBD0F1C0835AF1E0B3B1EE3880824210
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireCreateCriticalFontLeaveLockSection
                                                                            • String ID:
                                                                            • API String ID: 3924561995-0
                                                                            • Opcode ID: bccf3d836e6ef0da998f451242074ad6c2e76c6fbdcd88817296b6d57c3bc385
                                                                            • Instruction ID: bc4782ca98bb00218ec33c9cacca7c529f489fd37d93004a790b1a7c0f83eedb
                                                                            • Opcode Fuzzy Hash: bccf3d836e6ef0da998f451242074ad6c2e76c6fbdcd88817296b6d57c3bc385
                                                                            • Instruction Fuzzy Hash: E73173332047818AEB12CF5AE89079BBAE4F7887E4F544625EF69477E4EB78C451CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireAllocateCreateCriticalFileHeapLeaveLockSection
                                                                            • String ID:
                                                                            • API String ID: 35634316-0
                                                                            • Opcode ID: 4ab8a49597c68ab51c75921afc1c268e0878ae8af21936fb2685a82dce668648
                                                                            • Instruction ID: ac6756dccaeada2bb5cdabfc0f969a8869358d7ffe0eaf56485c1f4afc58ba25
                                                                            • Opcode Fuzzy Hash: 4ab8a49597c68ab51c75921afc1c268e0878ae8af21936fb2685a82dce668648
                                                                            • Instruction Fuzzy Hash: 95216A32205B408AEB519F17FA4079AB6A0F78CBF4F488724AB7947BE4CF78D4618744
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: bc781e1a2d37f473ec89b141d8ba33e39c57813a73ee3448d4112420ddf3f6ff
                                                                            • Instruction ID: 680a745fc6eef3b5f0119aeabfae8e6847f9ed4feb4793ae2ef2673e0117ad58
                                                                            • Opcode Fuzzy Hash: bc781e1a2d37f473ec89b141d8ba33e39c57813a73ee3448d4112420ddf3f6ff
                                                                            • Instruction Fuzzy Hash: 3F213232614B84ABE715CF23EA443997BA4F399B84F588524DB890BF56CF79E0B1C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • _errno.LIBCMT ref: 00007FFDFF236363
                                                                              • Part of subcall function 00007FFDFF232254: DecodePointer.KERNEL32 ref: 00007FFDFF23227B
                                                                            • RtlAllocateHeap.NTDLL(?,?,?,?,00000000,00007FFDFF232AB3,?,?,?,00007FFDFF230D9F,?,?,?,00007FFDFF23232D), ref: 00007FFDFF2363AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: AllocateDecodeHeapPointer_errno
                                                                            • String ID:
                                                                            • API String ID: 15861996-0
                                                                            • Opcode ID: 6c06a48bf546cd914a236b5a30d788fd99260294df85df3a73b8b044cc8a529b
                                                                            • Instruction ID: d05100e0f3c3a5fb09a1b4a644ac1c42e1e2d5217009473c52e672fc50988a6e
                                                                            • Opcode Fuzzy Hash: 6c06a48bf546cd914a236b5a30d788fd99260294df85df3a73b8b044cc8a529b
                                                                            • Instruction Fuzzy Hash: 7F11C4A2B0824281FB154B65D664FB967A5BF84F94F088731DE3DCA6DDDF7CE0808600
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ??3@
                                                                            • String ID:
                                                                            • API String ID: 613200358-0
                                                                            • Opcode ID: 397ea9d017a93245fcb8a4b73f0af12a8ef3a5589f1a4a05b8faa9de59477c31
                                                                            • Instruction ID: 2738b0ec4ec0e24fa8a2e5f37df09ccd0774cfe9b21d796faaa6701e5da021e5
                                                                            • Opcode Fuzzy Hash: 397ea9d017a93245fcb8a4b73f0af12a8ef3a5589f1a4a05b8faa9de59477c31
                                                                            • Instruction Fuzzy Hash: F80112B320254485EF6ACFAAD0943E823A4FF89FD4F1C66119B59472E5DB35CAC2C200
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Timer$Kill
                                                                            • String ID:
                                                                            • API String ID: 3307318486-0
                                                                            • Opcode ID: 072ef83535ecc30f3334ec0a55a301971fd786f5df42f21ab2bd1e7d34d56c27
                                                                            • Instruction ID: 21840f387d8dabc29e89992e29d7bb5027da434177bc93de5eead03f2667446c
                                                                            • Opcode Fuzzy Hash: 072ef83535ecc30f3334ec0a55a301971fd786f5df42f21ab2bd1e7d34d56c27
                                                                            • Instruction Fuzzy Hash: 75F06233B28685C6D7549F20D0567F837A0F745B0CFAC8130CAA94E254CF299599C750
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Timer$Kill
                                                                            • String ID:
                                                                            • API String ID: 3307318486-0
                                                                            • Opcode ID: b09841acffa7056f7a30501fc01371b772154fb9e9a757475d0913cc32261305
                                                                            • Instruction ID: 8a219fb253668eabaf13115f64cb0b46b0ee06c7fb6922be2cfcb8393f3a62e5
                                                                            • Opcode Fuzzy Hash: b09841acffa7056f7a30501fc01371b772154fb9e9a757475d0913cc32261305
                                                                            • Instruction Fuzzy Hash: A3F0CD32B18685C6D7108F26E19099873A1FB84B48F69C131C76D4F658CF3AE452C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap$Value$Load$AllocCriticalCursorIconInitializeSection
                                                                            • String ID:
                                                                            • API String ID: 2482360699-0
                                                                            • Opcode ID: 651a2b23da79e8d65a3f8ce19a1dcf2f6722dd49c05b27aa9f98032fa56f3bf7
                                                                            • Instruction ID: 09bb3a12d48358b5c987e25ef62efe9fb28c8173136af7a76369036511867a5c
                                                                            • Opcode Fuzzy Hash: 651a2b23da79e8d65a3f8ce19a1dcf2f6722dd49c05b27aa9f98032fa56f3bf7
                                                                            • Instruction Fuzzy Hash: E8F0E235601B11CAF706EF27E815BDA37A1FB8E704F4089299B09037B2EF3D9566C640
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$AttributesDelete
                                                                            • String ID:
                                                                            • API String ID: 2910425767-0
                                                                            • Opcode ID: 523116f317e0b37df0ea50e201f56b420c1ac289f4f572830257359e87b20e02
                                                                            • Instruction ID: 189a30bb9b122f408657d16bb332bdda71a93b14a13cffd61a8fcc9b779a46d7
                                                                            • Opcode Fuzzy Hash: 523116f317e0b37df0ea50e201f56b420c1ac289f4f572830257359e87b20e02
                                                                            • Instruction Fuzzy Hash: 1DE02E3070200089FB7F4BA36C667F00181EF9D380F288130AE02032F8CB7C50890248
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Heap$CreateInformation
                                                                            • String ID:
                                                                            • API String ID: 1774340351-0
                                                                            • Opcode ID: f4fcbb66ce901025b55f67e3821f6c73a10a52db3cf1abbaa1ef3e5b0aaa4f72
                                                                            • Instruction ID: 364524b5897daa59c6fa5a6038907b6bdad4aac2ed696d155b200b6d608ea2b0
                                                                            • Opcode Fuzzy Hash: f4fcbb66ce901025b55f67e3821f6c73a10a52db3cf1abbaa1ef3e5b0aaa4f72
                                                                            • Instruction Fuzzy Hash: AEE0D8B0B2574142F7489B11A429B653350FF48340F804138E96DC27C8DF7CC0808A00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CallProcRectValidateWindow
                                                                            • String ID:
                                                                            • API String ID: 3098300140-0
                                                                            • Opcode ID: a7234a047eeb9450c94c17bf9e30c967892f29f6966a028a014a9e8127dd90a9
                                                                            • Instruction ID: a625f5c3b94f08483a7cadb84c6c2e6b7c4d97acd8588b1269bdc859196154fa
                                                                            • Opcode Fuzzy Hash: a7234a047eeb9450c94c17bf9e30c967892f29f6966a028a014a9e8127dd90a9
                                                                            • Instruction Fuzzy Hash: F8D0A734B1468485EA219F33FC407BA1661BBEDBC4F518460EE4D47274CE3C8024B604
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorLastSleep
                                                                            • String ID:
                                                                            • API String ID: 1458359878-0
                                                                            • Opcode ID: b1423a8644219b21860269d51c0de9ee150eb64b25dac3572b0a2b3eab9c9144
                                                                            • Instruction ID: fc88d2a18e3ce921423f105ed736776227badfd14a9b4fa98148301561a33281
                                                                            • Opcode Fuzzy Hash: b1423a8644219b21860269d51c0de9ee150eb64b25dac3572b0a2b3eab9c9144
                                                                            • Instruction Fuzzy Hash: F2D01274F1240186FB1A3B339C553B610907B5C771FC00618D725852F0DE3C45AB4A00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Heap$Allocate$AllocCreateValue
                                                                            • String ID:
                                                                            • API String ID: 3361498153-0
                                                                            • Opcode ID: e8acd9415d81985eb8cb4f6844d50d2bf3ac95edaef8d35d432be9bbb665cf37
                                                                            • Instruction ID: 28b70351988f47dbce6a353754498af082549b1a05e9bc17540dacee7fd0c12f
                                                                            • Opcode Fuzzy Hash: e8acd9415d81985eb8cb4f6844d50d2bf3ac95edaef8d35d432be9bbb665cf37
                                                                            • Instruction Fuzzy Hash: 54D0C938A22750CAF7567F72AD5AB9A2AA0F74C741F906429DB05427B5DF3C80558A00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ??3@FreeHeap
                                                                            • String ID:
                                                                            • API String ID: 1511904387-0
                                                                            • Opcode ID: 36065e0689b59ae25cc90955ed544104d3806b3e4de492921f11b493857ea2d2
                                                                            • Instruction ID: 4a5c298898c067f69ff7dadd2c3cafdbdbc24683dc54892e802b16890c4e2210
                                                                            • Opcode Fuzzy Hash: 36065e0689b59ae25cc90955ed544104d3806b3e4de492921f11b493857ea2d2
                                                                            • Instruction Fuzzy Hash: C80112B2604A8089F716CF739C557E52792F78DB84F4990169F0857266CE388492D350
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CloseFreeHandleHeap
                                                                            • String ID:
                                                                            • API String ID: 1642312469-0
                                                                            • Opcode ID: b0e64ecd165a58aeca844b01025d1d498112bca6d1c31d3122f3006aa1eb1935
                                                                            • Instruction ID: ab48b880740cca082a7c7b77d5e3445cb164434db1b37ac447be66a5cb8cbf4c
                                                                            • Opcode Fuzzy Hash: b0e64ecd165a58aeca844b01025d1d498112bca6d1c31d3122f3006aa1eb1935
                                                                            • Instruction Fuzzy Hash: 85013131614A4095EA579B27E9997E96790BB8DBE4F049221AF2D0B3F5DE38C440C344
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • malloc.LIBCMT ref: 00007FFDFF232A33
                                                                              • Part of subcall function 00007FFDFF22FF04: _FF_MSGBANNER.LIBCMT ref: 00007FFDFF22FF34
                                                                              • Part of subcall function 00007FFDFF22FF04: RtlAllocateHeap.NTDLL(?,?,?,00007FFDFF22E0FB,?,?,?,?,?,?,?,00007FFDFF1C1A47), ref: 00007FFDFF22FF59
                                                                              • Part of subcall function 00007FFDFF22FF04: _errno.LIBCMT ref: 00007FFDFF22FF7D
                                                                              • Part of subcall function 00007FFDFF22FF04: _errno.LIBCMT ref: 00007FFDFF22FF88
                                                                            • Sleep.KERNEL32(?,?,00000000,00007FFDFF2344B5,?,?,?,00007FFDFF23455F,?,?,?,?,?,?,00000000,00007FFDFF230DC4), ref: 00007FFDFF232A4A
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: _errno$AllocateHeapSleepmalloc
                                                                            • String ID:
                                                                            • API String ID: 4275769124-0
                                                                            • Opcode ID: 05b6573d59e8e93d7b5710d36b3a35c6d201a7e2f30ebd1697e0108080f8a896
                                                                            • Instruction ID: 00aedc1b8d87ee24c7d5e7ac2b278d98f17f77c5536fb9d44473152519f4c245
                                                                            • Opcode Fuzzy Hash: 05b6573d59e8e93d7b5710d36b3a35c6d201a7e2f30ebd1697e0108080f8a896
                                                                            • Instruction Fuzzy Hash: C3F0C272B19A8686EB509F12A56046E73A1EB94B90F440334EA7DCB7D9CF7CE9918700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 557f77a70a80bbb14c1a7bd53803204ebe58c77c4546cf7bad90a32a775a646e
                                                                            • Instruction ID: 9f44d1bca106a490c2560e7080bd5bb352a4710588757f4ab383c4674cec1dab
                                                                            • Opcode Fuzzy Hash: 557f77a70a80bbb14c1a7bd53803204ebe58c77c4546cf7bad90a32a775a646e
                                                                            • Instruction Fuzzy Hash: EAE15D37F1968381EB649B1884B4BB827A0EB41F84F684735D67D866DDCF2DF8529340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: _mktime64
                                                                            • String ID:
                                                                            • API String ID: 2731814466-0
                                                                            • Opcode ID: c4ac7a430b6e43bbaa99b5db4a950bb6ad107a1f8dbe209fd0eb16066980884c
                                                                            • Instruction ID: 02e408cabc781342f713d8645153e85f785dfdecb1b3bad975e1cb0d83d52dbe
                                                                            • Opcode Fuzzy Hash: c4ac7a430b6e43bbaa99b5db4a950bb6ad107a1f8dbe209fd0eb16066980884c
                                                                            • Instruction Fuzzy Hash: 8A512633E10A4046FB2ACA67C4853FD6BA9B35C3D4F148126FF0597AE1CB7AD881D641
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireCriticalLeaveLockSectionValueVisibleWindow
                                                                            • String ID:
                                                                            • API String ID: 110955310-0
                                                                            • Opcode ID: 2368624805d7a74cc8eea8286cfc9d370ce585c758d10cff553a477e8559904a
                                                                            • Instruction ID: 3e6afee2e6dfae3ceab8b3e8ba3e818aa7bd6282ed34b18856f847f8dc34eaa0
                                                                            • Opcode Fuzzy Hash: 2368624805d7a74cc8eea8286cfc9d370ce585c758d10cff553a477e8559904a
                                                                            • Instruction Fuzzy Hash: 2251FF32215A41D9FA23AF63BD527E91791B74D7D4F180825BF0D0B3B2EF7AD4908610
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: InfoScroll
                                                                            • String ID:
                                                                            • API String ID: 629608716-0
                                                                            • Opcode ID: 00247146936d7c4eeb0a6acdb56a4b3edebd83f53ffac34bfaae8a46000c57b0
                                                                            • Instruction ID: eb7687e0ebdd9d53ee9f8cb2e0a8f061177e80001783617342085993c53db38a
                                                                            • Opcode Fuzzy Hash: 00247146936d7c4eeb0a6acdb56a4b3edebd83f53ffac34bfaae8a46000c57b0
                                                                            • Instruction Fuzzy Hash: DA41D033A29381CBD764CF11E1945AEBBB5F788B84F54512AE7A903B58CB39D850CF00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ??3@
                                                                            • String ID:
                                                                            • API String ID: 613200358-0
                                                                            • Opcode ID: 66cac8fe770576109460e470b2552ea287734445d989293d7b112310b5212771
                                                                            • Instruction ID: 4f736889138cb5aef3aec48fec8f000dddad9f6279447cdc5aa67f812c1b5a7c
                                                                            • Opcode Fuzzy Hash: 66cac8fe770576109460e470b2552ea287734445d989293d7b112310b5212771
                                                                            • Instruction Fuzzy Hash: BE313072711A4082EA1AEF27D5513AD73A0FB8DBD4F484025FB4947BA6DF78E861C380
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                              • Part of subcall function 0000000140073140: TlsGetValue.KERNEL32 ref: 0000000140073158
                                                                              • Part of subcall function 0000000140072E00: GetLastError.KERNEL32 ref: 0000000140072E04
                                                                              • Part of subcall function 0000000140072E00: TlsGetValue.KERNEL32 ref: 0000000140072E14
                                                                              • Part of subcall function 0000000140072E00: SetLastError.KERNEL32 ref: 0000000140072E31
                                                                              • Part of subcall function 000000014004C1BC: LoadLibraryW.KERNEL32 ref: 000000014004C1F5
                                                                              • Part of subcall function 000000014004C1BC: GetProcAddress.KERNEL32 ref: 000000014004C20D
                                                                              • Part of subcall function 000000014004C1BC: wcscpy.MSVCRT ref: 000000014004C23E
                                                                              • Part of subcall function 000000014004C1BC: wcscat.MSVCRT ref: 000000014004C24D
                                                                              • Part of subcall function 000000014004C1BC: wcslen.MSVCRT ref: 000000014004C255
                                                                              • Part of subcall function 000000014004C1BC: FreeLibrary.KERNEL32 ref: 000000014004C26B
                                                                              • Part of subcall function 000000014004C1BC: wcscat.MSVCRT ref: 000000014004C290
                                                                              • Part of subcall function 000000014004C1BC: wcslen.MSVCRT ref: 000000014004C298
                                                                              • Part of subcall function 0000000140072E50: TlsGetValue.KERNEL32 ref: 0000000140072E63
                                                                              • Part of subcall function 0000000140072E50: RtlAllocateHeap.NTDLL ref: 0000000140072EA6
                                                                              • Part of subcall function 0000000140072E50: RtlReAllocateHeap.NTDLL ref: 0000000140072ED3
                                                                            • PathAddBackslashW.SHLWAPI ref: 000000014000D119
                                                                              • Part of subcall function 000000014004BB64: wcsncpy.MSVCRT ref: 000000014004BB82
                                                                              • Part of subcall function 000000014004BB64: wcslen.MSVCRT ref: 000000014004BB94
                                                                              • Part of subcall function 000000014004BB64: CreateDirectoryW.KERNEL32 ref: 000000014004BBE4
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: wcslen$Value$AllocateErrorHeapLastLibrarywcscat$AddressBackslashCreateDirectoryFreeLoadPathProcwcscpywcsncpy
                                                                            • String ID:
                                                                            • API String ID: 1679855796-0
                                                                            • Opcode ID: f64d57f6a6ed6cebcd74d2a7afb2e4a75d8c54752973f287be2470c1722c81d0
                                                                            • Instruction ID: 7518d534293f1204b131c68fa64bf139a33e79a35d8f95d5c56dc00e9c6ca9cb
                                                                            • Opcode Fuzzy Hash: f64d57f6a6ed6cebcd74d2a7afb2e4a75d8c54752973f287be2470c1722c81d0
                                                                            • Instruction Fuzzy Hash: 9C115EB6E25A44E5F91B7B73BC877D80321A76C390F504110BF09572B3AD7C51EA4B45
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$AcquireCriticalLeaveLockPointerSectionWritememcpy
                                                                            • String ID:
                                                                            • API String ID: 3116041622-0
                                                                            • Opcode ID: 56a6bdff6fe8edb0a03917202f887701f2f3cc40f13b3a9ce877d2762e13d0d0
                                                                            • Instruction ID: 18881a2bcd8e118ef7928cffc3829049da678ba539245af755595c64727ff0f5
                                                                            • Opcode Fuzzy Hash: 56a6bdff6fe8edb0a03917202f887701f2f3cc40f13b3a9ce877d2762e13d0d0
                                                                            • Instruction Fuzzy Hash: D8015A36718A9092EB119B56F48435AE7A0FB8DBC0F598436FF8C43B69DA38C8418B04
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireCriticalFileLeaveLockPointerSection
                                                                            • String ID:
                                                                            • API String ID: 3048853361-0
                                                                            • Opcode ID: f5e0f7e569a938d4553d2e05bded5de4b43f6ae2ff6afb2d7bdc8994ec86fbed
                                                                            • Instruction ID: 846396e8a09de132e6ce6769a4f4519e47256432b35fe8f376387d8dd9ad74cd
                                                                            • Opcode Fuzzy Hash: f5e0f7e569a938d4553d2e05bded5de4b43f6ae2ff6afb2d7bdc8994ec86fbed
                                                                            • Instruction Fuzzy Hash: 0301867271164486EF59CF6BE4853692790E78CBB4F045225EA2D873E4DE3CC8D1C710
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateProp$AcquireCriticalHeapLeaveLockLongMenuSectionWindow
                                                                            • String ID:
                                                                            • API String ID: 2911112708-0
                                                                            • Opcode ID: 42cf29abe022985a2e7b5411f3026ba295cf5e7959140fe7ef8e16bb2a61c277
                                                                            • Instruction ID: 46ba5f07f06461f11db500ecfe6deca1003a81e63bce99cc1974930617890eb5
                                                                            • Opcode Fuzzy Hash: 42cf29abe022985a2e7b5411f3026ba295cf5e7959140fe7ef8e16bb2a61c277
                                                                            • Instruction Fuzzy Hash: AD015A31211B8089FB66DB27A44439976A0F74CBE0F494635BF6C077E9DF78C9918744
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Create$AcquireCriticalHeapLeaveLockMenuPopupSection
                                                                            • String ID:
                                                                            • API String ID: 3609714891-0
                                                                            • Opcode ID: 10c630742c61ea02d13e2ca59f6bb95b7e9cbe9fa305852cbb8ec05c0dbc4785
                                                                            • Instruction ID: f070a851e0149d37037b42970fef5ce734a190899a6e0a23e9e609a354feb103
                                                                            • Opcode Fuzzy Hash: 10c630742c61ea02d13e2ca59f6bb95b7e9cbe9fa305852cbb8ec05c0dbc4785
                                                                            • Instruction Fuzzy Hash: 81015A71201B408AEB669B17E45439A66A0F78CBE0F095A35AF6D077E5DB78C481C784
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CallProcWindow
                                                                            • String ID:
                                                                            • API String ID: 2714655100-0
                                                                            • Opcode ID: 63fda6f2d3b90f10a1e1187f07ed52df0278f0370e1f3f1ba4772e4b2108130b
                                                                            • Instruction ID: 7990071d2a38ef10cba0e722b8f7cba0fbddc5cc2c6aae98e2948e9f55ec7a68
                                                                            • Opcode Fuzzy Hash: 63fda6f2d3b90f10a1e1187f07ed52df0278f0370e1f3f1ba4772e4b2108130b
                                                                            • Instruction Fuzzy Hash: A8F06731318A4082E6118F07F40038AE760FB8ABC0F688030FF9C87B69DA39C9528B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Caret
                                                                            • String ID:
                                                                            • API String ID: 1115476763-0
                                                                            • Opcode ID: 3364073bb209627ba320578a8e662740248f8183c3bbefc21863ca586bb71156
                                                                            • Instruction ID: 9ab389a99f914cce506eaa41487031027a12b566dd0d18a98c8bc3d8d0f704a1
                                                                            • Opcode Fuzzy Hash: 3364073bb209627ba320578a8e662740248f8183c3bbefc21863ca586bb71156
                                                                            • Instruction Fuzzy Hash: A8F06823F2A18386EB909B25D464EB93391EF41B84F5C1131D6795A1D9DF2DF882CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireCriticalLeaveLockSectionShowWindow
                                                                            • String ID:
                                                                            • API String ID: 3347344642-0
                                                                            • Opcode ID: 19e153e9759d8e97d2c253a91377dabe828eebb9646d22a09db612c8e2a86fb9
                                                                            • Instruction ID: 008f4708a4811243bbc38f88cf90d04839b66b5b6302e5aac926dadc95fa6db8
                                                                            • Opcode Fuzzy Hash: 19e153e9759d8e97d2c253a91377dabe828eebb9646d22a09db612c8e2a86fb9
                                                                            • Instruction Fuzzy Hash: 62F06D7170169085FF16CB9398913E62291FBDCFD8F6884255F1D473B5DE3AC8828300
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireCriticalFileFindLeaveLockNextSection
                                                                            • String ID:
                                                                            • API String ID: 2566760965-0
                                                                            • Opcode ID: 4e94c08cccfe50eadf6821d92fadb988587affa844ee2242cd23363ae4e55400
                                                                            • Instruction ID: 80e5968ce25acf8be85ab000f7e04334605018ddedf6ee4d8db64c41c43ab8cf
                                                                            • Opcode Fuzzy Hash: 4e94c08cccfe50eadf6821d92fadb988587affa844ee2242cd23363ae4e55400
                                                                            • Instruction Fuzzy Hash: 76F08971200681C5EB154F56ED803A46290F78CBF4F59C235AB3D473F5DB38C8958704
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$AcquireCriticalLeaveLockPointerSectionWrite
                                                                            • String ID:
                                                                            • API String ID: 2540408055-0
                                                                            • Opcode ID: d60d9d47e4f065e42ce1ee6e787e62e383724124571d5709814626d448b3941e
                                                                            • Instruction ID: 082dd46448a705c7fc13c163ccc617f5db57ea9b5962644482c33cb7d18cb6bf
                                                                            • Opcode Fuzzy Hash: d60d9d47e4f065e42ce1ee6e787e62e383724124571d5709814626d448b3941e
                                                                            • Instruction Fuzzy Hash: 81F0827211164085EB5ACF53E45879A77A0F78CB88F059026EB09073B9DB38C495CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Value$AllocateHeapMenu
                                                                            • String ID:
                                                                            • API String ID: 1798796344-0
                                                                            • Opcode ID: 2c442d74bc49ae7015f7c9359563ac4aeda0d9d47db671339dadf0de2236811b
                                                                            • Instruction ID: 14d976fbdc345034a102ee425907080e46d43c300f0c2389232c5755fc80c9e1
                                                                            • Opcode Fuzzy Hash: 2c442d74bc49ae7015f7c9359563ac4aeda0d9d47db671339dadf0de2236811b
                                                                            • Instruction Fuzzy Hash: A1F012B220198486EA12AF56E1943E967A1F788FC0F09D925EF09073A9CF78C8A4C744
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AcquireCriticalLeaveLockSectionTimer
                                                                            • String ID:
                                                                            • API String ID: 2188216108-0
                                                                            • Opcode ID: af9281121f6510893300f00ec542bd5cd1ee7b55326ae8f391bfafca2e8796a0
                                                                            • Instruction ID: 0e353f60ca4ce229b9b27ac6402eda38ac6cd0bc05243a85cf2627ea00211746
                                                                            • Opcode Fuzzy Hash: af9281121f6510893300f00ec542bd5cd1ee7b55326ae8f391bfafca2e8796a0
                                                                            • Instruction Fuzzy Hash: 18E09231714A9081EB518B53B844B9AAB60FBCCFC0F489435BF5D87B29DE3CC4428700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: ef2db61e50803a8ec3b4c65a70507900094f3ac6f3dbd3da36829219669562ff
                                                                            • Instruction ID: 886a3ca652e9b7483a029ec96223b8f43f73945d6c1e72b1de78244ff4bfe627
                                                                            • Opcode Fuzzy Hash: ef2db61e50803a8ec3b4c65a70507900094f3ac6f3dbd3da36829219669562ff
                                                                            • Instruction Fuzzy Hash: 68F030B6624654CBCB50CF3AE005669B7B0F349B88F204516DF4847724DB36C562CF10
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                              • Part of subcall function 00000001400721F0: RtlAcquirePebLock.NTDLL ref: 0000000140072209
                                                                              • Part of subcall function 00000001400721F0: RtlLeaveCriticalSection.NTDLL ref: 0000000140072226
                                                                              • Part of subcall function 000000014004D900: SetFilePointer.KERNEL32 ref: 000000014004D935
                                                                              • Part of subcall function 000000014004D080: SetFilePointer.KERNEL32 ref: 000000014004D0D4
                                                                            • SetEndOfFile.KERNEL32 ref: 000000014004D1BA
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: File$Pointer$AcquireCriticalLeaveLockSection
                                                                            • String ID:
                                                                            • API String ID: 2549087813-0
                                                                            • Opcode ID: 6215e8d3e819d288217bceaacdae4f289ba49103330836ed17c588c54203d23c
                                                                            • Instruction ID: df3f02ab434b44838f3695a314c7c7b62019c8cfcd70e231439030031eba05f7
                                                                            • Opcode Fuzzy Hash: 6215e8d3e819d288217bceaacdae4f289ba49103330836ed17c588c54203d23c
                                                                            • Instruction Fuzzy Hash: 1EE04631316640A0EE06AB53F9553EA62A0BB8CFC0F088031BF5E4B3BADE38C8508344
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Focus
                                                                            • String ID:
                                                                            • API String ID: 2734777837-0
                                                                            • Opcode ID: 96f0996e99b06dd449aedd88fe789c9d97847a05e7742e46e765f0b7619bd08e
                                                                            • Instruction ID: 0e1c487f8ef2749ff387cfe4319add1aadda08dcc34e45de498e92698cf921a8
                                                                            • Opcode Fuzzy Hash: 96f0996e99b06dd449aedd88fe789c9d97847a05e7742e46e765f0b7619bd08e
                                                                            • Instruction Fuzzy Hash: 9FE0E574B1294084ED5ADB1BD9953A816A0AB8CBF4F94832AAB3E473F4DE3A84524200
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CallProcWindow
                                                                            • String ID:
                                                                            • API String ID: 2714655100-0
                                                                            • Opcode ID: 87338098468cc9ab85642e252e63c712382b852e6a3e217f8e5faabf69bf4e9e
                                                                            • Instruction ID: 3eb5ca6b594b4af2ba0836341650f724cfe7828218401683c0be9cbe7d74ddf6
                                                                            • Opcode Fuzzy Hash: 87338098468cc9ab85642e252e63c712382b852e6a3e217f8e5faabf69bf4e9e
                                                                            • Instruction Fuzzy Hash: 8BD0A730B10A4085E722AB93EC85BEA1651B79DBC0F106070FF5D577F5DA3DC8118704
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: dd8d59afa42592c36a3245908324823f0dcfaef43541099f1e65c408819396cc
                                                                            • Instruction ID: aff727f0de9a7a4ffb9261fbb8394a4aa50d02643f4274f8a4727d928071e9a0
                                                                            • Opcode Fuzzy Hash: dd8d59afa42592c36a3245908324823f0dcfaef43541099f1e65c408819396cc
                                                                            • Instruction Fuzzy Hash: 21D08C34703B0088FD0F6F43AA8139826E0BB0C781F8829B8CB8D06370DA3C4C958700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925263104.0000000140042000.00000040.00000001.01000000.00000008.sdmp, Offset: 0000000140000000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925244332.0000000140000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.0000000140001000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.000000014039A000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925263104.00000001403C3000.00000040.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925544056.00000001403C5000.00000080.00000001.01000000.00000008.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925563252.00000001403C7000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_140000000_Bat_To_Exe_Converter.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateHeap
                                                                            • String ID:
                                                                            • API String ID: 10892065-0
                                                                            • Opcode ID: a25d225a6baa7dcad69abc5aa3dac0c19b8bd1a674fdca1386d9ec1895419c9f
                                                                            • Instruction ID: 9824b89684213303b12c0de4546fe463432a8921623b9f96407c0696c9f6de49
                                                                            • Opcode Fuzzy Hash: a25d225a6baa7dcad69abc5aa3dac0c19b8bd1a674fdca1386d9ec1895419c9f
                                                                            • Instruction Fuzzy Hash: 95C09B347516A1C6E7592B625C57B5A1550F34D341FD09819DA5501764CE7D81564B00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • malloc.LIBCMT ref: 00007FFDFF22E0F6
                                                                              • Part of subcall function 00007FFDFF22FF04: _FF_MSGBANNER.LIBCMT ref: 00007FFDFF22FF34
                                                                              • Part of subcall function 00007FFDFF22FF04: RtlAllocateHeap.NTDLL(?,?,?,00007FFDFF22E0FB,?,?,?,?,?,?,?,00007FFDFF1C1A47), ref: 00007FFDFF22FF59
                                                                              • Part of subcall function 00007FFDFF22FF04: _errno.LIBCMT ref: 00007FFDFF22FF7D
                                                                              • Part of subcall function 00007FFDFF22FF04: _errno.LIBCMT ref: 00007FFDFF22FF88
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: _errno$AllocateHeapmalloc
                                                                            • String ID:
                                                                            • API String ID: 3105967009-0
                                                                            • Opcode ID: fbbb7fdc57efdf51458817c3e5e168f641ab2f55b5a9b17b09f678d55096a9df
                                                                            • Instruction ID: 72f9ae97fafb7a568feaded46587dcd84f4c0d2c0665ed8025c9cdc8eff4875a
                                                                            • Opcode Fuzzy Hash: fbbb7fdc57efdf51458817c3e5e168f641ab2f55b5a9b17b09f678d55096a9df
                                                                            • Instruction Fuzzy Hash: F1010561B08A0791FB10EB10A8609B427A0AF56380F880635DD3EC66DAEF6CE744E740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • Sleep.KERNEL32(?,?,?,00007FFDFF230D9F,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF232AC5
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Sleep_errno
                                                                            • String ID:
                                                                            • API String ID: 1068366078-0
                                                                            • Opcode ID: 987fe2fcbdc9d1e325909607a2df3cd92253b1beacba056260e72759cb310de1
                                                                            • Instruction ID: 22a90529bd2fa25e521280eb31d45ca9626674a98f80f6ea5503782315082518
                                                                            • Opcode Fuzzy Hash: 987fe2fcbdc9d1e325909607a2df3cd92253b1beacba056260e72759cb310de1
                                                                            • Instruction Fuzzy Hash: 2301A772B25A8186E7548F169860469B7A1FB88FD0B084231DE7D8BBD8CF7CE891C704
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $#endregion$#region$;$_$case$else$elseif$endfunc$endif$endselect$endswitch$endwith$fold.comment$fold.compact$fold.preprocessor$for$func$next$select$switch$then$until$wend$while$with
                                                                            • API String ID: 0-3870396653
                                                                            • Opcode ID: 6dd099ad33d699f569c1487b0d01e86228e5a27ff417eb6eae1db14346132234
                                                                            • Instruction ID: d979d6942378493f1252e4362a9826f35926472800ad7c38817b289724cadaaf
                                                                            • Opcode Fuzzy Hash: 6dd099ad33d699f569c1487b0d01e86228e5a27ff417eb6eae1db14346132234
                                                                            • Instruction Fuzzy Hash: 37328E23F0C6C686EB749B24A0A087D6791FB95744F940236DABE827DEDF2CE545CB01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $"$"$"$"$"$'$'$'$'$'$.$.$/$/$\$_$_$`$`$tab.timmy.whinge.level
                                                                            • API String ID: 0-1475303128
                                                                            • Opcode ID: c695e7c3d55a8083ecbc471a244ce4e1eb127130358f253d9b8f7f27556a3826
                                                                            • Instruction ID: e4cc99c7d6accdd17ebaea4eaf500d5fd5dd88c442d95351fb300921affaca31
                                                                            • Opcode Fuzzy Hash: c695e7c3d55a8083ecbc471a244ce4e1eb127130358f253d9b8f7f27556a3826
                                                                            • Instruction Fuzzy Hash: 2012BF22F0C68246FB748A15C1A4B7D63A0BB49B80F915231DF7AC77D9CFAEE8448751
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $"$.-_:!#$.-_:!#/$.-_:!#[$.xXabcdefABCDEF$<<<$>$asp.default.language$d$fold$fold.compact$fold.html$fold.html.preprocessor$html.tags.case.sensitive$php$script
                                                                            • API String ID: 0-3624711261
                                                                            • Opcode ID: f1f2052b33d76d801d42483a3d051948b29c682b8ae6986b802e7100ee4d576a
                                                                            • Instruction ID: 0dca9d416760cc6fdad3bfb927851d2a76e44bfbf8c3d388a9488e15ebf5af78
                                                                            • Opcode Fuzzy Hash: f1f2052b33d76d801d42483a3d051948b29c682b8ae6986b802e7100ee4d576a
                                                                            • Instruction Fuzzy Hash: 1373B337B0C1428AEB748A15D0A4B7D67A1FB85B84F188235DB7AC77C8DE7DE8458B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$Paint$BeginCaptureCreateMessageProcReleaseSend
                                                                            • String ID: P$listbox
                                                                            • API String ID: 2579475255-659389835
                                                                            • Opcode ID: 95c885148dd482c24a8b51dbe3dd40894480514e3094618763e44e92adeb8aa7
                                                                            • Instruction ID: 3fb6dc6d8e37c3445801f9e1843cbbb1aea2fa47fe6d004f806c930e8beafe67
                                                                            • Opcode Fuzzy Hash: 95c885148dd482c24a8b51dbe3dd40894480514e3094618763e44e92adeb8aa7
                                                                            • Instruction Fuzzy Hash: F4716E63F08B4282E7549F29A464BBD2360EB85B85F144331DE7E8A6EDCF3CE641C600
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: !$!else$!endif$!if$!ifdef$!ifndef$!macro$!macroend$Function$FunctionEnd$PageEx$PageExEnd$Section$SectionEnd$SectionGroup$SectionGroupEnd$SubSection$SubSectionEnd$nsis.ignorecase
                                                                            • API String ID: 0-3081094940
                                                                            • Opcode ID: fdcd076affbcecae079d0dc349dd6f7e7ddb4b0f19a467f4bf21c3bef0b04011
                                                                            • Instruction ID: a04c0f3d0508a2d22653821226f92553aef22ce0f3d5129debed58bcb5094fc9
                                                                            • Opcode Fuzzy Hash: fdcd076affbcecae079d0dc349dd6f7e7ddb4b0f19a467f4bf21c3bef0b04011
                                                                            • Instruction Fuzzy Hash: 50B16812F8C54751F7A4976490B5AB96362FF44340F981332E8BEC55EE8E3CF7889642
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: write_multi_char$_errno$DecodePointer_getptdfree
                                                                            • String ID:
                                                                            • API String ID: 2009448492-3916222277
                                                                            • Opcode ID: d9d66a26c22875bb9f69010a30017b2abdf9d309f1169151429ecf31f44f3b05
                                                                            • Instruction ID: ade0c56b4b12d68e83653591398cc02d6b19ba46f3587d024622fcb9e395ab80
                                                                            • Opcode Fuzzy Hash: d9d66a26c22875bb9f69010a30017b2abdf9d309f1169151429ecf31f44f3b05
                                                                            • Instruction Fuzzy Hash: 0D52D2A2F0C68685FB748A149464B7A6BA1BB41740F145332DABECA6DDDF7CE8C1C701
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $"'`_-$)}].$=end$[*!~+-*/%=<>&^|$\ntrfvaebs$__END__$and$def$print$qQrwWx
                                                                            • API String ID: 0-1154094840
                                                                            • Opcode ID: b14b02de520cc81cc261f763eaf8f0e5ab04154d93b30b0d4f094dfe442e6ed7
                                                                            • Instruction ID: a56f2f2cf2f3f8fce7fab7076d2a951119895381fdbcf080ee178e4a8271a80f
                                                                            • Opcode Fuzzy Hash: b14b02de520cc81cc261f763eaf8f0e5ab04154d93b30b0d4f094dfe442e6ed7
                                                                            • Instruction Fuzzy Hash: B2F2DF22B0D6828AFB64CB14C1A4B7D77A0EB45780F905235DA7AC7BE9CF7DE4418B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$MessagePaintParentProcSend$BeginCall
                                                                            • String ID:
                                                                            • API String ID: 841268368-0
                                                                            • Opcode ID: fd3ace368267e05a14c7a397d9dca320fc9d7b816de5ca4fe37129a8bf0e193b
                                                                            • Instruction ID: f86d4c33f329d5c39555761644e93fd950035f2f41de64a139e0643aae51e486
                                                                            • Opcode Fuzzy Hash: fd3ace368267e05a14c7a397d9dca320fc9d7b816de5ca4fe37129a8bf0e193b
                                                                            • Instruction Fuzzy Hash: 02316662F0965241EB585B65A838B7D13A1AF8AFC0F485735D97ECA7DCDE2CA6C4C200
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: malloc
                                                                            • String ID: $=cut$\[$@%&*];$^/|,\";#%^:?<>)[]$__DATA__$__END__$elsif if split while$format$rwxoRWXOezsfdlpSbctugkTBMAC$sub
                                                                            • API String ID: 2803490479-65773373
                                                                            • Opcode ID: 40f99e071ad322cbf325b12c9da6faba7fb69ddf7b27aa43cb7916ecf5dae964
                                                                            • Instruction ID: 434181cccd0c59f9d287cc050d69cb37c57da7bda2feb381b5c3906074afe61c
                                                                            • Opcode Fuzzy Hash: 40f99e071ad322cbf325b12c9da6faba7fb69ddf7b27aa43cb7916ecf5dae964
                                                                            • Instruction Fuzzy Hash: EC53C422F0C286A6EB748A14C1A0BBD7BA1FB84744F544235C67DC3BD9CF2DE8958749
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: call$choice$echo$errorlevel$exist$goto$loadhigh$prompt$rem$set$start
                                                                            • API String ID: 0-3690992575
                                                                            • Opcode ID: fb2f72c92d7e77a6cb69b554a048e5211f155d563d9d40b7a79813fa717d9055
                                                                            • Instruction ID: 7ec70143b4f8f4a9095ba6fd583c13d223c97f167c54f4699c9419ebb0b6a565
                                                                            • Opcode Fuzzy Hash: fb2f72c92d7e77a6cb69b554a048e5211f155d563d9d40b7a79813fa717d9055
                                                                            • Instruction Fuzzy Hash: FC72F322B0C28666FB208E159074BBD6792BB45784F441231EABEC76CDDFBDE545C708
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CreateDeleteSelect$CompatibleFrameRectSection
                                                                            • String ID: (
                                                                            • API String ID: 3454737074-3887548279
                                                                            • Opcode ID: 7718ed8e86ca21d2ae9df324f9424b9f23c288b90b17f83c44061518bf612cdf
                                                                            • Instruction ID: faa8585993b9c34cc1174588c7fb955f6c18a6b67594cd5bfffcec07e67f956d
                                                                            • Opcode Fuzzy Hash: 7718ed8e86ca21d2ae9df324f9424b9f23c288b90b17f83c44061518bf612cdf
                                                                            • Instruction Fuzzy Hash: B5D190B3B197D58AC364CF19E440BAAB7A5F799780F044229DA9987F58DB3CE444CF40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                                                                            • String ID:
                                                                            • API String ID: 3778485334-0
                                                                            • Opcode ID: 7c1035404f81da8873fcb7d32fc1a852b9de1c1d07edfc00c6e294ca62eefff7
                                                                            • Instruction ID: ca27da26e541a347c1c17cabad7d2aa096390f1429e4d1a403b967bf221519d2
                                                                            • Opcode Fuzzy Hash: 7c1035404f81da8873fcb7d32fc1a852b9de1c1d07edfc00c6e294ca62eefff7
                                                                            • Instruction Fuzzy Hash: D931F671A09B42C5F7509B14F4A0B6973A4FB86750F900235D9BDC6BA9DFBCE284C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $*$+$/$/*!$/**$//!$///$////
                                                                            • API String ID: 0-689628245
                                                                            • Opcode ID: 9090b670076be6ef2eea28bed1931a44d22e96e3b4f490fd8a6cab143e754d9b
                                                                            • Instruction ID: 91572f652abb6bf3731cc094e935ccdf39cabe8b4dbadd30dc2ad26ab61200b9
                                                                            • Opcode Fuzzy Hash: 9090b670076be6ef2eea28bed1931a44d22e96e3b4f490fd8a6cab143e754d9b
                                                                            • Instruction Fuzzy Hash: 08525223F0C28386EB70DB1590A4A7E6760FB86B44F144235DB7A47AE9DF7DE8449B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $!$%&*+-./:<=>?@^|~$!?~=<>@^|&+-*/$%()[]{};,:.#$)]};,$)]};,'"`#$*$*$bBoOxX$lexer.caml.magic
                                                                            • API String ID: 0-4014405382
                                                                            • Opcode ID: dc68437cffff64adcf2dc3e6e63ffadfc6f29ad70e8035e9aa801464299ade1a
                                                                            • Instruction ID: 736dd2545f3efbef50d76420333081e17b1d8294cc68407ce9e8a18d42110e0f
                                                                            • Opcode Fuzzy Hash: dc68437cffff64adcf2dc3e6e63ffadfc6f29ad70e8035e9aa801464299ade1a
                                                                            • Instruction Fuzzy Hash: D532C033F0C68286FB60CA15D064A7A7BA1FB85B98F540235D67E46ADDDF7DE8418B00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $ $class$data$import$instance$module$qualified
                                                                            • API String ID: 0-2113066623
                                                                            • Opcode ID: 07bef6d0d5aa546e66d63c677f37498b2bcfc35d13988c32c8aa83657df686f3
                                                                            • Instruction ID: cdbcaa60f1c1c6bd444854ceda0e559678aca76f0cebeb3e09284309fc152a1b
                                                                            • Opcode Fuzzy Hash: 07bef6d0d5aa546e66d63c677f37498b2bcfc35d13988c32c8aa83657df686f3
                                                                            • Instruction Fuzzy Hash: A202AE23B0C24646EB608A14D0A0BBE6B61EB85744F594233EA7DC76DDDFBDE8458B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: _errno$ByteCharErrorLastMultiWide
                                                                            • String ID:
                                                                            • API String ID: 3895584640-0
                                                                            • Opcode ID: 1a12ca6371de6c14788f646b0550fb972380e5c9f179bd6164d10f1c45dcf1e7
                                                                            • Instruction ID: 0e89bfdfd38753a4a8906132fde5a5979854c836ec0c814711c2868561ce20c6
                                                                            • Opcode Fuzzy Hash: 1a12ca6371de6c14788f646b0550fb972380e5c9f179bd6164d10f1c45dcf1e7
                                                                            • Instruction Fuzzy Hash: 515181B2B0C6C24AE7709F65E161A7DB790EB81B50F584235E6BDCAACDCE7C94818701
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $f$i$lexer.tex.auto.if$lexer.tex.comment.process$lexer.tex.interface.default$lexer.tex.use.keywords$newif
                                                                            • API String ID: 0-3038620678
                                                                            • Opcode ID: da08516ddb15a79067723fa2279f24a06a42532b98048714e10d95db4c698ab6
                                                                            • Instruction ID: 20a66923ce7664bfca0285af51383bb3e6648b4cac4fab1df2916f3ebd711eda
                                                                            • Opcode Fuzzy Hash: da08516ddb15a79067723fa2279f24a06a42532b98048714e10d95db4c698ab6
                                                                            • Instruction Fuzzy Hash: E3F19032B0864686FB24CF19D0A0B6D77A1EB89B84F854131DEA9C37EDCE3DE5459B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: """$'''$\$class$def$import$tab.timmy.whinge.level
                                                                            • API String ID: 0-2586483003
                                                                            • Opcode ID: 8b09a8c27619edc4ab8fa275824f8457dcb4ada8f1bc9c35db739b3df156edc2
                                                                            • Instruction ID: 9b25901a4c07ea2d3ad11b383abe60e979d5e53c5d499d141917050c426b6059
                                                                            • Opcode Fuzzy Hash: 8b09a8c27619edc4ab8fa275824f8457dcb4ada8f1bc9c35db739b3df156edc2
                                                                            • Instruction Fuzzy Hash: 1C62A632B0C646D6D7608B189090A7EB7A0FB85740F914232EAB9C3ADDEE7DE445CF45
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: #ce$#comments$#comments-end$#comments-start$#cs$#include
                                                                            • API String ID: 0-3757738668
                                                                            • Opcode ID: 4e02c94c5724d114cd4bdda8eecd6b9784156b4a15a455fbc4c96bcb090894ed
                                                                            • Instruction ID: b275766072ed8cb8ab186e0ac8f3b0318d21b066c3e51243e56a0d7565c6059c
                                                                            • Opcode Fuzzy Hash: 4e02c94c5724d114cd4bdda8eecd6b9784156b4a15a455fbc4c96bcb090894ed
                                                                            • Instruction Fuzzy Hash: 23A2E023F1CA8685EB748B14C0A4BBD6791AB85B84F444232DABD437DDDF6CE845CB41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ABCDEF$ABCDEFabcdef$BOH$BOHboh$DEKNPST$DEKNPSTdeknpst
                                                                            • API String ID: 0-3669997280
                                                                            • Opcode ID: 0a7feb1bef95c4787201762b94c90f9922fab89947907de9a0f95a0797a1112a
                                                                            • Instruction ID: 8c49a3f39fb1f4f3cd552d502f3e274a926923615766d7662387fe64e34ea36c
                                                                            • Opcode Fuzzy Hash: 0a7feb1bef95c4787201762b94c90f9922fab89947907de9a0f95a0797a1112a
                                                                            • Instruction Fuzzy Hash: A9829133F1C6C28AE7608B15D050AAEB7A1FB85B44F444136DAAE47ADDDF7DE8418B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: =$btex$etex$lexer.metapost.comment.process$lexer.metapost.interface.default$verbatimtex
                                                                            • API String ID: 0-377892542
                                                                            • Opcode ID: f441eb180525576fc67aa8b05d37a707f0dc1f746b7439eeda97255033013b9b
                                                                            • Instruction ID: 941e5a5fdb94cea0e8136b7f7e2d351b73c8398952c3e3dd63442d16ea00e4f3
                                                                            • Opcode Fuzzy Hash: f441eb180525576fc67aa8b05d37a707f0dc1f746b7439eeda97255033013b9b
                                                                            • Instruction Fuzzy Hash: A2F19233B0D24246EB248A19D0A0B7D67A1EB85B44F885235DA7DC77EDEF3CE5458B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $ $ps.level$ps.tokenize
                                                                            • API String ID: 0-2005195314
                                                                            • Opcode ID: 7f1a490fdc0a7c2c99582f44f06f696927923bf050279aa0ce60b591176f6661
                                                                            • Instruction ID: 2614f4f3534cfe6b44a79bdc84d38d28b483225f63fa57a5d837516651da1fdb
                                                                            • Opcode Fuzzy Hash: 7f1a490fdc0a7c2c99582f44f06f696927923bf050279aa0ce60b591176f6661
                                                                            • Instruction Fuzzy Hash: 6792C836B0C28296EB748A1990A4A7D77B0FB89740F251135EA79C77ECCE7DE844CB05
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $ $--!$//!
                                                                            • API String ID: 0-857175557
                                                                            • Opcode ID: 4dec65035ad96f4dcc670ee5b78e97c7d18b96c04646a5443018137097944281
                                                                            • Instruction ID: 7083d30c9fba8e2e4f03a57912e0eefd4685c58973f8cfe941eae474d2073396
                                                                            • Opcode Fuzzy Hash: 4dec65035ad96f4dcc670ee5b78e97c7d18b96c04646a5443018137097944281
                                                                            • Instruction Fuzzy Hash: 03426532B1C2828AFB608B1590D066DB760FB95744F550136EFBAC76DEDABDE4408F41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $ $//!
                                                                            • API String ID: 0-3383868062
                                                                            • Opcode ID: 0eb00d5e2403a9461c3f047257537bd5896c1199f1cf93d0595cd01ecf982b97
                                                                            • Instruction ID: 3757a637a157282d55e66cc53de537b8d4a283aefaee4abbc63c71c8149c945d
                                                                            • Opcode Fuzzy Hash: 0eb00d5e2403a9461c3f047257537bd5896c1199f1cf93d0595cd01ecf982b97
                                                                            • Instruction Fuzzy Hash: A122A532F1C2418AFB608B1590A0A7EA7A0FB89744F545131EF7AC7AE9DA7DE440CF41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $dllusage$enddllusage$styling.within.preprocessor
                                                                            • API String ID: 0-1789709456
                                                                            • Opcode ID: 37b55eb77b09d4164ef2d46050aa061280283c8b1356a6db6ed5dfd2719b86f1
                                                                            • Instruction ID: 508a971483ac37f8a3b5cce9a27d715664f5c42924f967754281ab6b282b4d0c
                                                                            • Opcode Fuzzy Hash: 37b55eb77b09d4164ef2d46050aa061280283c8b1356a6db6ed5dfd2719b86f1
                                                                            • Instruction Fuzzy Hash: E1029633F1C6C28AE7608A1590A0A6EB7B1FB85744F141236EBBA576DDCB7DE4418B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $ $escript.case.sensitive
                                                                            • API String ID: 0-3830128347
                                                                            • Opcode ID: da2b7c025c2134ae6c5b9ec97366906e074ba539234e36b89f6997972daf9371
                                                                            • Instruction ID: 0f68abb746d076e91dd6484849e7a0e5c34fd9c9c6af94bdb5563903517aa662
                                                                            • Opcode Fuzzy Hash: da2b7c025c2134ae6c5b9ec97366906e074ba539234e36b89f6997972daf9371
                                                                            • Instruction Fuzzy Hash: 3602A633E1C2C68AEB608B15D0A0A7EB760FB85754F150236EBBA076DDDB7DE4418B41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $d$rem
                                                                            • API String ID: 0-4059199007
                                                                            • Opcode ID: 27f449a0d0617556573bb0ab85b0dbcf4b835495cf008959066cee3c7289ebe8
                                                                            • Instruction ID: f52d67a12fbd69245a3f662e6c855afd36558ecc22b87f598c844023d249e1bc
                                                                            • Opcode Fuzzy Hash: 27f449a0d0617556573bb0ab85b0dbcf4b835495cf008959066cee3c7289ebe8
                                                                            • Instruction Fuzzy Hash: 6222D532A1C2418AF7609B1590A067EB7A0FB95740F900176EFBAC7ECDDA7DE4418F41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $
                                                                            • API String ID: 0-3665324030
                                                                            • Opcode ID: 5ee9cb9672b69ab0a00fe389fb0435900095660fe03f575474fa449b5141ddb6
                                                                            • Instruction ID: 61888f71b687051a8064d3f357f395935439d331badd966b5345eb81f2100255
                                                                            • Opcode Fuzzy Hash: 5ee9cb9672b69ab0a00fe389fb0435900095660fe03f575474fa449b5141ddb6
                                                                            • Instruction Fuzzy Hash: AE12A433F081D28AEB748A1590A0ABF67A0FBC5744F140135EA7A47ADDDF7DE8458B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $
                                                                            • API String ID: 0-3665324030
                                                                            • Opcode ID: 05263eae233d3d1e30ec7b47e90899490fe0b1df79b710a19c8071f668f816eb
                                                                            • Instruction ID: 641715829592b21e48ced8231d8601d1388778b250823522efe836304763b539
                                                                            • Opcode Fuzzy Hash: 05263eae233d3d1e30ec7b47e90899490fe0b1df79b710a19c8071f668f816eb
                                                                            • Instruction Fuzzy Hash: 49124027A1C2828AE7608B15E06076FBBA1F7C5744F155136EBAA07ADDDBFDE4448F00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: malloc
                                                                            • String ID: C$rwxoRWXOezsfdlpSbctugkTBMACahGLNn
                                                                            • API String ID: 2803490479-4287770927
                                                                            • Opcode ID: c264da48566c5e06910ff0e572ec0ea9590b8fd8a5affa5ba454b069b5e7e910
                                                                            • Instruction ID: cc81a1bebba2c5fbdea9b3d8ec5ca4abb4930a7478d50be579d3aac551bfdfaf
                                                                            • Opcode Fuzzy Hash: c264da48566c5e06910ff0e572ec0ea9590b8fd8a5affa5ba454b069b5e7e910
                                                                            • Instruction Fuzzy Hash: D4B2AD27F0D6C286EB788A15C1A4B7D67A0BB45780F145235CA7E57BE8CFBDE8418B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $:
                                                                            • API String ID: 0-4041779174
                                                                            • Opcode ID: f725205291d96a23e0f2b2817a15d8ecd4bc77d6e353e59a15cb298e65a1df63
                                                                            • Instruction ID: e47f404e23056ca65184165bb9a48c410e175b97c24c27c03ab4e32bb8c1b62c
                                                                            • Opcode Fuzzy Hash: f725205291d96a23e0f2b2817a15d8ecd4bc77d6e353e59a15cb298e65a1df63
                                                                            • Instruction Fuzzy Hash: 30729363A1C1818AD7308F1990A0B6EB7A1FB85744F184135EBBAD7BADDA7DE4448F40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $$
                                                                            • API String ID: 0-182950533
                                                                            • Opcode ID: 1fe377d165e5c276245ebdbbdf86243b3c276fa34708031b31aca675025253c1
                                                                            • Instruction ID: ddee0aa30bccce541c45c1a8312661d2b65efacc8d6bd859b5ce5eebd17e21c4
                                                                            • Opcode Fuzzy Hash: 1fe377d165e5c276245ebdbbdf86243b3c276fa34708031b31aca675025253c1
                                                                            • Instruction Fuzzy Hash: 05625133F1C5828AE760CB15D0A0B6DA7A1FB85744F154232EABA876DDCB7DE4458B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $abfnrtuv0'"
                                                                            • API String ID: 0-3061920473
                                                                            • Opcode ID: 4711d3e339b8790fe53df79310a0c16a55ff78fc6f2ff465371b9b4b8e2f5972
                                                                            • Instruction ID: ef2d727df3bd222c085a1d501ef244d2afbee22ad07aa66a2af75dedafbf1398
                                                                            • Opcode Fuzzy Hash: 4711d3e339b8790fe53df79310a0c16a55ff78fc6f2ff465371b9b4b8e2f5972
                                                                            • Instruction Fuzzy Hash: 7B428132B1C2819ADB608F14E0906AEB7A1FB89744F144136EAAEC779DDE7DE444CF44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: *$\
                                                                            • API String ID: 0-1504634461
                                                                            • Opcode ID: 595e4e777af853315660251ba1662c0ea4e854a500caa4589aa9a21dad669947
                                                                            • Instruction ID: 1a2a8bf8937a2039a82f78a3570eb8f6c1e91c2d628094306dfa6ff4522c299f
                                                                            • Opcode Fuzzy Hash: 595e4e777af853315660251ba1662c0ea4e854a500caa4589aa9a21dad669947
                                                                            • Instruction Fuzzy Hash: 5622E226F0D686A6EB748615C1F0F7E63A1AB47B80F254232CA7DC3BD8CF2DA4458745
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $fold
                                                                            • API String ID: 0-1551796345
                                                                            • Opcode ID: c6519654d9765e1a713b6d9046943239349dc4c0afef831271d12e6bb83add2f
                                                                            • Instruction ID: c9d6f747b6c2c6c1dc648c49b0d500579680c60a7a368eb2157f868e2f0bfd64
                                                                            • Opcode Fuzzy Hash: c6519654d9765e1a713b6d9046943239349dc4c0afef831271d12e6bb83add2f
                                                                            • Instruction Fuzzy Hash: 4D22D12374C6828AEB648B15C1A8B7D7791FB45B80F484236DA7EC3BD9CF3DA5848701
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: ...$/
                                                                            • API String ID: 0-2429815136
                                                                            • Opcode ID: 6769d04b7ed8c0f83f004346decc81e40639d3ed75433465f5b922d4d3b48b79
                                                                            • Instruction ID: d6dc6c1f018a39bb2053f4b60316db547e31b9d38748ee2672d4dc2487c1562a
                                                                            • Opcode Fuzzy Hash: 6769d04b7ed8c0f83f004346decc81e40639d3ed75433465f5b922d4d3b48b79
                                                                            • Instruction Fuzzy Hash: BF126632B1C24286F7648A1590A0A7EB761FB96700F944236EBB9C7ADDCB7DE441CF41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: fold.comment.python$fold.quotes.python
                                                                            • API String ID: 0-3821945798
                                                                            • Opcode ID: 0b493983a66bbb11e84a885d403ca8cc54834dcd59a032aff09496e23476567c
                                                                            • Instruction ID: 39044933715d2aee97fb9df6f74ca8f79aad22bb4ac3ed5cf33459fd2b7ef6d8
                                                                            • Opcode Fuzzy Hash: 0b493983a66bbb11e84a885d403ca8cc54834dcd59a032aff09496e23476567c
                                                                            • Instruction Fuzzy Hash: 67D19672B1C68296EB748E25905477A77A1FB88B84F404235DEAED77C8EF7CD8058B04
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %2X
                                                                            • API String ID: 0-1225248942
                                                                            • Opcode ID: 4f9758f81b4905d2ad776ca43407c5c16c45cb2ec4b700ad1625e99494fe8b04
                                                                            • Instruction ID: e53f6cb137d080037bf3a5a1dd94fcb976705626a5f67508c097e48c5660c8a4
                                                                            • Opcode Fuzzy Hash: 4f9758f81b4905d2ad776ca43407c5c16c45cb2ec4b700ad1625e99494fe8b04
                                                                            • Instruction Fuzzy Hash: 8D629F73B0868586EB258F25D160ABE7BA1F785B84F014236CF7D47B99DB39E851CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: fold
                                                                            • API String ID: 0-4279597620
                                                                            • Opcode ID: 7ec73794d23c22ae01a0819b377ab828887eb23dc7742cce6b404c2246086a6f
                                                                            • Instruction ID: d7e1148695cfb2a7d8f9d9828c80970cb49481763f568897e071dec404386dad
                                                                            • Opcode Fuzzy Hash: 7ec73794d23c22ae01a0819b377ab828887eb23dc7742cce6b404c2246086a6f
                                                                            • Instruction Fuzzy Hash: 60227F27F086C686EB748A15C2E0B7D73A1BB49B80F109231CA7E437D9DF7DA4658B41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: \
                                                                            • API String ID: 0-2967466578
                                                                            • Opcode ID: f84b303a02f693f1a325f92f1811e06099e4ff828af955822082b3e8444908f6
                                                                            • Instruction ID: 741e7d0bdf251acf324c187fb900fb02305ac52f6f86c3c5ab9b4b0c9428f802
                                                                            • Opcode Fuzzy Hash: f84b303a02f693f1a325f92f1811e06099e4ff828af955822082b3e8444908f6
                                                                            • Instruction Fuzzy Hash: DB12A433F0824649FB648B149064B7E77A1EB85780F490236DABD436DDEFADF8858B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: \
                                                                            • API String ID: 0-2967466578
                                                                            • Opcode ID: 3fc161fc9560a275d0101214f3c3824a1291edb4bd9b0b9a2a60dd205657452d
                                                                            • Instruction ID: 09440c0af999e11624970dc2a7c613f1a3f834106a53df1ef5287ed62adb07db
                                                                            • Opcode Fuzzy Hash: 3fc161fc9560a275d0101214f3c3824a1291edb4bd9b0b9a2a60dd205657452d
                                                                            • Instruction Fuzzy Hash: 7612BD27F1C1D28AFB608A18D068B7D77A1AB95780F490376DAB9436DDDF2DE8418B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: malloc
                                                                            • String ID: $
                                                                            • API String ID: 2803490479-3993045852
                                                                            • Opcode ID: fb0ab97de536bff04d1ad8d168f48439ed197266f1a0bb6b331c842296749b67
                                                                            • Instruction ID: 2f84a7fa0f405384368c5380027a9c5d14a7edf949baaaba762c77493e9a5b2f
                                                                            • Opcode Fuzzy Hash: fb0ab97de536bff04d1ad8d168f48439ed197266f1a0bb6b331c842296749b67
                                                                            • Instruction Fuzzy Hash: 60F10023F0C2D646E7719A2590A0BFE77A2BB45B84F444235DABD43AC9DF7DE8548B00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: E
                                                                            • API String ID: 0-3568589458
                                                                            • Opcode ID: d9eb8611ef28812f1dd7945a439b9727dd00f2ed138854082ac1fde500faa697
                                                                            • Instruction ID: ec1d5ba038cf9843aef48cee67b4d3f3f83017d73633467bc021ee59b2a5c2ac
                                                                            • Opcode Fuzzy Hash: d9eb8611ef28812f1dd7945a439b9727dd00f2ed138854082ac1fde500faa697
                                                                            • Instruction Fuzzy Hash: B4026B23F5D24685FB74CB159064BBAB7A1AB89784F440232DABD036EDCF6CF8448B41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %
                                                                            • API String ID: 0-2567322570
                                                                            • Opcode ID: c1580c9f5b80937968c6fe9180bd339c3398576dc338a7aadabf2a705d94e310
                                                                            • Instruction ID: 4ef72bff74d0f2a860e58dcbdfab21245add2be6eb740c7a8f46f67abb7d5a78
                                                                            • Opcode Fuzzy Hash: c1580c9f5b80937968c6fe9180bd339c3398576dc338a7aadabf2a705d94e310
                                                                            • Instruction Fuzzy Hash: C2E1A933F1C6C28AEB648A16A090A7D67A0FB89744F150232EB7A436DCDF7DE5419F41
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: \
                                                                            • API String ID: 0-2967466578
                                                                            • Opcode ID: 40fac78e7493baf75f26bc0d98c81d12b107521c65f6e7e244002245ca03b793
                                                                            • Instruction ID: 8d05ba33ab22b7b6fd100fa966efe09523e35a2fbf73da6984d46dec6e395289
                                                                            • Opcode Fuzzy Hash: 40fac78e7493baf75f26bc0d98c81d12b107521c65f6e7e244002245ca03b793
                                                                            • Instruction Fuzzy Hash: 61E1FA32B1C6429AEB748A1494E0B7D63A0FB86740F550136DA7EC36DDEE7EF8408B45
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID: 0-3916222277
                                                                            • Opcode ID: 83c5f75d2101a5a85edad5b8b5a2801bfb490ce416e20205d49c12278e8ed33d
                                                                            • Instruction ID: 2507635eb404b6700a8dea9f47463b08676d0195d7d5ca7922f247e90870ff0c
                                                                            • Opcode Fuzzy Hash: 83c5f75d2101a5a85edad5b8b5a2801bfb490ce416e20205d49c12278e8ed33d
                                                                            • Instruction Fuzzy Hash: 32E18132B1C6828AFB608B19D090BADA760FB85754F904132EFA9877DDDF7DE5448B40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: InfoLocale
                                                                            • String ID:
                                                                            • API String ID: 2299586839-0
                                                                            • Opcode ID: 282329815c33d5fe623b8cb2dfa9c23466bafef5bc01abb3ac81ecd6f032d96c
                                                                            • Instruction ID: 1c5504314255d6c42cfe30d2eae380f9fdc4434a125844b6107304774f93a0bb
                                                                            • Opcode Fuzzy Hash: 282329815c33d5fe623b8cb2dfa9c23466bafef5bc01abb3ac81ecd6f032d96c
                                                                            • Instruction Fuzzy Hash: 77E06561B0C98181F7309720E472BAA27A1BF99758FD00332D9BCC66EDDE2CE241CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bd53065a9217e3980c37039b9884ad4969059d10391a594366ad0bb576eeb275
                                                                            • Instruction ID: 06278dcbef8af31fdaf2168122bf012da7c4fb5ad0a1564fc551dda9260ed29b
                                                                            • Opcode Fuzzy Hash: bd53065a9217e3980c37039b9884ad4969059d10391a594366ad0bb576eeb275
                                                                            • Instruction Fuzzy Hash: 93327123F0928285F7649A2985F5EBD23A2EB95744F248331D93D476DECF3EE8528740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e04e6f144aaf4c78402c0fe9803503de31614e887a05bfc903f3db7bb64facd1
                                                                            • Instruction ID: 400d13ed3d7b5bdd64cff73cb121babdca38d6c2b2dd3408631a6fdd8e1a2b2f
                                                                            • Opcode Fuzzy Hash: e04e6f144aaf4c78402c0fe9803503de31614e887a05bfc903f3db7bb64facd1
                                                                            • Instruction Fuzzy Hash: D0229022B0C6478AFB748E1590B8B7D73A0EB49B50F194236CA7FC77D9DE2DA8458341
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 19f74a11bf79d2bd0550db7feb1df278cf5a8cf63a3c27013945ec9b4172f974
                                                                            • Instruction ID: 2a99ddd56a2b97908294ab2f8578d7f73908d74c5bf7d9ba8d94de583b2da830
                                                                            • Opcode Fuzzy Hash: 19f74a11bf79d2bd0550db7feb1df278cf5a8cf63a3c27013945ec9b4172f974
                                                                            • Instruction Fuzzy Hash: 18E1A373B0C2428AEB608B19D0A4B7E77A0EF85744F190232DA79C3ADDDE7DE4458B01
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: malloc
                                                                            • String ID:
                                                                            • API String ID: 2803490479-0
                                                                            • Opcode ID: e623b771e6882b3f23352b553471dea90f87691287affa57beb56d70d50a3ca6
                                                                            • Instruction ID: 35d75dad00db9f5ff5fb418f21e9da151761f09387d92ce34f1bcb05baa77d12
                                                                            • Opcode Fuzzy Hash: e623b771e6882b3f23352b553471dea90f87691287affa57beb56d70d50a3ca6
                                                                            • Instruction Fuzzy Hash: CBC11273F0858556E764DF248164BBD2BA0EB45B84F54833AC67A87AD9DF2DF0168300
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b775fdd8e3178838117b6d97ad8f967db1b9bccc76efc7727d91ad4db192b264
                                                                            • Instruction ID: 8ea804a2c4c83290ccdd5dfbcc16b22e803d70539fe171b7a6523c18a5241d8b
                                                                            • Opcode Fuzzy Hash: b775fdd8e3178838117b6d97ad8f967db1b9bccc76efc7727d91ad4db192b264
                                                                            • Instruction Fuzzy Hash: 5BB1A132B0C2429AEB608B15D0A0B7D63A1EB85B44F514176DAB9C7ACDDF3DE4468F05
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3d51b54366542bde79496863fdd82e37a0756f1abe4cdb5d05788124cbebdaff
                                                                            • Instruction ID: e82bd100cf503390f30e52dac81addc96a93d7ee060fba7dbbe06933654eb2ab
                                                                            • Opcode Fuzzy Hash: 3d51b54366542bde79496863fdd82e37a0756f1abe4cdb5d05788124cbebdaff
                                                                            • Instruction Fuzzy Hash: 2B41C842F0AEAA04FB658D9C4534BB417809F227A4FE813B8CCB9D77DBCC0D65479101
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: free$ErrorFreeHeapLast_errno
                                                                            • String ID:
                                                                            • API String ID: 1012874770-0
                                                                            • Opcode ID: c827e5dd2de503780ca73d1a3315debbfb4803c72b1e63681b510c6d81b702eb
                                                                            • Instruction ID: 63b45836155e64c62801f944999d1e4cd27d75a4dfda0f13fd2bd62d204560b2
                                                                            • Opcode Fuzzy Hash: c827e5dd2de503780ca73d1a3315debbfb4803c72b1e63681b510c6d81b702eb
                                                                            • Instruction Fuzzy Hash: 83417522B1554181FB49ABB5C8616BC3331AF84B44F444A31DD7DCF5EBCE14D95583A4
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • LoadLibraryA.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234E5D
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234E79
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234EA1
                                                                            • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234EAA
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234EC0
                                                                            • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234EC9
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234EDF
                                                                            • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234EE8
                                                                            • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234F06
                                                                            • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234F0F
                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234F41
                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234F50
                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234FA8
                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234FC8
                                                                            • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,00007FFDFF2312E4,?,?,?,?,?,00007FFDFF231378), ref: 00007FFDFF234FE1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Pointer$AddressDecodeProc$Encode$LibraryLoad
                                                                            • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                                            • API String ID: 3085332118-232180764
                                                                            • Opcode ID: 2e82e3b323785dd4e3a64b00ea04288ac91efc02eb5e2f21cda7a63e61b36ceb
                                                                            • Instruction ID: 9c17d80ea712e65443c05c414bfec370efabffed6a4752ab82299b3c82f97c4e
                                                                            • Opcode Fuzzy Hash: 2e82e3b323785dd4e3a64b00ea04288ac91efc02eb5e2f21cda7a63e61b36ceb
                                                                            • Instruction Fuzzy Hash: D9512AA0B1AB4344FF54DB55A8709B82390AF46B80F480735EC7DCB7DAEE7CE5858214
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Color$Rect$Text$DrawFill$AlignFocusInflate
                                                                            • String ID:
                                                                            • API String ID: 1753992375-0
                                                                            • Opcode ID: a3b0c5fa26a39a25ec0b7bc7932076468720baa26f9dc0264b02ed942989af6f
                                                                            • Instruction ID: 2f044301943e05ab58b82ba62f6c9b5844d98691cc077cde351b41797dcaa383
                                                                            • Opcode Fuzzy Hash: a3b0c5fa26a39a25ec0b7bc7932076468720baa26f9dc0264b02ed942989af6f
                                                                            • Instruction Fuzzy Hash: D2914D72B18B4186E7508F25E45096EB371FB89B85F145235EEAE87B98DF7CE484CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Object$Select$CompatibleCreateDeleteRect$BitmapClientFillMessageSendStock
                                                                            • String ID:
                                                                            • API String ID: 2736277039-3916222277
                                                                            • Opcode ID: cba81942cc72ea239b3b865416d91da52741d9c53c6d22f628ae2cd5a8d6173f
                                                                            • Instruction ID: 05ec772d1f85df0b928130e14763950e4a79b1b364279f96ebacf9db4655eee6
                                                                            • Opcode Fuzzy Hash: cba81942cc72ea239b3b865416d91da52741d9c53c6d22f628ae2cd5a8d6173f
                                                                            • Instruction Fuzzy Hash: DB318F767187018BD7148F12E858A6AB7A2FB89FD1F404134DE6987B58CF3DE489CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: free$_lock$ErrorFreeHeapLast_errno
                                                                            • String ID:
                                                                            • API String ID: 1575098132-0
                                                                            • Opcode ID: 9eaeb06af66d76f43f01b434b3e69dcc1442da3f0981aab6ca058e75a8b23b52
                                                                            • Instruction ID: 7d81b1c37f9c5a26d1c7ec5673cde80c2de69ed5867660521283276c5e85bc50
                                                                            • Opcode Fuzzy Hash: 9eaeb06af66d76f43f01b434b3e69dcc1442da3f0981aab6ca058e75a8b23b52
                                                                            • Instruction Fuzzy Hash: 1831DB65B0A50245FF59EBA1D0B1B783361AF84B48F441735D93ECE7CE8F1CE9808265
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Long$Paint$BeginProc
                                                                            • String ID:
                                                                            • API String ID: 2954720972-3916222277
                                                                            • Opcode ID: f37fc3628b41853b83bd4ae39bca91aaa9b6ef58c7a4fb0748555d1234068016
                                                                            • Instruction ID: 8a970a2ca8830813eb5da5aa8e6fcab4fde9aad7cdd1a964ea37092ce657ce39
                                                                            • Opcode Fuzzy Hash: f37fc3628b41853b83bd4ae39bca91aaa9b6ef58c7a4fb0748555d1234068016
                                                                            • Instruction Fuzzy Hash: 53519122F0864286FB64DB269464BB923A1FB89B94F144232DE7E877CDDF3CE5458704
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide$ErrorLastfree
                                                                            • String ID:
                                                                            • API String ID: 994105223-0
                                                                            • Opcode ID: 1f064ed7a373630bc32a020183496b02dbb363b7bc83c8f35f61365713518047
                                                                            • Instruction ID: 2aa5753d4207735b1797ef811b6684749355ca9f28a3009ddfa820dcb2c7e795
                                                                            • Opcode Fuzzy Hash: 1f064ed7a373630bc32a020183496b02dbb363b7bc83c8f35f61365713518047
                                                                            • Instruction Fuzzy Hash: 204181A2B0874281EB549F11A4A487877A1BF45B90B540634DA7EEBBDCCF7CE9D1C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Cursor$Load
                                                                            • String ID: SciLexer$Scintilla
                                                                            • API String ID: 1675784387-727677536
                                                                            • Opcode ID: 2d2b64d89ad96170111bb4afa349402c0018a900ed7a6068a7970f36f499ed1f
                                                                            • Instruction ID: 4b31d5a42203d116426587d5c3bf87aa5e5c174bbcc2d994e85fe8016968bb17
                                                                            • Opcode Fuzzy Hash: 2d2b64d89ad96170111bb4afa349402c0018a900ed7a6068a7970f36f499ed1f
                                                                            • Instruction Fuzzy Hash: BA21D362F0D70396EBA58B25987493E27A29F85742F248735C43EC66DCEF3CB9859301
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: free$ErrorFreeHeapLast_errno
                                                                            • String ID:
                                                                            • API String ID: 1012874770-0
                                                                            • Opcode ID: 6db853f7139b46b1748a02a76d94e57502c0ce5066eb1a01dceee37d26322552
                                                                            • Instruction ID: ce2ed2146727c3d7cbd4a57ad789f4c5efcdf04e0dcc8eae576061bcc33d5f16
                                                                            • Opcode Fuzzy Hash: 6db853f7139b46b1748a02a76d94e57502c0ce5066eb1a01dceee37d26322552
                                                                            • Instruction Fuzzy Hash: 5041D872B1968684FF55DB65D470BB82360AF84F58F480631DE3DCE3DECE6CA5918260
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetStringTypeW.KERNEL32(?,?,?,?,?,?,00000107,00007FFDFF2349CA), ref: 00007FFDFF234758
                                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00000107,00007FFDFF2349CA), ref: 00007FFDFF23476A
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000107,00007FFDFF2349CA), ref: 00007FFDFF2347CA
                                                                            • malloc.LIBCMT ref: 00007FFDFF234836
                                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000107,00007FFDFF2349CA), ref: 00007FFDFF234880
                                                                            • GetStringTypeW.KERNEL32(?,?,?,?,?,?,00000107,00007FFDFF2349CA), ref: 00007FFDFF234897
                                                                            • free.LIBCMT ref: 00007FFDFF2348A8
                                                                            • GetStringTypeA.KERNEL32(?,?,?,?,?,?,00000107,00007FFDFF2349CA), ref: 00007FFDFF234925
                                                                            • free.LIBCMT ref: 00007FFDFF234935
                                                                              • Part of subcall function 00007FFDFF2360B0: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFDFF236106
                                                                              • Part of subcall function 00007FFDFF2360B0: GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFDFF236125
                                                                              • Part of subcall function 00007FFDFF2360B0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFDFF236229
                                                                              • Part of subcall function 00007FFDFF2360B0: WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,00000001,?,?,?,00000000,?,00000000,?), ref: 00007FFDFF236264
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharMultiWide$StringType$Infofree$ErrorLastmalloc
                                                                            • String ID:
                                                                            • API String ID: 3804003340-0
                                                                            • Opcode ID: 13137d0530c6258c4cecb949efd4c55dbe1fa709db5765d6179791ea5039cb09
                                                                            • Instruction ID: 6aa885fbe4f44e64ef8dca6ef6bf2872dee115402d6682cc0f8a4a63e1d3a4d8
                                                                            • Opcode Fuzzy Hash: 13137d0530c6258c4cecb949efd4c55dbe1fa709db5765d6179791ea5039cb09
                                                                            • Instruction Fuzzy Hash: 646194B2B0868186E7609F5198A08687795FB45BE8B540735EE3DDBBDCDF7CE9808340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Text$ExtentMetricsObjectPoint32RectSelectWindow$AdjustReleaseSystem
                                                                            • String ID:
                                                                            • API String ID: 2082942421-0
                                                                            • Opcode ID: e08b485109c0f440d0e3ef88323c2edb791b0547969e7b759e9376df56041b73
                                                                            • Instruction ID: 43e560df37f646500bc4985d5a2ee0d5ca2283fc09e2f7c5c272fc5ea12ee2dc
                                                                            • Opcode Fuzzy Hash: e08b485109c0f440d0e3ef88323c2edb791b0547969e7b759e9376df56041b73
                                                                            • Instruction Fuzzy Hash: 4551A273B0468586D750DF26E464A6E73A5FB89B89F404231EE6E87798CF3CE845CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: DecodePointer$_initterm$ExitProcess_lock
                                                                            • String ID:
                                                                            • API String ID: 2551688548-0
                                                                            • Opcode ID: b71efe3907c1a25f888b91d33c002a6688df67601a4a9a617049103d994e407e
                                                                            • Instruction ID: 1960a6211d426683505e20a3c9d0e6a3a3e78b9fb0aefdbebd78f31f9eba1075
                                                                            • Opcode Fuzzy Hash: b71efe3907c1a25f888b91d33c002a6688df67601a4a9a617049103d994e407e
                                                                            • Instruction Fuzzy Hash: AC41AFA1B1A64281EB50DB01E8619787394BF48784F040338EA7DCA7EEDFBCE481C304
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Object$Select$Delete$Palette
                                                                            • String ID:
                                                                            • API String ID: 213217401-0
                                                                            • Opcode ID: 78a9329245d1274e096a20fe25956b2885dfe4eeae306a5ca254faa183350fd1
                                                                            • Instruction ID: e44208c48a96eb8362f204532054cea63f8df2b1c265a40915dc4c5190c16d3e
                                                                            • Opcode Fuzzy Hash: 78a9329245d1274e096a20fe25956b2885dfe4eeae306a5ca254faa183350fd1
                                                                            • Instruction Fuzzy Hash: 9521D8B6A18B0186D7148F25EA9442C73B6FB45FC8B105235CE7D8A7ACDF39D895C340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Global$ClientLockScreenSizeUnlock
                                                                            • String ID:
                                                                            • API String ID: 2805851903-0
                                                                            • Opcode ID: 8686568280dbf83aa44fa6e417f9302d0f4de86972a32286387ca6eff0e22f80
                                                                            • Instruction ID: d7980122d67ce4a01a0472156e9333f5b2fa5ace603a970524a83eba19b14338
                                                                            • Opcode Fuzzy Hash: 8686568280dbf83aa44fa6e417f9302d0f4de86972a32286387ca6eff0e22f80
                                                                            • Instruction Fuzzy Hash: CB916173B086C186D724DF25E454AAAB7A1F785B90F104635DAAA97BD8CF3CD481CB04
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: __doserrno_errno
                                                                            • String ID:
                                                                            • API String ID: 921712934-0
                                                                            • Opcode ID: 5e0216f213588a50212f73a5a4aec4dd37b0a117b03eae22cb22f75283446dc5
                                                                            • Instruction ID: d5be53be3383e64f8f457fc357e5e6defed0bf285336e95c06156bdfe398c1a4
                                                                            • Opcode Fuzzy Hash: 5e0216f213588a50212f73a5a4aec4dd37b0a117b03eae22cb22f75283446dc5
                                                                            • Instruction Fuzzy Hash: D631C0B2B1829245E7159F65A8A297D7B50AF80B60F554331EA3DCF7DACF7CE4828700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: ExtentText$Byte$CharMultiPointPoint32Wide$LeadObjectSelect
                                                                            • String ID:
                                                                            • API String ID: 4132324575-0
                                                                            • Opcode ID: 5b0136683d906342e4df677a696098cb57ddad37dee8e43c30912c1546a4163c
                                                                            • Instruction ID: dee3ea905c8ccc1d794baa0614bd746edfd16046e22a882da1c83be7a5ebba24
                                                                            • Opcode Fuzzy Hash: 5b0136683d906342e4df677a696098cb57ddad37dee8e43c30912c1546a4163c
                                                                            • Instruction Fuzzy Hash: 32919062F0878586EB209F15E0949AE7771FB85788F504235DA6D43B9DEF3CE546CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetStartupInfoA.KERNEL32 ref: 00007FFDFF2336BD
                                                                              • Part of subcall function 00007FFDFF232A80: Sleep.KERNEL32(?,?,?,00007FFDFF230D9F,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF232AC5
                                                                            • GetFileType.KERNEL32 ref: 00007FFDFF23383A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: FileInfoSleepStartupType
                                                                            • String ID: @
                                                                            • API String ID: 1527402494-2766056989
                                                                            • Opcode ID: 70a2d2ea3702c63a6df8e2767d7105796ea43283e755f09b05e2ecf2c78b17bb
                                                                            • Instruction ID: aaeea46ff962da0de4c25d2cb5e73494e43378162eccc7f0b1e8b2f90c4f3c0b
                                                                            • Opcode Fuzzy Hash: 70a2d2ea3702c63a6df8e2767d7105796ea43283e755f09b05e2ecf2c78b17bb
                                                                            • Instruction Fuzzy Hash: 579190A1B0869281E7108F28D4A8A683795BB06774F254735C67DDB3E9CF7DED82C311
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: _errno
                                                                            • String ID:
                                                                            • API String ID: 2918714741-0
                                                                            • Opcode ID: dee4bd3cb8b946069a342dc4b2f3c205795d501fec933c9add919682ee652058
                                                                            • Instruction ID: bd667dda971c71825f69cd8c3c5f1dba8f72135452e95498a85e749b0eea85b9
                                                                            • Opcode Fuzzy Hash: dee4bd3cb8b946069a342dc4b2f3c205795d501fec933c9add919682ee652058
                                                                            • Instruction Fuzzy Hash: 8831C4A1F1C68245FB159F259871F7D2B51AF80750F544334EA3ECE6DACF7CA4818210
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide__initconout
                                                                            • String ID:
                                                                            • API String ID: 2210154019-0
                                                                            • Opcode ID: ff5c1ec2110e3c9d8427f88193a2b399819a378c0c8cb7cdf8c3035b68acafdf
                                                                            • Instruction ID: 64c8f75046c46af4727bc62bce8b9d8b3ba57011d23064e76470ee1f22702ba4
                                                                            • Opcode Fuzzy Hash: ff5c1ec2110e3c9d8427f88193a2b399819a378c0c8cb7cdf8c3035b68acafdf
                                                                            • Instruction Fuzzy Hash: 25314CA1B1894282FB109F10E425B7967A4FB86B75F500335E5BDCA9DCCFBDD5898B00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetLastError.KERNEL32(?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2,?,?,?,00007FFDFF22E0FB), ref: 00007FFDFF230D76
                                                                            • FlsGetValue.KERNEL32(?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2,?,?,?,00007FFDFF22E0FB), ref: 00007FFDFF230D84
                                                                            • SetLastError.KERNEL32(?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2,?,?,?,00007FFDFF22E0FB), ref: 00007FFDFF230DDC
                                                                              • Part of subcall function 00007FFDFF232A80: Sleep.KERNEL32(?,?,?,00007FFDFF230D9F,?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2), ref: 00007FFDFF232AC5
                                                                            • FlsSetValue.KERNEL32(?,?,?,00007FFDFF23232D,?,?,?,?,00007FFDFF22FFA2,?,?,?,00007FFDFF22E0FB), ref: 00007FFDFF230DB0
                                                                            • free.LIBCMT ref: 00007FFDFF230DD3
                                                                            • GetCurrentThreadId.KERNEL32 ref: 00007FFDFF230DC4
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
                                                                            • String ID:
                                                                            • API String ID: 3106088686-0
                                                                            • Opcode ID: 0a8204f6f33cb5e66b91052a81dc48ea5e40ee39a0ff7f9395dcb28afdf64f6f
                                                                            • Instruction ID: 75dc275b8d833e9ecef72ec854504e64cd5681abc0f420af5b8b2dc5422df0e2
                                                                            • Opcode Fuzzy Hash: 0a8204f6f33cb5e66b91052a81dc48ea5e40ee39a0ff7f9395dcb28afdf64f6f
                                                                            • Instruction Fuzzy Hash: F8012561B09B4282FB549F69A4748793392EF4A764B148334CD3DCA3DDEE3CF4858621
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoadmalloc
                                                                            • String ID: Fold$GetLexerCount$GetLexerName$Lex
                                                                            • API String ID: 3900084889-2069656008
                                                                            • Opcode ID: 2ffab1b4f0c2d0a3a85dfa083b6e4375b7e11e582e46a2457288091af32bab15
                                                                            • Instruction ID: be934961fa22aedfb877b25d9d30217b1746266465f8b7beb8e9763b5c8c80e0
                                                                            • Opcode Fuzzy Hash: 2ffab1b4f0c2d0a3a85dfa083b6e4375b7e11e582e46a2457288091af32bab15
                                                                            • Instruction Fuzzy Hash: B5512872B04B4682EB10DB15E4A47AD73A0FB48B84F548235DE6D4B7A9DF7DD455C300
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateLongPoints
                                                                            • String ID: ListBoxX$P
                                                                            • API String ID: 162144314-2724320830
                                                                            • Opcode ID: 52558d631af45d60a490c8f099cbc23d1e02361306a5efb31e074ab7b50107df
                                                                            • Instruction ID: a1dd7b98e9eb8faa509aff14b4a2b8b0a0210be0c00f1bffcb7a83f55819e685
                                                                            • Opcode Fuzzy Hash: 52558d631af45d60a490c8f099cbc23d1e02361306a5efb31e074ab7b50107df
                                                                            • Instruction Fuzzy Hash: 05113D72608B8186E710CF14F44079A77A4F788B54F244235E7A987B68CF3DC096CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: free$ErrorFreeHeapLast_errno
                                                                            • String ID:
                                                                            • API String ID: 1012874770-0
                                                                            • Opcode ID: d51a666402fb47c19eb42a99d15c53fe91c408ce5428aee34a45398d462b8c2b
                                                                            • Instruction ID: c36b25df41367f85a6f2026c738d60a9938b8d676448c417cb3ecc586eb16f26
                                                                            • Opcode Fuzzy Hash: d51a666402fb47c19eb42a99d15c53fe91c408ce5428aee34a45398d462b8c2b
                                                                            • Instruction Fuzzy Hash: 0B019962B0980291FB55DB91D4F28783361AF94744F850A72DD3ECA5DE8EACF9C08264
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocLock$Unlock
                                                                            • String ID:
                                                                            • API String ID: 3539109396-0
                                                                            • Opcode ID: a288ba400e94511ccb48c1cf40598669454151759060f1defe2dd6b8497c930f
                                                                            • Instruction ID: de5e9e939c5a8d93947262a23f6dd83727361941e3b82a7e5bb50cf5fa017afc
                                                                            • Opcode Fuzzy Hash: a288ba400e94511ccb48c1cf40598669454151759060f1defe2dd6b8497c930f
                                                                            • Instruction Fuzzy Hash: 90314762F0A78286EB249F21E06456963A1EB84B84F084635DB7A473C9DF7CFA84C740
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDeleteObjectRect$Combine
                                                                            • String ID:
                                                                            • API String ID: 2067609871-0
                                                                            • Opcode ID: 7c8713bd5d6bcbfd2bef2450c0254898ae6bee78d9bb6d1807855076742bffa2
                                                                            • Instruction ID: af94ecb7ae9b1fe784c8431580ee44f5240c88f8f0b86d1b9f5c90f1dcb0d359
                                                                            • Opcode Fuzzy Hash: 7c8713bd5d6bcbfd2bef2450c0254898ae6bee78d9bb6d1807855076742bffa2
                                                                            • Instruction Fuzzy Hash: 9C318E73B1468686E3148F21D5A49AC7361F749F80F944635CA7987799CF3CF8A5C704
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Object$Select$BrushColorCreateDeleteNearestSolid
                                                                            • String ID:
                                                                            • API String ID: 2375338405-0
                                                                            • Opcode ID: e47441e30976984e43c325bae6c40830caf9c774175427a3007738b6f587449c
                                                                            • Instruction ID: 8d4e91a70652f64647111c4926a90911b79552562581f27b231059e2447e2578
                                                                            • Opcode Fuzzy Hash: e47441e30976984e43c325bae6c40830caf9c774175427a3007738b6f587449c
                                                                            • Instruction Fuzzy Hash: 2BF0EC76A15B018BDB448F21E4A872933B5FB89F59F101635CE2E9A398CF39D4D5C340
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CreateLong
                                                                            • String ID: ACallTip$CallTip
                                                                            • API String ID: 1475011609-1662286206
                                                                            • Opcode ID: dbea683522d1c730bb75b1b5fad904775fc79d7f7fe1d5dc92676b5c21b90bc2
                                                                            • Instruction ID: 68fe15763107d380f02250a1ea0ffb6c19dcbd46c60de1576f90f3cc1b17b847
                                                                            • Opcode Fuzzy Hash: dbea683522d1c730bb75b1b5fad904775fc79d7f7fe1d5dc92676b5c21b90bc2
                                                                            • Instruction Fuzzy Hash: 82012D72608B8187E7548F28F554799B7A0F748754F244235EBA98B798DF3DD0A5CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            • GetModuleHandleW.KERNEL32(?,?,000000FF,00007FFDFF232C4D,?,?,00000000,00007FFDFF234492,?,?,?,00007FFDFF23455F), ref: 00007FFDFF232C13
                                                                            • GetProcAddress.KERNEL32(?,?,000000FF,00007FFDFF232C4D,?,?,00000000,00007FFDFF234492,?,?,?,00007FFDFF23455F), ref: 00007FFDFF232C28
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: AddressHandleModuleProc
                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                            • API String ID: 1646373207-1276376045
                                                                            • Opcode ID: 284b1cc4e5b3155bfd53f47e4293e2cdaa7eb1468d550c2b942aa836089c5e81
                                                                            • Instruction ID: 91950a61ed48f486633e83e94939efa734d472210d9ab7d50c63285adb11ccd1
                                                                            • Opcode Fuzzy Hash: 284b1cc4e5b3155bfd53f47e4293e2cdaa7eb1468d550c2b942aa836089c5e81
                                                                            • Instruction Fuzzy Hash: C4E08CA0B0A30641FF084B50A8A497423506F48700B480A38C43ECA3D8DF7CE4C8C600
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: CompositionContext$FontReleaseWindow
                                                                            • String ID:
                                                                            • API String ID: 3587243089-0
                                                                            • Opcode ID: b8e006bea70a35b6a82125b61ec03fd434ade7a2dc2b44e2f8d1f003af302e2a
                                                                            • Instruction ID: 0c60d273d3b0a754bcca03362286c764f6ab4ed412818ae8977dec946ccc01df
                                                                            • Opcode Fuzzy Hash: b8e006bea70a35b6a82125b61ec03fd434ade7a2dc2b44e2f8d1f003af302e2a
                                                                            • Instruction Fuzzy Hash: 4051A177A0C6C18AD714DB25E0605AFBBA4F785784F440225EBAE83B9ADF7DE454CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Window$ByteCharCompositionContextMultiProcReleaseWide
                                                                            • String ID:
                                                                            • API String ID: 3977324709-0
                                                                            • Opcode ID: 3dc14d72a87a3d095729a1d49f7192b22b93132e756e8a99f5e4b108138a51ba
                                                                            • Instruction ID: 4cf5bea4645e5d188bbef59db7c5ac65060a9691a40d85ea940faa0dd0da5dcf
                                                                            • Opcode Fuzzy Hash: 3dc14d72a87a3d095729a1d49f7192b22b93132e756e8a99f5e4b108138a51ba
                                                                            • Instruction Fuzzy Hash: 2341A762B0C68286E710DB65E074BEEA7A0FB85B84F444135DBAD87B99DF3CE405CB10
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: ByteCharExtentMultiPoint32TextWide$ObjectSelect
                                                                            • String ID:
                                                                            • API String ID: 2885946197-0
                                                                            • Opcode ID: 5a898a046883d93383dee5c151781ae58e45a7dbf96ed0f3de4a502e5a0070fd
                                                                            • Instruction ID: d12b3d824fd8416a5cab5d58eb8f3b1a498be90b47ab2802888a9ae0f3a4d980
                                                                            • Opcode Fuzzy Hash: 5a898a046883d93383dee5c151781ae58e45a7dbf96ed0f3de4a502e5a0070fd
                                                                            • Instruction Fuzzy Hash: 2E21C263F1C78196E764CB25A46086D77A4FB86B84F045235EE6D83B99DF3CE950CB00
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Object$ReleaseSelectStock
                                                                            • String ID:
                                                                            • API String ID: 3383022508-0
                                                                            • Opcode ID: 5f20d1a40bc0a6f1281a52c6e575e2a95c4d33682f7a3e1fcc9ed37259b7025a
                                                                            • Instruction ID: 69a1296e3b2f28db119d9815cef0e95499a0ae8566bc3870a588ed854f3af3da
                                                                            • Opcode Fuzzy Hash: 5f20d1a40bc0a6f1281a52c6e575e2a95c4d33682f7a3e1fcc9ed37259b7025a
                                                                            • Instruction Fuzzy Hash: B7110A66B08A4682EB149F22E4645AD6761FB89FC0F084131DF6E4BB99DF2CD0558704
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: CriticalDeleteSection$Freefree
                                                                            • String ID:
                                                                            • API String ID: 1250194111-0
                                                                            • Opcode ID: 2ad3d28c587bd08eb7902974d992a7a010c9b92d8139d310635880315e2a9b10
                                                                            • Instruction ID: 56ec3767afdd220ff0a04d9afe4ae31c5220456dc7f60c021df9278e741f87be
                                                                            • Opcode Fuzzy Hash: 2ad3d28c587bd08eb7902974d992a7a010c9b92d8139d310635880315e2a9b10
                                                                            • Instruction Fuzzy Hash: F7115BB1F09A42C2EB189B11B4A05787360FB06B54F594331DA79CAADDCF3CE5A28B10
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: DecodePointer_errno_flush_freebuf
                                                                            • String ID:
                                                                            • API String ID: 1889905870-0
                                                                            • Opcode ID: e8fbb785bd74b5e55ce1839b5dd3b53b9a68c1d6d0f3ecba4533074e0c9cf71c
                                                                            • Instruction ID: 003f8aee78de8a0031af3676967f53128fcbb0516309b763914a156ebd9af09d
                                                                            • Opcode Fuzzy Hash: e8fbb785bd74b5e55ce1839b5dd3b53b9a68c1d6d0f3ecba4533074e0c9cf71c
                                                                            • Instruction Fuzzy Hash: 7101C0A2F1C50242FF149A79D431F7967956F85B64F280330EA39CA1CACF3DE4848244
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: BrushCreate$DeleteFillObjectPatternRectSolid
                                                                            • String ID:
                                                                            • API String ID: 228723661-0
                                                                            • Opcode ID: 85d420660b7462b87324221a53b7fa1b454c96b4a6a58487206dbbfdbc75cdfc
                                                                            • Instruction ID: ee696d3c806b897af075ec9100d60f99690e2aedc430439a1ebfe7a7bbcc5003
                                                                            • Opcode Fuzzy Hash: 85d420660b7462b87324221a53b7fa1b454c96b4a6a58487206dbbfdbc75cdfc
                                                                            • Instruction Fuzzy Hash: D101FE76A0878586D7208F15F45046AB771FB89B80F045635EFAD96B58DF3CD194CB40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: __doserrno_errno
                                                                            • String ID:
                                                                            • API String ID: 921712934-0
                                                                            • Opcode ID: c48c262b56f1e5ceb7cc8fb55cf3b5e6f0d362ffa26c9279143439e32e8b221e
                                                                            • Instruction ID: 648b2716506bd00a9f6f2685d8b589399c68fccaf4ad76047e0632b12963b7b1
                                                                            • Opcode Fuzzy Hash: c48c262b56f1e5ceb7cc8fb55cf3b5e6f0d362ffa26c9279143439e32e8b221e
                                                                            • Instruction Fuzzy Hash: 67019EA2B2865641FB195B14C875FB82B60AF90B21F908371DA3ECE7DACF7C70818611
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CreateDeleteFontIndirectMessageSend
                                                                            • String ID:
                                                                            • API String ID: 1574616763-0
                                                                            • Opcode ID: fb77201d2635bcecb0717f842d59dac8054e5d3cff8bc725890599b94b91b189
                                                                            • Instruction ID: ce23fcd07b7c473d6156a2cedd5cee66da53f058235d7cd5594a4dab0c108407
                                                                            • Opcode Fuzzy Hash: fb77201d2635bcecb0717f842d59dac8054e5d3cff8bc725890599b94b91b189
                                                                            • Instruction Fuzzy Hash: 4801E8B6B15B4582EB509F21E465BA933B1FB89B85F501231CEADCA798DF3CE544C700
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.2925607392.00007FFDFF1C1000.00000020.00000001.01000000.00000009.sdmp, Offset: 00007FFDFF1C0000, based on PE: true
                                                                            • Associated: 00000005.00000002.2925589009.00007FFDFF1C0000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925651851.00007FFDFF239000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925672007.00007FFDFF244000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                                            • Associated: 00000005.00000002.2925690531.00007FFDFF24A000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_7ffdff1c0000_Bat_To_Exe_Converter.jbxd
                                                                            Similarity
                                                                            • API ID: Object$Select$CreateDelete
                                                                            • String ID:
                                                                            • API String ID: 1326144132-0
                                                                            • Opcode ID: 751b5d9bb94d752f21ae2cdf8d608a1d09a126db09b3295144678e2b6dc4f8de
                                                                            • Instruction ID: 613f63098029f64a51e41439e4dcb44f85e514a05a334a015374bba7c8a9189a
                                                                            • Opcode Fuzzy Hash: 751b5d9bb94d752f21ae2cdf8d608a1d09a126db09b3295144678e2b6dc4f8de
                                                                            • Instruction Fuzzy Hash: B8F037B6A15A0086EB248F21D45472933B1FB8DF58F200234CE6E8A398CF39C496C744
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%