Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe

Overview

General Information

Sample name:DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
Analysis ID:1465167
MD5:6a8d426b602c62ff313a431b6f026b6b
SHA1:e7955a9399f8d836ed29c99463ba8e4fbae34364
SHA256:1baf9b4c1a0152616a56d2212c88af4f5e791257f54ee3252ba0cefa4f587a07
Tags:AgentTeslabatDHLexe
Infos:

Detection

GuLoader
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3738490045.0000000007F4E000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    Process Memory Space: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe PID: 7724JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAvira: detected
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeVirustotal: Detection: 15%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_00405A4F
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004027CF FindFirstFileA,0_2_004027CF
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeString found in binary or memory: http://www.skinstudio.netG
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040550F

      System Summary

      barindex
      Source: initial sampleStatic PE information: Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
      Source: initial sampleStatic PE information: Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004033D8
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004072D10_2_004072D1
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406AFA0_2_00406AFA
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_6D381B280_2_6D381B28
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000000.1283096345.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal84.troj.evad.winEXE@1/17@0/0
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004033D8
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004047BF GetDlgItem,SetWindowTextA,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,0_2_004047BF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00402198 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,0_2_00402198
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsmDFF2.tmpJump to behavior
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeVirustotal: Detection: 15%
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile read: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
      Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: Yara matchFile source: Process Memory Space: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe PID: 7724, type: MEMORYSTR
      Source: Yara matchFile source: 00000000.00000002.3738490045.0000000007F4E000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_6D381B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6D381B28
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4E3E1 push esp; ret 0_2_07F4E3E3
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4E1E1 push esp; ret 0_2_07F4E1E3
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F51BD3 pushfd ; iretd 0_2_07F51BDA
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F507DC pushfd ; ret 0_2_07F507F1
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F50FD9 pushfd ; ret 0_2_07F50FE6
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4F7CE push ecx; iretd 0_2_07F4F7CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4EFCE push ecx; iretd 0_2_07F4EFCF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F519CE push ecx; iretd 0_2_07F519CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F531CE push ecx; iretd 0_2_07F531CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F527CA push ecx; iretd 0_2_07F527CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F52DB7 push ecx; iretd 0_2_07F52DCF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F507BF push ecx; iretd 0_2_07F507CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4E9BF push ecx; iretd 0_2_07F4E9CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4F5BF push ecx; iretd 0_2_07F4F5CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4E3A2 push ebx; ret 0_2_07F4E3A3
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4E1A2 push ebx; ret 0_2_07F4E1A3
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F5033C push esi; ret 0_2_07F50323
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F502F7 push esi; ret 0_2_07F50323
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4EAF7 push esi; ret 0_2_07F4EB23
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F512F9 push esi; ret 0_2_07F51323
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4E6E1 push esp; ret 0_2_07F4E6E3
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4E0E1 push esp; ret 0_2_07F4E0E3
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4F2CE push ecx; iretd 0_2_07F4F2CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4FACE push ecx; iretd 0_2_07F4FACF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F510CE push ecx; iretd 0_2_07F510CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F516CE push ecx; iretd 0_2_07F516CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F52ACE push ecx; iretd 0_2_07F52ACF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F518B7 push ecx; iretd 0_2_07F518CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F50CB3 push ecx; iretd 0_2_07F50CCF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F50ABF push ecx; iretd 0_2_07F50ACF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_07F4EEBF push ecx; iretd 0_2_07F4EECF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\nsExec.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\UserInfo.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\BgImage.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\maskinmestres.ChiJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Misbound.BogJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Charting.skrJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernesJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\chokoladeforretning.marJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\doubling.regJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\hmoriderne.nerJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\lvens.flbJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\materialiter.sigJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\preinvest.priJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\ridningen.txtJump to behavior
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeRDTSC instruction interceptor: First address: 862119A second address: 862119A instructions: 0x00000000 rdtsc 0x00000002 test ebx, ebx 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FC44543F849h 0x00000008 cmp ebx, 1BD307B4h 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 jmp 00007FC44543F8D6h 0x00000012 push edx 0x00000013 mov edx, 148FE6A7h 0x00000018 cmp edx, 000000ACh 0x0000001e jng 00007FC445479028h 0x00000024 pop edx 0x00000025 rdtsc
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\nsExec.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\UserInfo.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\BgImage.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_00405A4F
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004027CF FindFirstFileA,0_2_004027CF
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4908
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-5056
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406647 LdrInitializeThunk,GetSystemDirectoryA,LdrInitializeThunk,LdrInitializeThunk,wsprintfA,LdrInitializeThunk,LoadLibraryExA,0_2_00406647
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_6D381B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6D381B28
      Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004033D8
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      1
      Masquerading
      OS Credential Dumping1
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      Registry Run Keys / Startup Folder
      1
      DLL Side-Loading
      1
      Access Token Manipulation
      LSASS Memory3
      File and Directory Discovery
      Remote Desktop Protocol1
      Clipboard Data
      Junk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Registry Run Keys / Startup Folder
      1
      DLL Side-Loading
      Security Account Manager13
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe11%ReversingLabs
      DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe15%VirustotalBrowse
      DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe100%AviraHEUR/AGEN.1338492
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\BgImage.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\BgImage.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll1%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\UserInfo.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\UserInfo.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\nsExec.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\nsExec.dll0%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
      http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
      http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
      http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
      http://www.skinstudio.netG0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exefalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exefalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.skinstudio.netGDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exefalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1465167
      Start date and time:2024-07-01 11:59:14 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 8m 11s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
      Detection:MAL
      Classification:mal84.troj.evad.winEXE@1/17@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 99%
      • Number of executed functions: 52
      • Number of non-executed functions: 30
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
        P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
          P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
            pp0fHVNbib.exeGet hashmaliciousFormBook, GuLoaderBrowse
              pp0fHVNbib.exeGet hashmaliciousGuLoaderBrowse
                kZlAkx6fp7.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  kZlAkx6fp7.exeGet hashmaliciousGuLoaderBrowse
                    detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exeGet hashmaliciousGuLoaderBrowse
                      Kompagnonernes.exeGet hashmaliciousGuLoaderBrowse
                        detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exeGet hashmaliciousGuLoaderBrowse
                          C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\BgImage.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                            P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                              P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):49
                                Entropy (8bit):4.75216571132969
                                Encrypted:false
                                SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                MD5:797DA95245047A54F125FBF3B19FA295
                                SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):7680
                                Entropy (8bit):5.188410641489526
                                Encrypted:false
                                SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Joe Sandbox View:
                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):12288
                                Entropy (8bit):5.744994954995265
                                Encrypted:false
                                SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                MD5:12B140583E3273EE1F65016BECEA58C4
                                SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 1%, Browse
                                Joe Sandbox View:
                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                • Filename: detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe, Detection: malicious, Browse
                                • Filename: Kompagnonernes.exe, Detection: malicious, Browse
                                • Filename: detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe, Detection: malicious, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):4096
                                Entropy (8bit):3.327532764383977
                                Encrypted:false
                                SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                MD5:90228DD140188EC0CA02F7F52E4C9A30
                                SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):6656
                                Entropy (8bit):5.178709395875687
                                Encrypted:false
                                SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                • Antivirus: Virustotal, Detection: 0%, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):25
                                Entropy (8bit):4.163856189774724
                                Encrypted:false
                                SSDEEP:3:+gMn:8
                                MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:[Caps]..Setting=Enabled..
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3011
                                Entropy (8bit):4.875614577841428
                                Encrypted:false
                                SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                MD5:6103DF2AF52F53D95AF61664D1866FFE
                                SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                Malicious:false
                                Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3794
                                Entropy (8bit):4.876163305802233
                                Encrypted:false
                                SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                MD5:0629DF955F60990975A3C8EF199B57E9
                                SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                Malicious:false
                                Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):12525
                                Entropy (8bit):4.544077934672787
                                Encrypted:false
                                SSDEEP:192:7NEPgv6otln2xIezOgr141L0SXYZoZh5ROedTjzznjhHCSDnf7Nyj:uPgvbXD81WieZhjtzjhiKfByj
                                MD5:41CCFA13E5C8C07E20030CFFD43F1177
                                SHA1:3C3435392858891E2A10AED297209AE474D355BF
                                SHA-256:5EDFAF67791E6D6EEEA4C27A6318616D7DEE9162E7225972131DDCEF65C1741B
                                SHA-512:BF89EB697AFF80775FC98D5B50930503FAC3310D2FCA2E200F672164E5A430554D1783DF636C8CB8D742BC2E4A3680419E59B098093569E864F15B4ACB05AEA9
                                Malicious:false
                                Preview:.....^^...............J...&....@@@@..........K......-...Z.....---........&&.................RRRk...e...r...n...e...l...3...2...:...:...C...r...e..Ta...t...e.wwF...i...l...e...A...(...m... ..|r..#4... ...,. . ...i... ...0...x...8...0..20...0...0.l.0...0...0...,... .2.i... ...0...,.]. ...p... ...0...,... ...i... ...4.bb,..b ...i... ...0...x...8...0...,... ...i... ...0...)...i.......r...8...q...k...e..}r.x.n...e.kkl...3...2...:...:...S...e...t...F...i...l...e...P...o..Mi...n...t...e.>.r...(...i... ...r...8.11,... ...i... ...2...3...0...1...2... ...,... ...i... ...0...,.33i... ...0...)...i.b.....r...4...q.QQk...e..\r...n...e...l...3...2...:.&&:...V...i...r...t...u...a...l...A..Ml...l...o...c...(...i... ...0...,...i... ...8.>>0...7..w1...1...6...8...0...,... ...i... ...0...x...3...0...0...0...,... ...i... ...0..wx...4...0...)...p.......r...2...q...k...e.X.r..Mn...e...l...3...2.I.:..o:...R.JJe...a../d...F...i...l...e...(...i... ...r..h8...,... ...i... ...r...2...,... ...i... ..48.oo0..H7...1
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3861
                                Entropy (8bit):4.8950653795254695
                                Encrypted:false
                                SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                MD5:2B5A33F2637CE6016495BE603413514E
                                SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                Malicious:false
                                Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3435
                                Entropy (8bit):4.910328234136937
                                Encrypted:false
                                SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                Malicious:false
                                Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1618
                                Entropy (8bit):4.660461986408
                                Encrypted:false
                                SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                Malicious:false
                                Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2322
                                Entropy (8bit):4.685927571910316
                                Encrypted:false
                                SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                Malicious:false
                                Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2438
                                Entropy (8bit):4.834166284053989
                                Encrypted:false
                                SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                Malicious:false
                                Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3194
                                Entropy (8bit):4.87998401204962
                                Encrypted:false
                                SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                Malicious:false
                                Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):434
                                Entropy (8bit):4.287029634434794
                                Encrypted:false
                                SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                Malicious:false
                                Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File Type:Atari 68xxx CPX file (version 0000)
                                Category:dropped
                                Size (bytes):262838
                                Entropy (8bit):7.457586703099572
                                Encrypted:false
                                SSDEEP:6144:AwCzB8jIN1rI6nre9wQLONw0htBT+FEoiiG0op9HhwMxtAXadr:VQ8jIjI6nlQLO+gtsFEXigfHtJdr
                                MD5:E0DD1EA179AE4ABFB91E06A8EA7376A3
                                SHA1:76D67F6C2E204C910EE2B234400F1BF5624D5FD4
                                SHA-256:F8C468F8E00452469AE2BAD42E527970523EF9618E3F2DDE412A7CC3A4C88192
                                SHA-512:863259B1AB174E5FD39EE2F5779DEF817C8539F5CC89A123FCED9B629245436847777354ADE01B2E38D902A0EF51E6E235E2DCE1FD304EECA7700FBD3105166A
                                Malicious:false
                                Preview:.ddddd................&.$.000.......8............uu.-....&...........Q..........j.,........RR..f....................&&.....000.......X............T............................................Z....j..........................qq.........B..>>...................................xxxx.......................>.........RR........~..YYYY.........[[[..............W.tt........kk.....ll.......p........................-........v...n.............................""".h.........T......QQ.,,.......{.....................a.].<<...........xx........JJJ..55.a.Y............................Y.JJ...............................E..[[.r...z.......4444.....%...............9........}.N..........b.................................AA...............D......................>..TT.::..cc...JJJJJ..........c.\.............................I.......gg.........b.ZZZZZZ..::...........RR..........M....99............................................&..~..........<.....NN.......JJ.>..................."...........hh.............mm.,.....
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):7.450674864990241
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                File size:510'664 bytes
                                MD5:6a8d426b602c62ff313a431b6f026b6b
                                SHA1:e7955a9399f8d836ed29c99463ba8e4fbae34364
                                SHA256:1baf9b4c1a0152616a56d2212c88af4f5e791257f54ee3252ba0cefa4f587a07
                                SHA512:b0c5d006955050825e2846b76291eaadec36f3df4c13312d95cdf3cc3fea64c952823d9bc386096e69f3eae71afcd79250f5d9f272838c9afc76c6a502cde123
                                SSDEEP:12288:c19+dlfwYKZWegMLzt56trFwX78iVDtWDlLHciPe:PdloYK7gMLztstrS8ctWD67
                                TLSH:ADB4DF13F723C8EBDA3D12F1A9A2D7762EE4101A99B1D1DCE7E5BE4770009263B09365
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                Icon Hash:eb9b9b2bbb9be371
                                Entrypoint:0x4033d8
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:671f2a1f8aee14d336bab98fea93d734
                                Instruction
                                push ebp
                                mov ebp, esp
                                sub esp, 00000224h
                                push esi
                                push edi
                                xor edi, edi
                                push 00008001h
                                mov dword ptr [ebp-14h], edi
                                mov dword ptr [ebp-0Ch], 0040A188h
                                mov dword ptr [ebp-08h], edi
                                mov byte ptr [ebp-04h], 00000020h
                                call dword ptr [0040809Ch]
                                mov esi, dword ptr [004080A0h]
                                lea eax, dword ptr [ebp-000000C4h]
                                push eax
                                mov dword ptr [ebp-000000B0h], edi
                                mov dword ptr [ebp-30h], edi
                                mov dword ptr [ebp-2Ch], edi
                                mov dword ptr [ebp-000000C4h], 0000009Ch
                                call esi
                                test eax, eax
                                jne 00007FC444C9F781h
                                lea eax, dword ptr [ebp-000000C4h]
                                mov dword ptr [ebp-000000C4h], 00000094h
                                push eax
                                call esi
                                cmp dword ptr [ebp-000000B4h], 02h
                                jne 00007FC444C9F76Ch
                                movsx cx, byte ptr [ebp-000000A3h]
                                mov al, byte ptr [ebp-000000B0h]
                                sub ecx, 30h
                                sub al, 53h
                                mov byte ptr [ebp-2Ah], 00000004h
                                neg al
                                sbb eax, eax
                                not eax
                                and eax, ecx
                                mov word ptr [ebp-30h], ax
                                cmp dword ptr [ebp-000000B4h], 02h
                                jnc 00007FC444C9F764h
                                and byte ptr [ebp-2Ah], 00000000h
                                cmp byte ptr [ebp-000000AFh], 00000041h
                                jl 00007FC444C9F753h
                                movsx ax, byte ptr [ebp-000000AFh]
                                sub eax, 40h
                                mov word ptr [ebp-30h], ax
                                jmp 00007FC444C9F746h
                                mov word ptr [ebp-30h], di
                                cmp dword ptr [ebp-000000C0h], 0Ah
                                jnc 00007FC444C9F74Ah
                                and word ptr [ebp+00000000h], 0000h
                                Programming Language:
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                DLLImport
                                ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Target ID:0
                                Start time:06:00:09
                                Start date:01/07/2024
                                Path:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"
                                Imagebase:0x400000
                                File size:510'664 bytes
                                MD5 hash:6A8D426B602C62FF313A431B6F026B6B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3738490045.0000000007F4E000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:18.9%
                                  Dynamic/Decrypted Code Coverage:14%
                                  Signature Coverage:16.6%
                                  Total number of Nodes:1520
                                  Total number of Limit Nodes:40
                                  execution_graph 4265 4015c2 4269 402c5e 4265->4269 4268 4015db 4270 402c6a 4269->4270 4275 406320 4270->4275 4273 4015c9 SetFileAttributesA 4273->4268 4290 40632d 4275->4290 4276 40656e 4277 402c8b 4276->4277 4314 40628d lstrcpynA 4276->4314 4277->4273 4292 406587 4277->4292 4279 406545 lstrlenA 4279->4290 4280 406320 15 API calls 4280->4279 4283 40644c GetSystemDirectoryA 4283->4290 4285 406462 GetWindowsDirectoryA 4285->4290 4286 406587 5 API calls 4286->4290 4287 4064ee lstrcatA 4287->4290 4288 406320 15 API calls 4288->4290 4290->4276 4290->4279 4290->4280 4290->4283 4290->4285 4290->4286 4290->4287 4290->4288 4291 4064c5 SHGetPathFromIDListA CoTaskMemFree 4290->4291 4301 406174 4290->4301 4306 4066b5 GetModuleHandleA 4290->4306 4312 4061eb wsprintfA 4290->4312 4313 40628d lstrcpynA 4290->4313 4291->4290 4293 406593 4292->4293 4295 4065f0 CharNextA 4293->4295 4298 4065fb 4293->4298 4299 4065de CharNextA 4293->4299 4300 4065eb CharNextA 4293->4300 4322 405c4a 4293->4322 4294 4065ff CharPrevA 4294->4298 4295->4293 4295->4298 4296 40661a 4296->4273 4298->4294 4298->4296 4299->4293 4300->4295 4315 406113 4301->4315 4304 4061a8 RegQueryValueExA RegCloseKey 4305 4061d7 4304->4305 4305->4290 4307 4066d1 4306->4307 4308 4066db GetProcAddress 4306->4308 4319 406647 GetSystemDirectoryA 4307->4319 4310 4066ea 4308->4310 4310->4290 4311 4066d7 4311->4308 4311->4310 4312->4290 4313->4290 4314->4277 4316 406122 4315->4316 4317 406126 4316->4317 4318 40612b RegOpenKeyExA 4316->4318 4317->4304 4317->4305 4318->4317 4320 406669 wsprintfA LoadLibraryExA 4319->4320 4320->4311 4323 405c50 4322->4323 4324 405c63 4323->4324 4325 405c56 CharNextA 4323->4325 4324->4293 4325->4323 4326 402543 4337 402c9e 4326->4337 4329 402c5e 21 API calls 4330 402556 4329->4330 4331 402560 RegQueryValueExA 4330->4331 4332 4027ed 4330->4332 4333 402580 4331->4333 4336 402586 RegCloseKey 4331->4336 4333->4336 4342 4061eb wsprintfA 4333->4342 4336->4332 4338 402c5e 21 API calls 4337->4338 4339 402cb5 4338->4339 4340 406113 RegOpenKeyExA 4339->4340 4341 40254d 4340->4341 4341->4329 4342->4336 4343 401a43 4344 402c5e 21 API calls 4343->4344 4345 401a4c ExpandEnvironmentStringsA 4344->4345 4346 401a60 4345->4346 4348 401a73 4345->4348 4347 401a65 lstrcmpA 4346->4347 4346->4348 4347->4348 5492 401d44 5493 402c3c 21 API calls 5492->5493 5494 401d4b 5493->5494 5495 402c3c 21 API calls 5494->5495 5496 401d57 GetDlgItem 5495->5496 5497 40264d 5496->5497 5497->5497 5804 401744 5805 402c5e 21 API calls 5804->5805 5806 40174b SearchPathA 5805->5806 5807 401766 5806->5807 5498 6d38103d 5501 6d38101b 5498->5501 5508 6d38154b 5501->5508 5503 6d381020 5504 6d381024 5503->5504 5505 6d381027 GlobalAlloc 5503->5505 5506 6d381572 3 API calls 5504->5506 5505->5504 5507 6d38103b 5506->5507 5509 6d381551 5508->5509 5510 6d381557 5509->5510 5511 6d381563 GlobalFree 5509->5511 5510->5503 5511->5503 5808 405345 5809 405355 5808->5809 5810 405369 5808->5810 5811 40535b 5809->5811 5820 4053b2 5809->5820 5812 405371 IsWindowVisible 5810->5812 5818 405388 5810->5818 5815 404379 SendMessageA 5811->5815 5813 40537e 5812->5813 5812->5820 5816 404c80 5 API calls 5813->5816 5814 4053b7 CallWindowProcA 5817 405365 5814->5817 5815->5817 5816->5818 5818->5814 5819 404d00 4 API calls 5818->5819 5819->5820 5820->5814 4349 6d3829b1 4350 6d382a01 4349->4350 4351 6d3829c1 VirtualProtect 4349->4351 4351->4350 4352 4023c9 4353 4023d1 4352->4353 4354 4023d7 4352->4354 4355 402c5e 21 API calls 4353->4355 4356 402c5e 21 API calls 4354->4356 4359 4023e7 4354->4359 4355->4354 4356->4359 4357 402c5e 21 API calls 4360 4023f5 4357->4360 4358 402c5e 21 API calls 4361 4023fe WritePrivateProfileStringA 4358->4361 4359->4357 4359->4360 4360->4358 4362 4020ca 4363 4020dc 4362->4363 4364 40218a 4362->4364 4365 402c5e 21 API calls 4363->4365 4367 401423 28 API calls 4364->4367 4366 4020e3 4365->4366 4368 402c5e 21 API calls 4366->4368 4373 40230f 4367->4373 4369 4020ec 4368->4369 4370 402101 LoadLibraryExA 4369->4370 4371 4020f4 GetModuleHandleA 4369->4371 4370->4364 4372 402111 GetProcAddress 4370->4372 4371->4370 4371->4372 4374 402120 4372->4374 4375 40215d 4372->4375 4377 402128 4374->4377 4378 40213f 4374->4378 4428 4053d1 4375->4428 4425 401423 4377->4425 4383 6d38176b 4378->4383 4379 402130 4379->4373 4381 40217e FreeLibrary 4379->4381 4381->4373 4384 6d38179b 4383->4384 4439 6d381b28 4384->4439 4386 6d3817a2 4387 6d3818c4 4386->4387 4388 6d3817ba 4386->4388 4389 6d3817b3 4386->4389 4387->4379 4471 6d382381 4388->4471 4487 6d38233f 4389->4487 4394 6d38181e 4400 6d38186c 4394->4400 4401 6d381824 4394->4401 4395 6d381800 4500 6d382568 4395->4500 4396 6d3817e9 4410 6d3817df 4396->4410 4497 6d382d53 4396->4497 4397 6d3817d0 4399 6d3817d6 4397->4399 4405 6d3817e1 4397->4405 4399->4410 4481 6d382ac8 4399->4481 4403 6d382568 11 API calls 4400->4403 4519 6d3815fb 4401->4519 4413 6d38185d 4403->4413 4404 6d381806 4511 6d3815e9 4404->4511 4491 6d382742 4405->4491 4410->4394 4410->4395 4412 6d382568 11 API calls 4412->4413 4416 6d3818b3 4413->4416 4525 6d38252e 4413->4525 4415 6d3817e7 4415->4410 4416->4387 4418 6d3818bd GlobalFree 4416->4418 4418->4387 4422 6d38189f 4422->4416 4529 6d381572 wsprintfA 4422->4529 4423 6d381898 FreeLibrary 4423->4422 4426 4053d1 28 API calls 4425->4426 4427 401431 4426->4427 4427->4379 4429 4053ec 4428->4429 4438 40548f 4428->4438 4430 405409 lstrlenA 4429->4430 4431 406320 21 API calls 4429->4431 4432 405432 4430->4432 4433 405417 lstrlenA 4430->4433 4431->4430 4434 405445 4432->4434 4435 405438 SetWindowTextA 4432->4435 4436 405429 lstrcatA 4433->4436 4433->4438 4437 40544b SendMessageA SendMessageA SendMessageA 4434->4437 4434->4438 4435->4434 4436->4432 4437->4438 4438->4379 4532 6d3812a5 GlobalAlloc 4439->4532 4441 6d381b4f 4533 6d3812a5 GlobalAlloc 4441->4533 4443 6d381d90 GlobalFree GlobalFree GlobalFree 4444 6d381dad 4443->4444 4462 6d381df7 4443->4462 4445 6d382181 4444->4445 4453 6d381dc2 4444->4453 4444->4462 4447 6d3821a3 GetModuleHandleA 4445->4447 4445->4462 4446 6d381c4d GlobalAlloc 4465 6d381b5a 4446->4465 4450 6d3821c9 4447->4450 4451 6d3821b4 LoadLibraryA 4447->4451 4448 6d381c98 lstrcpyA 4452 6d381ca2 lstrcpyA 4448->4452 4449 6d381cb6 GlobalFree 4449->4465 4540 6d381652 GetProcAddress 4450->4540 4451->4450 4451->4462 4452->4465 4453->4462 4536 6d3812b4 4453->4536 4455 6d38221a 4458 6d382227 lstrlenA 4455->4458 4455->4462 4456 6d382047 4539 6d3812a5 GlobalAlloc 4456->4539 4541 6d381652 GetProcAddress 4458->4541 4460 6d381f89 GlobalFree 4460->4465 4461 6d3820c3 4461->4462 4467 6d38211c lstrcpyA 4461->4467 4462->4386 4463 6d3821db 4463->4455 4469 6d382204 GetProcAddress 4463->4469 4465->4443 4465->4446 4465->4448 4465->4449 4465->4452 4465->4456 4465->4460 4465->4461 4465->4462 4466 6d3812b4 2 API calls 4465->4466 4534 6d3815c4 GlobalSize GlobalAlloc 4465->4534 4466->4465 4467->4462 4469->4455 4470 6d38204f 4470->4386 4472 6d38239a 4471->4472 4474 6d3824d6 GlobalFree 4472->4474 4476 6d382448 GlobalAlloc MultiByteToWideChar 4472->4476 4477 6d3812b4 GlobalAlloc lstrcpynA 4472->4477 4479 6d382495 4472->4479 4543 6d38133d 4472->4543 4474->4472 4475 6d3817c0 4474->4475 4475->4396 4475->4397 4475->4410 4478 6d382474 GlobalAlloc CLSIDFromString GlobalFree 4476->4478 4476->4479 4477->4472 4478->4474 4479->4474 4547 6d3826d6 4479->4547 4483 6d382ada 4481->4483 4482 6d382b7f EnumWindows 4486 6d382b9d 4482->4486 4483->4482 4485 6d382c69 4485->4410 4550 6d382a74 4486->4550 4488 6d382354 4487->4488 4489 6d38235f GlobalAlloc 4488->4489 4490 6d3817b9 4488->4490 4489->4488 4490->4388 4495 6d382772 4491->4495 4492 6d38280d GlobalAlloc 4496 6d382830 4492->4496 4493 6d382820 4494 6d382826 GlobalSize 4493->4494 4493->4496 4494->4496 4495->4492 4495->4493 4496->4415 4499 6d382d5e 4497->4499 4498 6d382d9e GlobalFree 4499->4498 4554 6d3812a5 GlobalAlloc 4500->4554 4502 6d382628 WideCharToMultiByte 4508 6d382574 4502->4508 4503 6d3825f3 lstrcpynA 4503->4508 4504 6d382604 StringFromGUID2 WideCharToMultiByte 4504->4508 4505 6d382649 wsprintfA 4505->4508 4506 6d38266d GlobalFree 4506->4508 4507 6d3826a7 GlobalFree 4507->4404 4508->4502 4508->4503 4508->4504 4508->4505 4508->4506 4508->4507 4509 6d3812f6 2 API calls 4508->4509 4555 6d381361 4508->4555 4509->4508 4559 6d3812a5 GlobalAlloc 4511->4559 4513 6d3815ee 4514 6d3815fb 2 API calls 4513->4514 4515 6d3815f8 4514->4515 4516 6d3812f6 4515->4516 4517 6d381338 GlobalFree 4516->4517 4518 6d3812ff GlobalAlloc lstrcpynA 4516->4518 4517->4413 4518->4517 4520 6d381634 lstrcpyA 4519->4520 4521 6d381607 wsprintfA 4519->4521 4524 6d38164d 4520->4524 4521->4524 4524->4412 4526 6d38253c 4525->4526 4527 6d38187f 4525->4527 4526->4527 4528 6d382555 GlobalFree 4526->4528 4527->4422 4527->4423 4528->4526 4530 6d3812f6 2 API calls 4529->4530 4531 6d381593 4530->4531 4531->4416 4532->4441 4533->4465 4535 6d3815e2 4534->4535 4535->4465 4542 6d3812a5 GlobalAlloc 4536->4542 4538 6d3812c3 lstrcpynA 4538->4462 4539->4470 4540->4463 4541->4462 4542->4538 4544 6d381344 4543->4544 4545 6d3812b4 2 API calls 4544->4545 4546 6d38135f 4545->4546 4546->4472 4548 6d38273a 4547->4548 4549 6d3826e4 VirtualAlloc 4547->4549 4548->4479 4549->4548 4551 6d382a7f 4550->4551 4552 6d382a8f 4551->4552 4553 6d382a84 GetLastError 4551->4553 4552->4485 4553->4552 4554->4508 4556 6d381389 4555->4556 4557 6d38136a 4555->4557 4556->4508 4557->4556 4558 6d381370 lstrcpyA 4557->4558 4558->4556 4559->4513 5710 402e4a 5711 402e59 SetTimer 5710->5711 5713 402e72 5710->5713 5711->5713 5712 402ec7 5713->5712 5714 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5713->5714 5714->5712 4567 40244e 4568 402480 4567->4568 4569 402455 4567->4569 4570 402c5e 21 API calls 4568->4570 4571 402c9e 21 API calls 4569->4571 4572 402487 4570->4572 4573 40245c 4571->4573 4579 402d1c 4572->4579 4575 402466 4573->4575 4576 402494 4573->4576 4577 402c5e 21 API calls 4575->4577 4578 40246d RegDeleteValueA RegCloseKey 4577->4578 4578->4576 4580 402d28 4579->4580 4581 402d2f 4579->4581 4580->4576 4581->4580 4583 402d60 4581->4583 4584 406113 RegOpenKeyExA 4583->4584 4585 402d8e 4584->4585 4586 402e43 4585->4586 4587 402d98 4585->4587 4586->4580 4588 402d9e RegEnumValueA 4587->4588 4593 402dc1 4587->4593 4589 402e28 RegCloseKey 4588->4589 4588->4593 4589->4586 4590 402dfd RegEnumKeyA 4591 402e06 RegCloseKey 4590->4591 4590->4593 4592 4066b5 5 API calls 4591->4592 4594 402e16 4592->4594 4593->4589 4593->4590 4593->4591 4595 402d60 6 API calls 4593->4595 4596 402e38 4594->4596 4597 402e1a RegDeleteKeyA 4594->4597 4595->4593 4596->4586 4597->4586 5864 4027cf 5865 402c5e 21 API calls 5864->5865 5866 4027d6 FindFirstFileA 5865->5866 5867 4027f9 5866->5867 5871 4027e9 5866->5871 5872 4061eb wsprintfA 5867->5872 5869 402800 5873 40628d lstrcpynA 5869->5873 5872->5869 5873->5871 5385 401c53 5386 402c3c 21 API calls 5385->5386 5387 401c5a 5386->5387 5388 402c3c 21 API calls 5387->5388 5389 401c67 5388->5389 5390 401c7c 5389->5390 5391 402c5e 21 API calls 5389->5391 5392 401c8c 5390->5392 5395 402c5e 21 API calls 5390->5395 5391->5390 5393 401ce3 5392->5393 5394 401c97 5392->5394 5397 402c5e 21 API calls 5393->5397 5396 402c3c 21 API calls 5394->5396 5395->5392 5398 401c9c 5396->5398 5399 401ce8 5397->5399 5400 402c3c 21 API calls 5398->5400 5401 402c5e 21 API calls 5399->5401 5402 401ca8 5400->5402 5403 401cf1 FindWindowExA 5401->5403 5404 401cd3 SendMessageA 5402->5404 5405 401cb5 SendMessageTimeoutA 5402->5405 5406 401d0f 5403->5406 5404->5406 5405->5406 5715 402653 5716 402658 5715->5716 5717 40266c 5715->5717 5718 402c3c 21 API calls 5716->5718 5719 402c5e 21 API calls 5717->5719 5721 402661 5718->5721 5720 402673 lstrlenA 5719->5720 5720->5721 5722 405ec7 WriteFile 5721->5722 5723 402695 5721->5723 5722->5723 5724 403a54 5725 403a5f 5724->5725 5726 403a63 5725->5726 5727 403a66 GlobalAlloc 5725->5727 5727->5726 4740 4014d6 4745 402c3c 4740->4745 4742 4014dc Sleep 4744 402aea 4742->4744 4746 406320 21 API calls 4745->4746 4747 402c51 4746->4747 4747->4742 4748 401957 4749 401959 4748->4749 4750 402c5e 21 API calls 4749->4750 4751 40195e 4750->4751 4754 405a4f 4751->4754 4794 405d0d 4754->4794 4757 405a77 DeleteFileA 4761 401967 4757->4761 4758 405a8e 4762 405bc6 4758->4762 4808 40628d lstrcpynA 4758->4808 4760 405ab4 4763 405ac7 4760->4763 4764 405aba lstrcatA 4760->4764 4762->4761 4765 406620 2 API calls 4762->4765 4809 405c66 lstrlenA 4763->4809 4766 405acd 4764->4766 4768 405be0 4765->4768 4769 405adb lstrcatA 4766->4769 4771 405ae6 lstrlenA FindFirstFileA 4766->4771 4768->4761 4770 405be4 4768->4770 4769->4771 4822 405c1f lstrlenA CharPrevA 4770->4822 4773 405bbc 4771->4773 4792 405b0a 4771->4792 4773->4762 4774 405c4a CharNextA 4774->4792 4776 405a07 5 API calls 4777 405bf6 4776->4777 4778 405c10 4777->4778 4779 405bfa 4777->4779 4780 4053d1 28 API calls 4778->4780 4779->4761 4784 4053d1 28 API calls 4779->4784 4780->4761 4781 405b9b FindNextFileA 4783 405bb3 FindClose 4781->4783 4781->4792 4783->4773 4785 405c07 4784->4785 4787 406066 40 API calls 4785->4787 4789 405c0e 4787->4789 4788 405a4f 64 API calls 4788->4792 4789->4761 4790 4053d1 28 API calls 4790->4781 4791 4053d1 28 API calls 4791->4792 4792->4774 4792->4781 4792->4788 4792->4790 4792->4791 4793 406066 40 API calls 4792->4793 4813 40628d lstrcpynA 4792->4813 4814 405a07 4792->4814 4793->4792 4825 40628d lstrcpynA 4794->4825 4796 405d1e 4826 405cb8 CharNextA CharNextA 4796->4826 4798 405a6f 4798->4757 4798->4758 4800 406587 5 API calls 4806 405d34 4800->4806 4801 405d5f lstrlenA 4802 405d6a 4801->4802 4801->4806 4803 405c1f 3 API calls 4802->4803 4805 405d6f GetFileAttributesA 4803->4805 4804 406620 2 API calls 4804->4806 4805->4798 4806->4798 4806->4801 4806->4804 4807 405c66 2 API calls 4806->4807 4807->4801 4808->4760 4810 405c73 4809->4810 4811 405c84 4810->4811 4812 405c78 CharPrevA 4810->4812 4811->4766 4812->4810 4812->4811 4813->4792 4832 405dfb GetFileAttributesA 4814->4832 4817 405a34 4817->4792 4818 405a22 RemoveDirectoryA 4820 405a30 4818->4820 4819 405a2a DeleteFileA 4819->4820 4820->4817 4821 405a40 SetFileAttributesA 4820->4821 4821->4817 4823 405bea 4822->4823 4824 405c39 lstrcatA 4822->4824 4823->4776 4824->4823 4825->4796 4827 405ce3 4826->4827 4828 405cd3 4826->4828 4830 405c4a CharNextA 4827->4830 4831 405d03 4827->4831 4828->4827 4829 405cde CharNextA 4828->4829 4829->4831 4830->4827 4831->4798 4831->4800 4833 405a13 4832->4833 4834 405e0d SetFileAttributesA 4832->4834 4833->4817 4833->4818 4833->4819 4834->4833 4835 402758 4836 402a6c 4835->4836 4837 40275f 4835->4837 4838 402c3c 21 API calls 4837->4838 4839 402766 4838->4839 4840 402775 SetFilePointer 4839->4840 4840->4836 4841 402785 4840->4841 4843 4061eb wsprintfA 4841->4843 4843->4836 4859 4033d8 SetErrorMode GetVersionExA 4860 40342a GetVersionExA 4859->4860 4862 403469 4859->4862 4861 403446 4860->4861 4860->4862 4861->4862 4863 4034ed 4862->4863 4864 4066b5 5 API calls 4862->4864 4865 406647 3 API calls 4863->4865 4864->4863 4866 403503 lstrlenA 4865->4866 4866->4863 4867 403513 4866->4867 4868 4066b5 5 API calls 4867->4868 4869 40351a 4868->4869 4870 4066b5 5 API calls 4869->4870 4871 403521 4870->4871 4872 4066b5 5 API calls 4871->4872 4873 40352d #17 OleInitialize SHGetFileInfoA 4872->4873 4948 40628d lstrcpynA 4873->4948 4876 40357b GetCommandLineA 4949 40628d lstrcpynA 4876->4949 4878 40358d 4879 405c4a CharNextA 4878->4879 4880 4035b4 CharNextA 4879->4880 4886 4035c3 4880->4886 4881 403689 4882 40369d GetTempPathA 4881->4882 4950 4033a7 4882->4950 4884 4036b5 4887 4036b9 GetWindowsDirectoryA lstrcatA 4884->4887 4888 40370f DeleteFileA 4884->4888 4885 405c4a CharNextA 4885->4886 4886->4881 4886->4885 4892 40368b 4886->4892 4890 4033a7 12 API calls 4887->4890 4960 402f31 GetTickCount GetModuleFileNameA 4888->4960 4891 4036d5 4890->4891 4891->4888 4896 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4891->4896 5044 40628d lstrcpynA 4892->5044 4893 4037b7 5047 4039bc 4893->5047 4894 403722 4894->4893 4897 4037a7 4894->4897 4901 405c4a CharNextA 4894->4901 4899 4033a7 12 API calls 4896->4899 4988 403a96 4897->4988 4903 403707 4899->4903 4904 40373c 4901->4904 4903->4888 4903->4893 4913 403781 4904->4913 4914 4037e6 4904->4914 4905 4037d1 5054 4059a3 4905->5054 4906 403928 4907 403930 GetCurrentProcess OpenProcessToken 4906->4907 4908 4039a6 ExitProcess 4906->4908 4911 403976 4907->4911 4912 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4907->4912 4916 4066b5 5 API calls 4911->4916 4912->4911 4917 405d0d 18 API calls 4913->4917 5058 40590e 4914->5058 4919 40397d 4916->4919 4920 40378d 4917->4920 4922 403992 ExitWindowsEx 4919->4922 4925 40399f 4919->4925 4920->4893 5045 40628d lstrcpynA 4920->5045 4922->4908 4922->4925 4924 403803 4929 40381b 4924->4929 5062 40628d lstrcpynA 4924->5062 5072 40140b 4925->5072 4928 40379c 5046 40628d lstrcpynA 4928->5046 4932 403839 wsprintfA 4929->4932 4945 403867 4929->4945 4933 406320 21 API calls 4932->4933 4933->4929 4936 403877 GetFileAttributesA 4939 403883 DeleteFileA 4936->4939 4936->4945 4937 4038af SetCurrentDirectoryA 4938 406066 40 API calls 4937->4938 4940 4038be CopyFileA 4938->4940 4939->4945 4940->4893 4940->4945 4941 405a4f 71 API calls 4941->4945 4942 406066 40 API calls 4942->4945 4943 406320 21 API calls 4943->4945 4945->4893 4945->4929 4945->4932 4945->4936 4945->4937 4945->4941 4945->4942 4945->4943 4946 403918 CloseHandle 4945->4946 4947 406620 2 API calls 4945->4947 5063 405897 CreateDirectoryA 4945->5063 5066 4058f1 CreateDirectoryA 4945->5066 5069 405926 CreateProcessA 4945->5069 4946->4893 4947->4945 4948->4876 4949->4878 4951 406587 5 API calls 4950->4951 4953 4033b3 4951->4953 4952 4033bd 4952->4884 4953->4952 4954 405c1f 3 API calls 4953->4954 4955 4033c5 4954->4955 4956 4058f1 2 API calls 4955->4956 4957 4033cb 4956->4957 5075 405e4f 4957->5075 5079 405e20 GetFileAttributesA CreateFileA 4960->5079 4962 402f71 4981 402f81 4962->4981 5080 40628d lstrcpynA 4962->5080 4964 402f97 4965 405c66 2 API calls 4964->4965 4966 402f9d 4965->4966 5081 40628d lstrcpynA 4966->5081 4968 402fa8 GetFileSize 4969 4030a2 4968->4969 4987 402fbf 4968->4987 5082 402ecd 4969->5082 4971 4030ab 4973 4030db GlobalAlloc 4971->4973 4971->4981 5117 403390 SetFilePointer 4971->5117 5093 403390 SetFilePointer 4973->5093 4975 40310e 4977 402ecd 6 API calls 4975->4977 4977->4981 4978 4030c4 4982 40337a ReadFile 4978->4982 4979 4030f6 5094 403168 4979->5094 4981->4894 4983 4030cf 4982->4983 4983->4973 4983->4981 4984 402ecd 6 API calls 4984->4987 4985 403102 4985->4981 4985->4985 4986 40313f SetFilePointer 4985->4986 4986->4981 4987->4969 4987->4975 4987->4981 4987->4984 5114 40337a 4987->5114 4989 4066b5 5 API calls 4988->4989 4990 403aaa 4989->4990 4991 403ab0 4990->4991 4992 403ac2 4990->4992 5131 4061eb wsprintfA 4991->5131 4993 406174 3 API calls 4992->4993 4994 403aed 4993->4994 4996 403b0b lstrcatA 4994->4996 4998 406174 3 API calls 4994->4998 4997 403ac0 4996->4997 5123 403d5b 4997->5123 4998->4996 5001 405d0d 18 API calls 5002 403b3d 5001->5002 5003 403bc6 5002->5003 5005 406174 3 API calls 5002->5005 5004 405d0d 18 API calls 5003->5004 5006 403bcc 5004->5006 5013 403b69 5005->5013 5007 403bdc LoadImageA 5006->5007 5008 406320 21 API calls 5006->5008 5009 403c82 5007->5009 5010 403c03 RegisterClassA 5007->5010 5008->5007 5011 40140b 2 API calls 5009->5011 5014 403c39 SystemParametersInfoA CreateWindowExA 5010->5014 5043 403c8c 5010->5043 5015 403c88 5011->5015 5012 403b85 lstrlenA 5017 403b93 lstrcmpiA 5012->5017 5018 403bb9 5012->5018 5013->5003 5013->5012 5016 405c4a CharNextA 5013->5016 5014->5009 5023 403d5b 22 API calls 5015->5023 5015->5043 5021 403b83 5016->5021 5017->5018 5019 403ba3 GetFileAttributesA 5017->5019 5020 405c1f 3 API calls 5018->5020 5022 403baf 5019->5022 5024 403bbf 5020->5024 5021->5012 5022->5018 5025 405c66 2 API calls 5022->5025 5026 403c99 5023->5026 5132 40628d lstrcpynA 5024->5132 5025->5018 5028 403ca5 ShowWindow 5026->5028 5029 403d28 5026->5029 5031 406647 3 API calls 5028->5031 5030 4054a3 5 API calls 5029->5030 5032 403d2e 5030->5032 5033 403cbd 5031->5033 5034 403d32 5032->5034 5035 403d4a 5032->5035 5036 403ccb GetClassInfoA 5033->5036 5038 406647 3 API calls 5033->5038 5041 40140b 2 API calls 5034->5041 5034->5043 5037 40140b 2 API calls 5035->5037 5039 403cf5 DialogBoxParamA 5036->5039 5040 403cdf GetClassInfoA RegisterClassA 5036->5040 5037->5043 5038->5036 5042 40140b 2 API calls 5039->5042 5040->5039 5041->5043 5042->5043 5043->4893 5044->4882 5045->4928 5046->4897 5048 4039d4 5047->5048 5049 4039c6 CloseHandle 5047->5049 5137 403a01 5048->5137 5049->5048 5052 405a4f 71 API calls 5053 4037bf OleUninitialize 5052->5053 5053->4905 5053->4906 5055 4059b8 5054->5055 5056 4037de ExitProcess 5055->5056 5057 4059cc MessageBoxIndirectA 5055->5057 5057->5056 5059 4066b5 5 API calls 5058->5059 5060 4037eb lstrlenA 5059->5060 5061 40628d lstrcpynA 5060->5061 5061->4924 5062->4929 5064 4058e3 5063->5064 5065 4058e7 GetLastError 5063->5065 5064->4945 5065->5064 5067 405901 5066->5067 5068 405905 GetLastError 5066->5068 5067->4945 5068->5067 5070 405965 5069->5070 5071 405959 CloseHandle 5069->5071 5070->4945 5071->5070 5073 401389 2 API calls 5072->5073 5074 401420 5073->5074 5074->4908 5076 405e5a GetTickCount GetTempFileNameA 5075->5076 5077 4033d6 5076->5077 5078 405e87 5076->5078 5077->4884 5078->5076 5078->5077 5079->4962 5080->4964 5081->4968 5083 402ed6 5082->5083 5084 402eee 5082->5084 5085 402ee6 5083->5085 5086 402edf DestroyWindow 5083->5086 5087 402ef6 5084->5087 5088 402efe GetTickCount 5084->5088 5085->4971 5086->5085 5118 4066f1 5087->5118 5090 402f0c CreateDialogParamA ShowWindow 5088->5090 5091 402f2f 5088->5091 5090->5091 5091->4971 5093->4979 5095 40317e 5094->5095 5096 4031ac 5095->5096 5122 403390 SetFilePointer 5095->5122 5097 40337a ReadFile 5096->5097 5099 4031b7 5097->5099 5100 403313 5099->5100 5101 4031c9 GetTickCount 5099->5101 5107 4032fd 5099->5107 5102 403355 5100->5102 5103 403317 5100->5103 5104 403218 5101->5104 5101->5107 5105 40337a ReadFile 5102->5105 5103->5107 5108 40337a ReadFile 5103->5108 5109 405ec7 WriteFile 5103->5109 5106 40337a ReadFile 5104->5106 5104->5107 5110 40326e GetTickCount 5104->5110 5111 403293 MulDiv wsprintfA 5104->5111 5113 405ec7 WriteFile 5104->5113 5105->5107 5106->5104 5107->4985 5108->5103 5109->5103 5110->5104 5112 4053d1 28 API calls 5111->5112 5112->5104 5113->5104 5115 405e98 ReadFile 5114->5115 5116 40338d 5115->5116 5116->4987 5117->4978 5119 40670e PeekMessageA 5118->5119 5120 406704 DispatchMessageA 5119->5120 5121 402efc 5119->5121 5120->5119 5121->4971 5122->5096 5124 403d6f 5123->5124 5133 4061eb wsprintfA 5124->5133 5126 403de0 5134 403e14 5126->5134 5128 403b1b 5128->5001 5129 403de5 5129->5128 5130 406320 21 API calls 5129->5130 5130->5129 5131->4997 5132->5003 5133->5126 5135 406320 21 API calls 5134->5135 5136 403e22 SetWindowTextA 5135->5136 5136->5129 5138 403a0f 5137->5138 5139 4039d9 5138->5139 5140 403a14 FreeLibrary GlobalFree 5138->5140 5139->5052 5140->5139 5140->5140 5728 401e5a GetDC 5729 402c3c 21 API calls 5728->5729 5730 401e6c GetDeviceCaps MulDiv ReleaseDC 5729->5730 5731 402c3c 21 API calls 5730->5731 5732 401e9d 5731->5732 5733 406320 21 API calls 5732->5733 5734 401eda CreateFontIndirectA 5733->5734 5735 40264d 5734->5735 5151 4015e0 5152 402c5e 21 API calls 5151->5152 5153 4015e7 5152->5153 5154 405cb8 4 API calls 5153->5154 5155 4015ef 5154->5155 5156 401649 5155->5156 5157 405c4a CharNextA 5155->5157 5164 4058f1 2 API calls 5155->5164 5165 40590e 5 API calls 5155->5165 5167 401631 GetFileAttributesA 5155->5167 5169 405897 2 API calls 5155->5169 5158 40164e 5156->5158 5160 401677 5156->5160 5157->5155 5159 401423 28 API calls 5158->5159 5161 401655 5159->5161 5162 401423 28 API calls 5160->5162 5170 40628d lstrcpynA 5161->5170 5168 40166f 5162->5168 5164->5155 5165->5155 5166 401660 SetCurrentDirectoryA 5166->5168 5167->5155 5169->5155 5170->5166 5786 4016e0 5787 402c5e 21 API calls 5786->5787 5788 4016e6 GetFullPathNameA 5787->5788 5789 4016fd 5788->5789 5795 40171e 5788->5795 5791 406620 2 API calls 5789->5791 5789->5795 5790 401732 GetShortPathNameA 5792 402aea 5790->5792 5793 40170e 5791->5793 5793->5795 5796 40628d lstrcpynA 5793->5796 5795->5790 5795->5792 5796->5795 5407 404463 lstrcpynA lstrlenA 5797 402ae3 InvalidateRect 5798 402aea 5797->5798 5217 405969 ShellExecuteExA 5218 401eea 5219 402c3c 21 API calls 5218->5219 5220 401ef0 5219->5220 5221 402c3c 21 API calls 5220->5221 5222 401efc 5221->5222 5223 401f13 EnableWindow 5222->5223 5224 401f08 ShowWindow 5222->5224 5225 402aea 5223->5225 5224->5225 5226 40176b 5227 402c5e 21 API calls 5226->5227 5228 401772 5227->5228 5229 405e4f 2 API calls 5228->5229 5230 401779 5229->5230 5231 405e4f 2 API calls 5230->5231 5231->5230 5512 40196c 5513 402c5e 21 API calls 5512->5513 5514 401973 lstrlenA 5513->5514 5515 40264d 5514->5515 5515->5515 5874 401ff0 5875 402c5e 21 API calls 5874->5875 5876 401ff7 5875->5876 5877 406620 2 API calls 5876->5877 5878 401ffd 5877->5878 5880 40200f 5878->5880 5881 4061eb wsprintfA 5878->5881 5881->5880 5439 4014f4 SetForegroundWindow 5440 402aea 5439->5440 5516 6d381000 5517 6d38101b 5 API calls 5516->5517 5518 6d381019 5517->5518 5821 404778 5822 404788 5821->5822 5823 4047ae 5821->5823 5824 40432d 22 API calls 5822->5824 5825 404394 8 API calls 5823->5825 5826 404795 SetDlgItemTextA 5824->5826 5827 4047ba 5825->5827 5826->5823 5343 40177e 5344 402c5e 21 API calls 5343->5344 5345 401785 5344->5345 5346 4017a3 5345->5346 5347 4017ab 5345->5347 5383 40628d lstrcpynA 5346->5383 5384 40628d lstrcpynA 5347->5384 5350 4017a9 5354 406587 5 API calls 5350->5354 5351 4017b6 5352 405c1f 3 API calls 5351->5352 5353 4017bc lstrcatA 5352->5353 5353->5350 5368 4017c8 5354->5368 5355 401809 5357 405dfb 2 API calls 5355->5357 5356 406620 2 API calls 5356->5368 5357->5368 5359 4017df CompareFileTime 5359->5368 5360 4018a3 5361 4053d1 28 API calls 5360->5361 5364 4018ad 5361->5364 5362 4053d1 28 API calls 5372 40188f 5362->5372 5363 40628d lstrcpynA 5363->5368 5365 403168 35 API calls 5364->5365 5366 4018c0 5365->5366 5367 4018d4 SetFileTime 5366->5367 5369 4018e6 FindCloseChangeNotification 5366->5369 5367->5369 5368->5355 5368->5356 5368->5359 5368->5360 5368->5363 5370 406320 21 API calls 5368->5370 5377 4059a3 MessageBoxIndirectA 5368->5377 5380 40187a 5368->5380 5382 405e20 GetFileAttributesA CreateFileA 5368->5382 5371 4018f7 5369->5371 5369->5372 5370->5368 5373 4018fc 5371->5373 5374 40190f 5371->5374 5375 406320 21 API calls 5373->5375 5376 406320 21 API calls 5374->5376 5378 401904 lstrcatA 5375->5378 5379 401917 5376->5379 5377->5368 5378->5379 5379->5372 5381 4059a3 MessageBoxIndirectA 5379->5381 5380->5362 5380->5372 5381->5372 5382->5368 5383->5350 5384->5351 5519 40197e 5520 402c3c 21 API calls 5519->5520 5521 401985 5520->5521 5522 402c3c 21 API calls 5521->5522 5523 401992 5522->5523 5524 402c5e 21 API calls 5523->5524 5525 4019a9 lstrlenA 5524->5525 5527 4019b9 5525->5527 5526 4019f9 5527->5526 5531 40628d lstrcpynA 5527->5531 5529 4019e9 5529->5526 5530 4019ee lstrlenA 5529->5530 5530->5526 5531->5529 5736 40167e 5737 402c5e 21 API calls 5736->5737 5738 401684 5737->5738 5739 406620 2 API calls 5738->5739 5740 40168a 5739->5740 5408 401000 5409 401037 BeginPaint GetClientRect 5408->5409 5410 40100c DefWindowProcA 5408->5410 5412 4010f3 5409->5412 5413 401179 5410->5413 5414 401073 CreateBrushIndirect FillRect DeleteObject 5412->5414 5415 4010fc 5412->5415 5414->5412 5416 401102 CreateFontIndirectA 5415->5416 5417 401167 EndPaint 5415->5417 5416->5417 5418 401112 6 API calls 5416->5418 5417->5413 5418->5417 5532 401502 5533 40152d 5532->5533 5534 401507 5532->5534 5535 402c3c 21 API calls 5534->5535 5535->5533 5799 401a83 5800 402c3c 21 API calls 5799->5800 5801 401a8c 5800->5801 5802 402c3c 21 API calls 5801->5802 5803 401a33 5802->5803 5650 401588 5651 402a67 5650->5651 5654 4061eb wsprintfA 5651->5654 5653 402a6c 5654->5653 5882 401b88 5883 402c5e 21 API calls 5882->5883 5884 401b8f 5883->5884 5885 402c3c 21 API calls 5884->5885 5886 401b98 wsprintfA 5885->5886 5887 402aea 5886->5887 5655 401d8a 5656 401d90 5655->5656 5657 401d9d GetDlgItem 5655->5657 5659 402c3c 21 API calls 5656->5659 5658 401d97 5657->5658 5660 402c5e 21 API calls 5658->5660 5662 401dde GetClientRect LoadImageA SendMessageA 5658->5662 5659->5658 5660->5662 5663 401e3f 5662->5663 5665 401e4b 5662->5665 5664 401e44 DeleteObject 5663->5664 5663->5665 5664->5665 5536 6d382c73 5537 6d382c8b 5536->5537 5538 6d3815c4 2 API calls 5537->5538 5539 6d382ca6 5538->5539 5888 40278b 5889 402791 5888->5889 5890 402799 FindClose 5889->5890 5891 402aea 5889->5891 5890->5891 4560 40240d 4561 402c5e 21 API calls 4560->4561 4562 40241e 4561->4562 4563 402c5e 21 API calls 4562->4563 4564 402427 4563->4564 4565 402c5e 21 API calls 4564->4565 4566 402431 GetPrivateProfileStringA 4565->4566 4598 40550f 4599 405531 GetDlgItem GetDlgItem GetDlgItem 4598->4599 4600 4056ba 4598->4600 4644 404362 SendMessageA 4599->4644 4602 4056c2 GetDlgItem CreateThread FindCloseChangeNotification 4600->4602 4603 4056ea 4600->4603 4602->4603 4667 4054a3 OleInitialize 4602->4667 4605 405718 4603->4605 4606 405700 ShowWindow ShowWindow 4603->4606 4607 405739 4603->4607 4604 4055a1 4613 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4604->4613 4608 405720 4605->4608 4609 405773 4605->4609 4649 404362 SendMessageA 4606->4649 4653 404394 4607->4653 4610 405728 4608->4610 4611 40574c ShowWindow 4608->4611 4609->4607 4621 405780 SendMessageA 4609->4621 4650 404306 4610->4650 4617 40576c 4611->4617 4618 40575e 4611->4618 4619 405616 4613->4619 4620 4055fa SendMessageA SendMessageA 4613->4620 4616 405745 4623 404306 SendMessageA 4617->4623 4622 4053d1 28 API calls 4618->4622 4624 405629 4619->4624 4625 40561b SendMessageA 4619->4625 4620->4619 4621->4616 4626 405799 CreatePopupMenu 4621->4626 4622->4617 4623->4609 4645 40432d 4624->4645 4625->4624 4627 406320 21 API calls 4626->4627 4630 4057a9 AppendMenuA 4627->4630 4629 405639 4633 405642 ShowWindow 4629->4633 4634 405676 GetDlgItem SendMessageA 4629->4634 4631 4057c7 GetWindowRect 4630->4631 4632 4057da TrackPopupMenu 4630->4632 4631->4632 4632->4616 4635 4057f6 4632->4635 4636 405665 4633->4636 4637 405658 ShowWindow 4633->4637 4634->4616 4638 40569d SendMessageA SendMessageA 4634->4638 4639 405815 SendMessageA 4635->4639 4648 404362 SendMessageA 4636->4648 4637->4636 4638->4616 4639->4639 4640 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4639->4640 4642 405854 SendMessageA 4640->4642 4642->4642 4643 405876 GlobalUnlock SetClipboardData CloseClipboard 4642->4643 4643->4616 4644->4604 4646 406320 21 API calls 4645->4646 4647 404338 SetDlgItemTextA 4646->4647 4647->4629 4648->4634 4649->4605 4651 404313 SendMessageA 4650->4651 4652 40430d 4650->4652 4651->4607 4652->4651 4654 404457 4653->4654 4655 4043ac GetWindowLongA 4653->4655 4654->4616 4655->4654 4656 4043c1 4655->4656 4656->4654 4657 4043f1 4656->4657 4658 4043ee GetSysColor 4656->4658 4659 404401 SetBkMode 4657->4659 4660 4043f7 SetTextColor 4657->4660 4658->4657 4661 404419 GetSysColor 4659->4661 4662 40441f 4659->4662 4660->4659 4661->4662 4663 404430 4662->4663 4664 404426 SetBkColor 4662->4664 4663->4654 4665 404443 DeleteObject 4663->4665 4666 40444a CreateBrushIndirect 4663->4666 4664->4663 4665->4666 4666->4654 4674 404379 4667->4674 4669 4054ed 4670 404379 SendMessageA 4669->4670 4671 4054ff OleUninitialize 4670->4671 4672 4054c6 4672->4669 4677 401389 4672->4677 4675 404391 4674->4675 4676 404382 SendMessageA 4674->4676 4675->4672 4676->4675 4679 401390 4677->4679 4678 4013fe 4678->4672 4679->4678 4680 4013cb MulDiv SendMessageA 4679->4680 4680->4679 4681 40168f 4682 402c5e 21 API calls 4681->4682 4683 401696 4682->4683 4684 402c5e 21 API calls 4683->4684 4685 40169f 4684->4685 4686 402c5e 21 API calls 4685->4686 4687 4016a8 MoveFileA 4686->4687 4688 4016b4 4687->4688 4689 4016bb 4687->4689 4690 401423 28 API calls 4688->4690 4693 40230f 4689->4693 4695 406620 FindFirstFileA 4689->4695 4690->4693 4696 4016ca 4695->4696 4697 406636 FindClose 4695->4697 4696->4693 4698 406066 MoveFileExA 4696->4698 4697->4696 4699 40607a 4698->4699 4701 406087 4698->4701 4702 405ef6 4699->4702 4701->4688 4703 405f42 GetShortPathNameA 4702->4703 4704 405f1c 4702->4704 4706 406061 4703->4706 4707 405f57 4703->4707 4729 405e20 GetFileAttributesA CreateFileA 4704->4729 4706->4701 4707->4706 4709 405f5f wsprintfA 4707->4709 4708 405f26 CloseHandle GetShortPathNameA 4708->4706 4710 405f3a 4708->4710 4711 406320 21 API calls 4709->4711 4710->4703 4710->4706 4712 405f87 4711->4712 4730 405e20 GetFileAttributesA CreateFileA 4712->4730 4714 405f94 4714->4706 4715 405fa3 GetFileSize GlobalAlloc 4714->4715 4716 405fc5 4715->4716 4717 40605a CloseHandle 4715->4717 4731 405e98 ReadFile 4716->4731 4717->4706 4722 405fe4 lstrcpyA 4724 406006 4722->4724 4723 405ff8 4725 405d85 4 API calls 4723->4725 4726 40603d SetFilePointer 4724->4726 4725->4724 4738 405ec7 WriteFile 4726->4738 4729->4708 4730->4714 4732 405eb6 4731->4732 4732->4717 4733 405d85 lstrlenA 4732->4733 4734 405dc6 lstrlenA 4733->4734 4735 405d9f lstrcmpiA 4734->4735 4737 405dce 4734->4737 4736 405dbd CharNextA 4735->4736 4735->4737 4736->4734 4737->4722 4737->4723 4739 405ee5 GlobalFree 4738->4739 4739->4717 5441 401490 5442 4053d1 28 API calls 5441->5442 5443 401497 5442->5443 5828 404b10 5829 404b20 5828->5829 5830 404b3c 5828->5830 5839 405987 GetDlgItemTextA 5829->5839 5832 404b42 SHGetPathFromIDListA 5830->5832 5833 404b6f 5830->5833 5835 404b59 SendMessageA 5832->5835 5836 404b52 5832->5836 5834 404b2d SendMessageA 5834->5830 5835->5833 5837 40140b 2 API calls 5836->5837 5837->5835 5839->5834 5741 401a12 5742 402c5e 21 API calls 5741->5742 5743 401a19 5742->5743 5744 402c5e 21 API calls 5743->5744 5745 401a22 5744->5745 5746 401a29 lstrcmpiA 5745->5746 5747 401a3b lstrcmpA 5745->5747 5748 401a2f 5746->5748 5747->5748 5892 6d3822ea 5893 6d382354 5892->5893 5894 6d38235f GlobalAlloc 5893->5894 5895 6d38237e 5893->5895 5894->5893 5666 401594 5667 4015a4 ShowWindow 5666->5667 5668 4015ab 5666->5668 5667->5668 5669 4015b9 ShowWindow 5668->5669 5670 402aea 5668->5670 5669->5670 4844 402318 4845 402c5e 21 API calls 4844->4845 4846 40231e 4845->4846 4847 402c5e 21 API calls 4846->4847 4848 402327 4847->4848 4849 402c5e 21 API calls 4848->4849 4850 402330 4849->4850 4851 406620 2 API calls 4850->4851 4852 402339 4851->4852 4853 40234a lstrlenA lstrlenA 4852->4853 4857 40233d 4852->4857 4855 4053d1 28 API calls 4853->4855 4854 4053d1 28 API calls 4858 402345 4854->4858 4856 402386 SHFileOperationA 4855->4856 4856->4857 4856->4858 4857->4854 4857->4858 5444 404498 5445 4044ae 5444->5445 5452 4045ba 5444->5452 5447 40432d 22 API calls 5445->5447 5446 404629 5448 4046f3 5446->5448 5449 404633 GetDlgItem 5446->5449 5450 404504 5447->5450 5455 404394 8 API calls 5448->5455 5451 404649 5449->5451 5456 4046b1 5449->5456 5454 40432d 22 API calls 5450->5454 5451->5456 5460 40466f SendMessageA LoadCursorA SetCursor 5451->5460 5452->5446 5452->5448 5453 4045fe GetDlgItem SendMessageA 5452->5453 5477 40434f KiUserCallbackDispatcher 5453->5477 5458 404511 CheckDlgButton 5454->5458 5459 4046ee 5455->5459 5456->5448 5461 4046c3 5456->5461 5475 40434f KiUserCallbackDispatcher 5458->5475 5481 40473c 5460->5481 5465 4046c9 SendMessageA 5461->5465 5466 4046da 5461->5466 5462 404624 5478 404718 5462->5478 5465->5466 5466->5459 5467 4046e0 SendMessageA 5466->5467 5467->5459 5469 40452f GetDlgItem 5476 404362 SendMessageA 5469->5476 5472 404545 SendMessageA 5473 404563 GetSysColor 5472->5473 5474 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5472->5474 5473->5474 5474->5459 5475->5469 5476->5472 5477->5462 5479 404726 5478->5479 5480 40472b SendMessageA 5478->5480 5479->5480 5480->5446 5484 405969 ShellExecuteExA 5481->5484 5483 4046a2 LoadCursorA SetCursor 5483->5456 5484->5483 5671 402198 5672 402c5e 21 API calls 5671->5672 5673 40219f 5672->5673 5674 402c5e 21 API calls 5673->5674 5675 4021a9 5674->5675 5676 402c5e 21 API calls 5675->5676 5677 4021b3 5676->5677 5678 402c5e 21 API calls 5677->5678 5679 4021c0 5678->5679 5680 402c5e 21 API calls 5679->5680 5681 4021ca 5680->5681 5682 40220c CoCreateInstance 5681->5682 5683 402c5e 21 API calls 5681->5683 5684 4022d9 5682->5684 5687 40222b 5682->5687 5683->5682 5685 401423 28 API calls 5684->5685 5686 40230f 5684->5686 5685->5686 5687->5684 5688 4022b9 MultiByteToWideChar 5687->5688 5688->5684 5689 6d3810e0 5695 6d381110 5689->5695 5690 6d38129a GlobalFree 5691 6d3811cd GlobalAlloc 5691->5695 5692 6d38133d 2 API calls 5692->5695 5693 6d381295 5693->5690 5694 6d381286 GlobalFree 5694->5695 5695->5690 5695->5691 5695->5692 5695->5693 5695->5694 5696 6d3812f6 2 API calls 5695->5696 5697 6d381165 GlobalAlloc 5695->5697 5698 6d381361 lstrcpyA 5695->5698 5696->5695 5697->5695 5698->5695 5840 6d381661 5841 6d38154b GlobalFree 5840->5841 5843 6d381679 5841->5843 5842 6d3816bf GlobalFree 5843->5842 5844 6d381694 5843->5844 5845 6d3816ab VirtualFree 5843->5845 5844->5842 5845->5842 5141 40269a 5142 402c3c 21 API calls 5141->5142 5148 4026a4 5142->5148 5143 402712 5144 405e98 ReadFile 5144->5148 5145 402714 5150 4061eb wsprintfA 5145->5150 5147 402724 5147->5143 5149 40273a SetFilePointer 5147->5149 5148->5143 5148->5144 5148->5145 5148->5147 5149->5143 5150->5143 5896 40239a 5897 4023a1 5896->5897 5899 4023b4 5896->5899 5898 406320 21 API calls 5897->5898 5900 4023ae 5898->5900 5900->5899 5901 4059a3 MessageBoxIndirectA 5900->5901 5901->5899 5749 402a1b 5750 402a6e 5749->5750 5751 402a22 5749->5751 5753 4066b5 5 API calls 5750->5753 5752 402a6c 5751->5752 5754 402c3c 21 API calls 5751->5754 5755 402a75 5753->5755 5756 402a30 5754->5756 5757 402c5e 21 API calls 5755->5757 5758 402c3c 21 API calls 5756->5758 5759 402a7e 5757->5759 5761 402a3f 5758->5761 5759->5752 5767 4062e0 5759->5767 5766 4061eb wsprintfA 5761->5766 5762 402a8c 5762->5752 5771 4062ca 5762->5771 5766->5752 5768 4062eb 5767->5768 5769 40630e IIDFromString 5768->5769 5770 406307 5768->5770 5769->5762 5770->5762 5774 4062af WideCharToMultiByte 5771->5774 5773 402aad CoTaskMemFree 5773->5752 5774->5773 5485 40149d 5486 4023b4 5485->5486 5487 4014ab PostQuitMessage 5485->5487 5487->5486 5846 401f1e 5847 402c5e 21 API calls 5846->5847 5848 401f24 5847->5848 5849 402c5e 21 API calls 5848->5849 5850 401f2d 5849->5850 5851 402c5e 21 API calls 5850->5851 5852 401f36 5851->5852 5853 402c5e 21 API calls 5852->5853 5854 401f3f 5853->5854 5855 401423 28 API calls 5854->5855 5856 401f46 5855->5856 5863 405969 ShellExecuteExA 5856->5863 5858 401f81 5859 40672a 5 API calls 5858->5859 5861 4027ed 5858->5861 5860 401f9b CloseHandle 5859->5860 5860->5861 5863->5858 5171 401fa0 5172 402c5e 21 API calls 5171->5172 5173 401fa6 5172->5173 5174 4053d1 28 API calls 5173->5174 5175 401fb0 5174->5175 5176 405926 2 API calls 5175->5176 5177 401fb6 5176->5177 5181 4027ed 5177->5181 5185 401fd7 CloseHandle 5177->5185 5186 40672a WaitForSingleObject 5177->5186 5180 401fcb 5182 401fd0 5180->5182 5183 401fd9 5180->5183 5191 4061eb wsprintfA 5182->5191 5183->5185 5185->5181 5187 406744 5186->5187 5188 406756 GetExitCodeProcess 5187->5188 5189 4066f1 2 API calls 5187->5189 5188->5180 5190 40674b WaitForSingleObject 5189->5190 5190->5187 5191->5185 5419 402020 5420 402c5e 21 API calls 5419->5420 5421 402027 5420->5421 5422 4066b5 5 API calls 5421->5422 5423 402036 5422->5423 5424 40204e GlobalAlloc 5423->5424 5426 4020be 5423->5426 5425 402062 5424->5425 5424->5426 5427 4066b5 5 API calls 5425->5427 5428 402069 5427->5428 5429 4066b5 5 API calls 5428->5429 5430 402073 5429->5430 5430->5426 5434 4061eb wsprintfA 5430->5434 5432 4020ae 5435 4061eb wsprintfA 5432->5435 5434->5432 5435->5426 5540 6d381058 5542 6d381074 5540->5542 5541 6d3810dc 5542->5541 5543 6d38154b GlobalFree 5542->5543 5544 6d381091 5542->5544 5543->5544 5545 6d38154b GlobalFree 5544->5545 5546 6d3810a1 5545->5546 5547 6d3810a8 GlobalSize 5546->5547 5548 6d3810b1 5546->5548 5547->5548 5549 6d3810b5 GlobalAlloc 5548->5549 5550 6d3810c6 5548->5550 5551 6d381572 3 API calls 5549->5551 5552 6d3810d1 GlobalFree 5550->5552 5551->5550 5552->5541 5553 401922 5554 401959 5553->5554 5555 402c5e 21 API calls 5554->5555 5556 40195e 5555->5556 5557 405a4f 71 API calls 5556->5557 5558 401967 5557->5558 5192 4024a3 5193 402c5e 21 API calls 5192->5193 5194 4024b5 5193->5194 5195 402c5e 21 API calls 5194->5195 5196 4024bf 5195->5196 5209 402cee 5196->5209 5199 402aea 5200 4024f4 5204 402c3c 21 API calls 5200->5204 5207 402500 5200->5207 5201 402c5e 21 API calls 5203 4024ed lstrlenA 5201->5203 5202 402522 RegSetValueExA 5206 402538 RegCloseKey 5202->5206 5203->5200 5204->5207 5205 403168 35 API calls 5205->5202 5206->5199 5207->5202 5207->5205 5210 402d09 5209->5210 5213 406141 5210->5213 5214 406150 5213->5214 5215 4024cf 5214->5215 5216 40615b RegCreateKeyExA 5214->5216 5215->5199 5215->5200 5215->5201 5216->5215 5559 401d23 5560 402c3c 21 API calls 5559->5560 5561 401d29 IsWindow 5560->5561 5562 401a33 5561->5562 5563 401925 5564 402c5e 21 API calls 5563->5564 5565 40192c 5564->5565 5566 4059a3 MessageBoxIndirectA 5565->5566 5567 401935 5566->5567 5902 4027a5 5903 4027ab 5902->5903 5904 4027af FindNextFileA 5903->5904 5907 4027c1 5903->5907 5905 402800 5904->5905 5904->5907 5908 40628d lstrcpynA 5905->5908 5908->5907 5232 401bac 5233 401bb9 5232->5233 5234 401bfd 5232->5234 5235 401c41 5233->5235 5240 401bd0 5233->5240 5236 401c01 5234->5236 5237 401c26 GlobalAlloc 5234->5237 5238 406320 21 API calls 5235->5238 5246 4023b4 5235->5246 5236->5246 5253 40628d lstrcpynA 5236->5253 5239 406320 21 API calls 5237->5239 5241 4023ae 5238->5241 5239->5235 5251 40628d lstrcpynA 5240->5251 5241->5246 5247 4059a3 MessageBoxIndirectA 5241->5247 5244 401c13 GlobalFree 5244->5246 5245 401bdf 5252 40628d lstrcpynA 5245->5252 5247->5246 5249 401bee 5254 40628d lstrcpynA 5249->5254 5251->5245 5252->5249 5253->5244 5254->5246 5699 4029af 5700 402c3c 21 API calls 5699->5700 5703 4029b5 5700->5703 5701 406320 21 API calls 5702 4027ed 5701->5702 5703->5701 5703->5702 5909 6d3816c8 5910 6d3816f7 5909->5910 5911 6d381b28 18 API calls 5910->5911 5912 6d3816fe 5911->5912 5913 6d381711 5912->5913 5914 6d381705 5912->5914 5916 6d381738 5913->5916 5917 6d38171b 5913->5917 5915 6d3812f6 2 API calls 5914->5915 5920 6d38170f 5915->5920 5918 6d38173e 5916->5918 5919 6d381762 5916->5919 5921 6d381572 3 API calls 5917->5921 5923 6d3815e9 3 API calls 5918->5923 5924 6d381572 3 API calls 5919->5924 5922 6d381720 5921->5922 5925 6d3815e9 3 API calls 5922->5925 5926 6d381743 5923->5926 5924->5920 5927 6d381726 5925->5927 5928 6d3812f6 2 API calls 5926->5928 5929 6d3812f6 2 API calls 5927->5929 5930 6d381749 GlobalFree 5928->5930 5931 6d38172c GlobalFree 5929->5931 5930->5920 5932 6d38175d GlobalFree 5930->5932 5931->5920 5932->5920 5775 402631 5776 402c5e 21 API calls 5775->5776 5777 402638 5776->5777 5780 405e20 GetFileAttributesA CreateFileA 5777->5780 5779 402644 5780->5779 5568 404d32 GetDlgItem GetDlgItem 5569 404d88 7 API calls 5568->5569 5578 404faf 5568->5578 5570 404e30 DeleteObject 5569->5570 5571 404e24 SendMessageA 5569->5571 5572 404e3b 5570->5572 5571->5570 5573 404e72 5572->5573 5577 406320 21 API calls 5572->5577 5575 40432d 22 API calls 5573->5575 5574 405091 5576 40513d 5574->5576 5586 4050ea SendMessageA 5574->5586 5608 404fa2 5574->5608 5580 404e86 5575->5580 5581 405147 SendMessageA 5576->5581 5582 40514f 5576->5582 5579 404e54 SendMessageA SendMessageA 5577->5579 5578->5574 5602 40501e 5578->5602 5622 404c80 SendMessageA 5578->5622 5579->5572 5585 40432d 22 API calls 5580->5585 5581->5582 5589 405161 ImageList_Destroy 5582->5589 5590 405168 5582->5590 5605 405178 5582->5605 5583 404394 8 API calls 5588 40533e 5583->5588 5603 404e97 5585->5603 5591 4050ff SendMessageA 5586->5591 5586->5608 5587 405083 SendMessageA 5587->5574 5589->5590 5592 405171 GlobalFree 5590->5592 5590->5605 5594 405112 5591->5594 5592->5605 5593 404f71 GetWindowLongA SetWindowLongA 5596 404f8a 5593->5596 5606 405123 SendMessageA 5594->5606 5595 4052f2 5597 405304 ShowWindow GetDlgItem ShowWindow 5595->5597 5595->5608 5598 404fa7 5596->5598 5599 404f8f ShowWindow 5596->5599 5597->5608 5621 404362 SendMessageA 5598->5621 5620 404362 SendMessageA 5599->5620 5602->5574 5602->5587 5603->5593 5604 404ee9 SendMessageA 5603->5604 5607 404f6c 5603->5607 5609 404f27 SendMessageA 5603->5609 5610 404f3b SendMessageA 5603->5610 5604->5603 5605->5595 5615 4051b3 5605->5615 5627 404d00 5605->5627 5606->5576 5607->5593 5607->5596 5608->5583 5609->5603 5610->5603 5612 4052bd 5613 4052c8 InvalidateRect 5612->5613 5616 4052d4 5612->5616 5613->5616 5614 4051e1 SendMessageA 5618 4051f7 5614->5618 5615->5614 5615->5618 5616->5595 5636 404c3b 5616->5636 5617 40526b SendMessageA SendMessageA 5617->5618 5618->5612 5618->5617 5620->5608 5621->5578 5623 404ca3 GetMessagePos ScreenToClient SendMessageA 5622->5623 5624 404cdf SendMessageA 5622->5624 5625 404cd7 5623->5625 5626 404cdc 5623->5626 5624->5625 5625->5602 5626->5624 5639 40628d lstrcpynA 5627->5639 5629 404d13 5640 4061eb wsprintfA 5629->5640 5631 404d1d 5632 40140b 2 API calls 5631->5632 5633 404d26 5632->5633 5641 40628d lstrcpynA 5633->5641 5635 404d2d 5635->5615 5642 404b76 5636->5642 5638 404c50 5638->5595 5639->5629 5640->5631 5641->5635 5643 404b8c 5642->5643 5644 406320 21 API calls 5643->5644 5645 404bf0 5644->5645 5646 406320 21 API calls 5645->5646 5647 404bfb 5646->5647 5648 406320 21 API calls 5647->5648 5649 404c11 lstrlenA wsprintfA SetDlgItemTextA 5648->5649 5649->5638 5255 403e33 5256 403e4b 5255->5256 5257 403fac 5255->5257 5256->5257 5260 403e57 5256->5260 5258 403ffd 5257->5258 5259 403fbd GetDlgItem GetDlgItem 5257->5259 5262 404057 5258->5262 5274 401389 2 API calls 5258->5274 5261 40432d 22 API calls 5259->5261 5263 403e62 SetWindowPos 5260->5263 5264 403e75 5260->5264 5267 403fe7 SetClassLongA 5261->5267 5268 404379 SendMessageA 5262->5268 5275 403fa7 5262->5275 5263->5264 5265 403ec0 5264->5265 5266 403e7e ShowWindow 5264->5266 5271 403ec8 DestroyWindow 5265->5271 5272 403edf 5265->5272 5269 403f99 5266->5269 5270 403e9e GetWindowLongA 5266->5270 5273 40140b 2 API calls 5267->5273 5296 404069 5268->5296 5280 404394 8 API calls 5269->5280 5270->5269 5276 403eb7 ShowWindow 5270->5276 5327 4042b6 5271->5327 5277 403ee4 SetWindowLongA 5272->5277 5278 403ef5 5272->5278 5273->5258 5279 40402f 5274->5279 5276->5265 5277->5275 5278->5269 5283 403f01 GetDlgItem 5278->5283 5279->5262 5284 404033 SendMessageA 5279->5284 5280->5275 5281 40140b 2 API calls 5281->5296 5282 4042b8 DestroyWindow EndDialog 5282->5327 5286 403f12 SendMessageA IsWindowEnabled 5283->5286 5287 403f2f 5283->5287 5284->5275 5285 4042e7 ShowWindow 5285->5275 5286->5275 5286->5287 5289 403f3c 5287->5289 5290 403f83 SendMessageA 5287->5290 5291 403f4f 5287->5291 5300 403f34 5287->5300 5288 406320 21 API calls 5288->5296 5289->5290 5289->5300 5290->5269 5293 403f57 5291->5293 5294 403f6c 5291->5294 5292 404306 SendMessageA 5295 403f6a 5292->5295 5297 40140b 2 API calls 5293->5297 5298 40140b 2 API calls 5294->5298 5295->5269 5296->5275 5296->5281 5296->5282 5296->5288 5299 40432d 22 API calls 5296->5299 5302 40432d 22 API calls 5296->5302 5318 4041f8 DestroyWindow 5296->5318 5297->5300 5301 403f73 5298->5301 5299->5296 5300->5292 5301->5269 5301->5300 5303 4040e4 GetDlgItem 5302->5303 5304 404101 ShowWindow KiUserCallbackDispatcher 5303->5304 5305 4040f9 5303->5305 5328 40434f KiUserCallbackDispatcher 5304->5328 5305->5304 5307 40412b EnableWindow 5312 40413f 5307->5312 5308 404144 GetSystemMenu EnableMenuItem SendMessageA 5309 404174 SendMessageA 5308->5309 5308->5312 5309->5312 5311 403e14 22 API calls 5311->5312 5312->5308 5312->5311 5329 404362 SendMessageA 5312->5329 5330 40628d lstrcpynA 5312->5330 5314 4041a3 lstrlenA 5315 406320 21 API calls 5314->5315 5316 4041b4 SetWindowTextA 5315->5316 5317 401389 2 API calls 5316->5317 5317->5296 5319 404212 CreateDialogParamA 5318->5319 5318->5327 5320 404245 5319->5320 5319->5327 5321 40432d 22 API calls 5320->5321 5322 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5321->5322 5323 401389 2 API calls 5322->5323 5324 404296 5323->5324 5324->5275 5325 40429e ShowWindow 5324->5325 5326 404379 SendMessageA 5325->5326 5326->5327 5327->5275 5327->5285 5328->5307 5329->5312 5330->5314 5331 4025b5 5332 402c9e 21 API calls 5331->5332 5333 4025bf 5332->5333 5334 402c3c 21 API calls 5333->5334 5335 4025c8 5334->5335 5336 4025d6 5335->5336 5337 4027ed 5335->5337 5338 4025e3 RegEnumKeyA 5336->5338 5339 4025ef RegEnumValueA 5336->5339 5340 40260b RegCloseKey 5338->5340 5339->5340 5341 402604 5339->5341 5340->5337 5341->5340 5488 4014b7 5489 4014bd 5488->5489 5490 401389 2 API calls 5489->5490 5491 4014c5 5490->5491 5704 6d3818c7 5706 6d3818ea 5704->5706 5705 6d38192c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5708 6d3812f6 2 API calls 5705->5708 5706->5705 5707 6d38191a GlobalFree 5706->5707 5707->5705 5709 6d381aae GlobalFree GlobalFree 5708->5709 5933 4047bf 5934 4047eb 5933->5934 5935 4047fc 5933->5935 5994 405987 GetDlgItemTextA 5934->5994 5937 404808 GetDlgItem 5935->5937 5942 404867 5935->5942 5940 40481c 5937->5940 5938 40494b 5992 404af5 5938->5992 5996 405987 GetDlgItemTextA 5938->5996 5939 4047f6 5941 406587 5 API calls 5939->5941 5944 404830 SetWindowTextA 5940->5944 5945 405cb8 4 API calls 5940->5945 5941->5935 5942->5938 5946 406320 21 API calls 5942->5946 5942->5992 5948 40432d 22 API calls 5944->5948 5950 404826 5945->5950 5951 4048db SHBrowseForFolderA 5946->5951 5947 40497b 5952 405d0d 18 API calls 5947->5952 5953 40484c 5948->5953 5949 404394 8 API calls 5954 404b09 5949->5954 5950->5944 5958 405c1f 3 API calls 5950->5958 5951->5938 5955 4048f3 CoTaskMemFree 5951->5955 5956 404981 5952->5956 5957 40432d 22 API calls 5953->5957 5959 405c1f 3 API calls 5955->5959 5997 40628d lstrcpynA 5956->5997 5960 40485a 5957->5960 5958->5944 5961 404900 5959->5961 5995 404362 SendMessageA 5960->5995 5964 404937 SetDlgItemTextA 5961->5964 5969 406320 21 API calls 5961->5969 5964->5938 5965 404860 5967 4066b5 5 API calls 5965->5967 5966 404998 5968 4066b5 5 API calls 5966->5968 5967->5942 5970 40499f 5968->5970 5971 40491f lstrcmpiA 5969->5971 5972 4049db 5970->5972 5979 405c66 2 API calls 5970->5979 5981 404a33 5970->5981 5971->5964 5974 404930 lstrcatA 5971->5974 5998 40628d lstrcpynA 5972->5998 5974->5964 5975 4049e2 5976 405cb8 4 API calls 5975->5976 5977 4049e8 GetDiskFreeSpaceA 5976->5977 5980 404a0c MulDiv 5977->5980 5977->5981 5979->5970 5980->5981 5982 404aa4 5981->5982 5984 404c3b 24 API calls 5981->5984 5983 404ac7 5982->5983 5985 40140b 2 API calls 5982->5985 5999 40434f KiUserCallbackDispatcher 5983->5999 5986 404a91 5984->5986 5985->5983 5988 404aa6 SetDlgItemTextA 5986->5988 5989 404a96 5986->5989 5988->5982 5991 404b76 24 API calls 5989->5991 5990 404ae3 5990->5992 5993 404718 SendMessageA 5990->5993 5991->5982 5992->5949 5993->5992 5994->5939 5995->5965 5996->5947 5997->5966 5998->5975 5999->5990

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 9 403490 5->9 10 40347f-40348e 5->10 7 4034a5-4034e5 6->7 8 40349d 6->8 11 4034e7-4034ef call 4066b5 7->11 12 4034f8 7->12 8->7 9->6 10->6 11->12 17 4034f1 11->17 14 4034fd-403511 call 406647 lstrlenA 12->14 19 403513-40352f call 4066b5 * 3 14->19 17->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 31 403539 27->31 31->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 41 4035c8-4035cc 39->41 42 4035ce-4035d5 39->42 43 40369d-4036b7 GetTempPathA call 4033a7 40->43 41->41 41->42 44 4035d7-4035d8 42->44 45 4035dc-4035df 42->45 53 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 43->53 54 40370f-403727 DeleteFileA call 402f31 43->54 44->45 47 403670-40367c call 405c4a 45->47 48 4035e5-4035e9 45->48 47->38 62 40367e 47->62 51 403601-40362e 48->51 52 4035eb-4035f1 48->52 59 403640-40366e 51->59 60 403630-403636 51->60 57 4035f3-4035f5 52->57 58 4035f7 52->58 53->54 71 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 53->71 68 4037ba-4037cb call 4039bc OleUninitialize 54->68 69 40372d-403733 54->69 57->51 57->58 58->51 59->47 67 40368b-403698 call 40628d 59->67 64 403638-40363a 60->64 65 40363c 60->65 62->38 64->59 64->65 65->59 67->43 82 4037d1-4037e0 call 4059a3 ExitProcess 68->82 83 403928-40392e 68->83 72 403735-403740 call 405c4a 69->72 73 4037ab-4037b2 call 403a96 69->73 71->54 71->68 86 403742-40376b 72->86 87 403776-40377f 72->87 80 4037b7 73->80 80->68 84 403930-403945 GetCurrentProcess OpenProcessToken 83->84 85 4039a6-4039ae 83->85 91 403976-403984 call 4066b5 84->91 92 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 84->92 89 4039b0 85->89 90 4039b3-4039b6 ExitProcess 85->90 93 40376d-40376f 86->93 94 403781-40378f call 405d0d 87->94 95 4037e6-40380a call 40590e lstrlenA call 40628d 87->95 89->90 104 403992-40399d ExitWindowsEx 91->104 105 403986-403990 91->105 92->91 93->87 98 403771-403774 93->98 94->68 106 403791-4037a7 call 40628d * 2 94->106 113 40381b-403830 95->113 114 40380c-403816 call 40628d 95->114 98->87 98->93 104->85 109 40399f-4039a1 call 40140b 104->109 105->104 105->109 106->73 109->85 118 403835 113->118 114->113 120 403839-403865 wsprintfA call 406320 118->120 123 403867-40386c call 405897 120->123 124 40386e call 4058f1 120->124 128 403873-403875 123->128 124->128 129 403877-403881 GetFileAttributesA 128->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 128->130 132 4038a0-4038a8 129->132 133 403883-40388c DeleteFileA 129->133 130->68 138 4038d4-4038f5 call 406066 call 406320 call 405926 130->138 132->118 135 4038aa 132->135 133->132 134 40388e-40389e call 405a4f 133->134 134->120 134->132 135->68 146 4038f7-4038ff 138->146 147 403918-403923 CloseHandle 138->147 146->68 148 403905-40390d call 406620 146->148 147->68 148->120 151 403913 148->151 151->68
                                  APIs
                                  • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                  • GetVersionExA.KERNEL32(?), ref: 00403424
                                  • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                  • #17.COMCTL32(?,?,0000000A,?), ref: 00403541
                                  • OleInitialize.OLE32(00000000), ref: 00403548
                                  • SHGetFileInfoA.SHELL32(00429448,00000000,?,?,00000000,?,?,0000000A,?), ref: 00403566
                                  • GetCommandLineA.KERNEL32(Traveskoens Setup,NSIS Error,?,?,0000000A,?), ref: 0040357B
                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000020,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000000,?,?,0000000A,?), ref: 004035B5
                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,?,0000000A,?), ref: 004036AE
                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?), ref: 004036BF
                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036CB
                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036DF
                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036E7
                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036F8
                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?), ref: 00403700
                                  • DeleteFileA.KERNELBASE(1033,?,?,0000000A,?), ref: 00403714
                                  • OleUninitialize.OLE32(?,?,?,0000000A,?), ref: 004037BF
                                  • ExitProcess.KERNEL32 ref: 004037E0
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000000,?,?,?,0000000A,?), ref: 004037EF
                                  • wsprintfA.USER32 ref: 00403846
                                  • GetFileAttributesA.KERNEL32(00431400,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 00403878
                                  • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                  • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 004038B0
                                  • CopyFileA.KERNEL32(C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,00431400,00000001), ref: 004038C6
                                  • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                  • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?), ref: 00403936
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                  • ExitProcess.KERNEL32 ref: 004039B6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                  • String ID: "$"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$1033$A$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$Traveskoens Setup$UXTHEME$\Temp$`KNw$~nsu%X.tmp
                                  • API String ID: 2956269667-1496523404
                                  • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                  • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                  • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                  • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 176 405616-405619 153->176 177 4055fa-405614 SendMessageA * 2 153->177 156 4056c2-4056e4 GetDlgItem CreateThread FindCloseChangeNotification 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 164 405720-405726 159->164 165 405773-405776 159->165 162 405700-405713 ShowWindow * 2 call 404362 160->162 163 405739-405740 call 404394 160->163 162->159 173 405745-405749 163->173 166 405728-405734 call 404306 164->166 167 40574c-40575c ShowWindow 164->167 165->163 170 405778-40577e 165->170 166->163 174 40576c-40576e call 404306 167->174 175 40575e-405767 call 4053d1 167->175 170->163 178 405780-405793 SendMessageA 170->178 174->165 175->174 181 405629-405640 call 40432d 176->181 182 40561b-405627 SendMessageA 176->182 177->176 183 405890-405892 178->183 184 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 178->184 191 405642-405656 ShowWindow 181->191 192 405676-405697 GetDlgItem SendMessageA 181->192 182->181 183->173 189 4057c7-4057d7 GetWindowRect 184->189 190 4057da-4057f0 TrackPopupMenu 184->190 189->190 190->183 193 4057f6-405810 190->193 194 405665 191->194 195 405658-405663 ShowWindow 191->195 192->183 196 40569d-4056b5 SendMessageA * 2 192->196 197 405815-405830 SendMessageA 193->197 198 40566b-405671 call 404362 194->198 195->198 196->183 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->183
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                  • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                  • GetClientRect.USER32(?,?), ref: 004055BA
                                  • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                  • ShowWindow.USER32(?,?), ref: 0040565D
                                  • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                  • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                    • Part of subcall function 00404362: SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                  • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004056E4
                                  • ShowWindow.USER32(00000000), ref: 00405707
                                  • ShowWindow.USER32(?,?), ref: 0040570E
                                  • ShowWindow.USER32(?), ref: 00405754
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                  • CreatePopupMenu.USER32 ref: 00405799
                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                  • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                  • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004057E7
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                  • OpenClipboard.USER32(00000000), ref: 00405833
                                  • EmptyClipboard.USER32 ref: 00405839
                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                  • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                  • CloseClipboard.USER32 ref: 0040588A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                  • String ID:
                                  • API String ID: 4154960007-0
                                  • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                  • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                  • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                  • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 516 405a4f-405a75 call 405d0d 519 405a77-405a89 DeleteFileA 516->519 520 405a8e-405a95 516->520 521 405c18-405c1c 519->521 522 405a97-405a99 520->522 523 405aa8-405ab8 call 40628d 520->523 524 405bc6-405bcb 522->524 525 405a9f-405aa2 522->525 531 405ac7-405ac8 call 405c66 523->531 532 405aba-405ac5 lstrcatA 523->532 524->521 527 405bcd-405bd0 524->527 525->523 525->524 529 405bd2-405bd8 527->529 530 405bda-405be2 call 406620 527->530 529->521 530->521 539 405be4-405bf8 call 405c1f call 405a07 530->539 534 405acd-405ad0 531->534 532->534 537 405ad2-405ad9 534->537 538 405adb-405ae1 lstrcatA 534->538 537->538 540 405ae6-405b04 lstrlenA FindFirstFileA 537->540 538->540 555 405c10-405c13 call 4053d1 539->555 556 405bfa-405bfd 539->556 542 405b0a-405b21 call 405c4a 540->542 543 405bbc-405bc0 540->543 549 405b23-405b27 542->549 550 405b2c-405b2f 542->550 543->524 546 405bc2 543->546 546->524 549->550 552 405b29 549->552 553 405b31-405b36 550->553 554 405b42-405b50 call 40628d 550->554 552->550 558 405b38-405b3a 553->558 559 405b9b-405bad FindNextFileA 553->559 566 405b52-405b5a 554->566 567 405b67-405b72 call 405a07 554->567 555->521 556->529 561 405bff-405c0e call 4053d1 call 406066 556->561 558->554 562 405b3c-405b40 558->562 559->542 564 405bb3-405bb6 FindClose 559->564 561->521 562->554 562->559 564->543 566->559 570 405b5c-405b65 call 405a4f 566->570 575 405b93-405b96 call 4053d1 567->575 576 405b74-405b77 567->576 570->559 575->559 578 405b79-405b89 call 4053d1 call 406066 576->578 579 405b8b-405b91 576->579 578->559 579->559
                                  APIs
                                  • DeleteFileA.KERNELBASE(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405A78
                                  • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AC0
                                  • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AE1
                                  • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AE7
                                  • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AF8
                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                  • FindClose.KERNEL32(00000000), ref: 00405BB6
                                  Strings
                                  • \*.*, xrefs: 00405ABA
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5C
                                  • "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe", xrefs: 00405A58
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                  • API String ID: 2035342205-3188317394
                                  • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                  • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                  • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                  • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 729 406647-406667 GetSystemDirectoryA 730 406669 729->730 731 40666b-40666d 729->731 730->731 732 40667d-40667f 731->732 733 40666f-406677 731->733 735 406680-4066b2 wsprintfA LoadLibraryExA 732->735 733->732 734 406679-40667b 733->734 734->735
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                  • wsprintfA.USER32 ref: 00406697
                                  • LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                  • String ID: %s%s.dll$UXTHEME$\
                                  • API String ID: 2200240437-4240819195
                                  • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                  • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                  • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                  • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69
                                  APIs
                                  • FindFirstFileA.KERNELBASE(774D3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,774D3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                  • FindClose.KERNEL32(00000000), ref: 00406637
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsvEA82.tmp, xrefs: 00406620
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp
                                  • API String ID: 2295610775-1605232751
                                  • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                  • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                  • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                  • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 208 403e57-403e60 204->208 206 40400a-40401f 205->206 207 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->207 210 404021-404024 206->210 211 40405f-404064 call 404379 206->211 207->206 212 403e62-403e6f SetWindowPos 208->212 213 403e75-403e7c 208->213 217 404026-404031 call 401389 210->217 218 404057-404059 210->218 227 404069-404084 211->227 212->213 214 403ec0-403ec6 213->214 215 403e7e-403e98 ShowWindow 213->215 222 403ec8-403eda DestroyWindow 214->222 223 403edf-403ee2 214->223 220 403f99-403fa7 call 404394 215->220 221 403e9e-403eb1 GetWindowLongA 215->221 217->218 243 404033-404052 SendMessageA 217->243 218->211 226 4042fa 218->226 233 4042fc-404303 220->233 221->220 230 403eb7-403eba ShowWindow 221->230 231 4042d7-4042dd 222->231 234 403ee4-403ef0 SetWindowLongA 223->234 235 403ef5-403efb 223->235 226->233 228 404086-404088 call 40140b 227->228 229 40408d-404093 227->229 228->229 240 4042b8-4042d1 DestroyWindow EndDialog 229->240 241 404099-4040a4 229->241 230->214 231->226 239 4042df-4042e5 231->239 234->233 235->220 242 403f01-403f10 GetDlgItem 235->242 239->226 245 4042e7-4042f0 ShowWindow 239->245 240->231 241->240 246 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 241->246 247 403f12-403f29 SendMessageA IsWindowEnabled 242->247 248 403f2f-403f32 242->248 243->233 245->226 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 246->275 276 4040f9-4040fe 246->276 247->226 247->248 250 403f34-403f35 248->250 251 403f37-403f3a 248->251 253 403f65-403f6a call 404306 250->253 254 403f48-403f4d 251->254 255 403f3c-403f42 251->255 253->220 256 403f83-403f93 SendMessageA 254->256 257 403f4f-403f55 254->257 255->256 260 403f44-403f46 255->260 256->220 261 403f57-403f5d call 40140b 257->261 262 403f6c-403f75 call 40140b 257->262 260->253 271 403f63 261->271 262->220 272 403f77-403f81 262->272 271->253 272->271 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->227 295 4041cd-4041cf 284->295 295->227 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->231 300 404212-40423f CreateDialogParamA 297->300 298->226 299 4041e7-4041ed 298->299 299->227 301 4041f3 299->301 300->231 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 300->302 301->226 302->226 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->231
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                  • ShowWindow.USER32(?), ref: 00403E8F
                                  • GetWindowLongA.USER32(?,?), ref: 00403EA1
                                  • ShowWindow.USER32(?,?), ref: 00403EBA
                                  • DestroyWindow.USER32 ref: 00403ECE
                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                  • GetDlgItem.USER32(?,?), ref: 00403F06
                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                  • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                  • GetDlgItem.USER32(?,00000001), ref: 00403FCC
                                  • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404041
                                  • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                  • ShowWindow.USER32(00000000,?), ref: 00404108
                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                  • EnableWindow.USER32(?,?), ref: 00404135
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414B
                                  • EnableMenuItem.USER32(00000000), ref: 00404152
                                  • SendMessageA.USER32(?,?,00000000,00000001), ref: 0040416A
                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                  • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                  • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                  • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                  • String ID:
                                  • API String ID: 121052019-0
                                  • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                  • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                  • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                  • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 321 403b16-403b3f call 403d5b call 405d0d 313->321 319 403af5-403b06 call 406174 314->319 320 403b0b-403b11 lstrcatA 314->320 319->320 320->321 328 403b45-403b4a 321->328 329 403bc6-403bce call 405d0d 321->329 328->329 330 403b4c-403b70 call 406174 328->330 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 330->329 337 403b72-403b74 330->337 335->336 339 403c82-403c8a call 40140b 336->339 340 403c03-403c33 RegisterClassA 336->340 342 403b85-403b91 lstrlenA 337->342 343 403b76-403b83 call 405c4a 337->343 352 403c94-403c9f call 403d5b 339->352 353 403c8c-403c8f 339->353 344 403d51 340->344 345 403c39-403c7d SystemParametersInfoA CreateWindowExA 340->345 349 403b93-403ba1 lstrcmpiA 342->349 350 403bb9-403bc1 call 405c1f call 40628d 342->350 343->342 348 403d53-403d5a 344->348 345->339 349->350 351 403ba3-403bad GetFileAttributesA 349->351 350->329 356 403bb3-403bb4 call 405c66 351->356 357 403baf-403bb1 351->357 363 403ca5-403cbf ShowWindow call 406647 352->363 364 403d28-403d29 call 4054a3 352->364 353->348 356->350 357->350 357->356 371 403cc1-403cc6 call 406647 363->371 372 403ccb-403cdd GetClassInfoA 363->372 367 403d2e-403d30 364->367 369 403d32-403d38 367->369 370 403d4a-403d4c call 40140b 367->370 369->353 373 403d3e-403d45 call 40140b 369->373 370->344 371->372 376 403cf5-403d18 DialogBoxParamA call 40140b 372->376 377 403cdf-403cef GetClassInfoA RegisterClassA 372->377 373->353 380 403d1d-403d26 call 4039e6 376->380 377->376 380->348
                                  APIs
                                    • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                    • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                  • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,774D3410,C:\Users\user\AppData\Local\Temp\,?,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",0000000A,?), ref: 00403B11
                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,774D3410), ref: 00403B86
                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                  • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",0000000A,?), ref: 00403BA4
                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                    • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                  • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                  • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403C42
                                  • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                  • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",0000000A,?), ref: 00403CAD
                                  • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                  • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                  • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                  • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                  • API String ID: 1975747703-619791318
                                  • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                  • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                  • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                  • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 390 403161-403165 387->390 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 403 4030b4-4030b7 396->403 404 403107-40310c 396->404 399 402fc4-402fdb 397->399 401 402fdd 399->401 402 402fdf-402fe8 call 40337a 399->402 401->402 410 40310e-403116 call 402ecd 402->410 411 402fee-402ff5 402->411 406 4030b9-4030d1 call 403390 call 40337a 403->406 407 4030db-403105 GlobalAlloc call 403390 call 403168 403->407 404->390 406->404 433 4030d3-4030d9 406->433 407->404 431 403118-403129 407->431 410->404 415 403071-403075 411->415 416 402ff7-40300b call 405ddb 411->416 421 403077-40307e call 402ecd 415->421 422 40307f-403085 415->422 416->422 430 40300d-403014 416->430 421->422 427 403094-40309c 422->427 428 403087-403091 call 40676c 422->428 427->399 432 4030a2 427->432 428->427 430->422 437 403016-40301d 430->437 438 403131-403136 431->438 439 40312b 431->439 432->396 433->404 433->407 437->422 440 40301f-403026 437->440 441 403137-40313d 438->441 439->438 440->422 442 403028-40302f 440->442 441->441 443 40313f-40315a SetFilePointer call 405ddb 441->443 442->422 444 403031-403051 442->444 447 40315f 443->447 444->404 446 403057-40305b 444->446 448 403063-40306b 446->448 449 40305d-403061 446->449 447->390 448->422 450 40306d-40306f 448->450 449->432 449->448 450->422
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00402F42
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,00000400,?,?,00403722,?,?,?,0000000A,?), ref: 00402F5E
                                    • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                    • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                  • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?), ref: 00402FAA
                                  • GlobalAlloc.KERNELBASE(?,?,?,?,00403722,?,?,?,0000000A,?), ref: 004030E0
                                  Strings
                                  • soft, xrefs: 0040301F
                                  • Inst, xrefs: 00403016
                                  • 8TA, xrefs: 00402FBF
                                  • C:\Users\user\Desktop, xrefs: 00402F8C, 00402F91, 00402F97
                                  • Error launching installer, xrefs: 00402F81
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402F38
                                  • Null, xrefs: 00403028
                                  • "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe", xrefs: 00402F37
                                  • C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, xrefs: 00402F48, 00402F57, 00402F6B, 00402F8B
                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                  • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$8TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                  • API String ID: 2803837635-1236122891
                                  • Opcode ID: f49f85fbe7888e3b10c39431673b010741fca75b5d582ad2466d93653721041e
                                  • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                  • Opcode Fuzzy Hash: f49f85fbe7888e3b10c39431673b010741fca75b5d582ad2466d93653721041e
                                  • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 451 406320-40632b 452 40632d-40633c 451->452 453 40633e-406353 451->453 452->453 454 406564-406568 453->454 455 406359-406364 453->455 456 406376-406380 454->456 457 40656e-406578 454->457 455->454 458 40636a-406371 455->458 456->457 459 406386-40638d 456->459 460 406583-406584 457->460 461 40657a-40657e call 40628d 457->461 458->454 462 406393-4063c9 459->462 463 406557 459->463 461->460 465 406501-406504 462->465 466 4063cf-4063d9 462->466 467 406561-406563 463->467 468 406559-40655f 463->468 471 406534-406537 465->471 472 406506-406509 465->472 469 4063f6 466->469 470 4063db-4063e4 466->470 467->454 468->454 476 4063fd-406405 469->476 470->469 475 4063e6-4063e9 470->475 473 406545-406555 lstrlenA 471->473 474 406539-406540 call 406320 471->474 477 406519-406525 call 40628d 472->477 478 40650b-406517 call 4061eb 472->478 473->454 474->473 475->469 480 4063eb-4063ee 475->480 481 406407 476->481 482 40640e-406410 476->482 489 40652a-406530 477->489 478->489 480->469 485 4063f0-4063f4 480->485 481->482 486 406412-40642d call 406174 482->486 487 406447-40644a 482->487 485->476 498 406432-406435 486->498 491 40644c-406458 GetSystemDirectoryA 487->491 492 40645d-406460 487->492 489->473 490 406532 489->490 494 4064f9-4064ff call 406587 490->494 495 4064e3-4064e6 491->495 496 406471-406474 492->496 497 406462-40646e GetWindowsDirectoryA 492->497 494->473 495->494 499 4064e8-4064ec 495->499 496->495 501 406476-406494 496->501 497->496 498->499 502 40643b-406442 call 406320 498->502 499->494 503 4064ee-4064f4 lstrcatA 499->503 505 406496-406499 501->505 506 4064ab-4064c3 call 4066b5 501->506 502->495 503->494 505->506 509 40649b-40649f 505->509 514 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 506->514 515 4064da-4064e1 506->515 512 4064a7-4064a9 509->512 512->495 512->506 514->495 514->515 515->495 515->501
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00000000), ref: 00406468
                                  • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000), ref: 004064C7
                                  • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000), ref: 004064D0
                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000), ref: 004064F4
                                  • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00000000,00424440,774D23A0), ref: 00406546
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                  • String ID: T@$Call$Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                  • API String ID: 4024019347-3327510449
                                  • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                  • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                  • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                  • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 585 40177e-4017a1 call 402c5e call 405c8c 590 4017a3-4017a9 call 40628d 585->590 591 4017ab-4017bd call 40628d call 405c1f lstrcatA 585->591 596 4017c2-4017c8 call 406587 590->596 591->596 601 4017cd-4017d1 596->601 602 4017d3-4017dd call 406620 601->602 603 401804-401807 601->603 610 4017ef-401801 602->610 611 4017df-4017ed CompareFileTime 602->611 604 401809-40180a call 405dfb 603->604 605 40180f-40182b call 405e20 603->605 604->605 613 4018a3-4018cc call 4053d1 call 403168 605->613 614 40182d-401830 605->614 610->603 611->610 626 4018d4-4018e0 SetFileTime 613->626 627 4018ce-4018d2 613->627 615 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 614->615 616 401885-40188f call 4053d1 614->616 615->601 648 40187a-40187b 615->648 628 401898-40189e 616->628 630 4018e6-4018f1 FindCloseChangeNotification 626->630 627->626 627->630 631 402af3 628->631 634 4018f7-4018fa 630->634 635 402aea-402aed 630->635 636 402af5-402af9 631->636 638 4018fc-40190d call 406320 lstrcatA 634->638 639 40190f-401912 call 406320 634->639 635->631 645 401917-4023af 638->645 639->645 649 4023b4-4023b9 645->649 650 4023af call 4059a3 645->650 648->628 651 40187d-40187e 648->651 649->636 650->649 651->616
                                  APIs
                                  • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes,00000000,00000000,00000031), ref: 004017BD
                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes,00000000,00000000,00000031), ref: 004017E7
                                    • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,Traveskoens Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0), ref: 0040542D
                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll), ref: 0040543F
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp$C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes$Call
                                  • API String ID: 1941528284-1801670601
                                  • Opcode ID: 625538039a129191562edbeeeefb1e0ae03e74452835c0c2dc64025a2d1f3986
                                  • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                  • Opcode Fuzzy Hash: 625538039a129191562edbeeeefb1e0ae03e74452835c0c2dc64025a2d1f3986
                                  • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 652 4053d1-4053e6 653 40549c-4054a0 652->653 654 4053ec-4053fe 652->654 655 405400-405404 call 406320 654->655 656 405409-405415 lstrlenA 654->656 655->656 658 405432-405436 656->658 659 405417-405427 lstrlenA 656->659 660 405445-405449 658->660 661 405438-40543f SetWindowTextA 658->661 659->653 662 405429-40542d lstrcatA 659->662 663 40544b-40548d SendMessageA * 3 660->663 664 40548f-405491 660->664 661->660 662->658 663->664 664->653 665 405493-405496 664->665 665->653
                                  APIs
                                  • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                  • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                  • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0), ref: 0040542D
                                  • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll), ref: 0040543F
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll
                                  • API String ID: 2531174081-1662581602
                                  • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                  • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                  • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                  • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 666 403168-40317c 667 403185-40318e 666->667 668 40317e 666->668 669 403190 667->669 670 403197-40319c 667->670 668->667 669->670 671 4031ac-4031b9 call 40337a 670->671 672 40319e-4031a7 call 403390 670->672 676 403368 671->676 677 4031bf-4031c3 671->677 672->671 678 40336a-40336b 676->678 679 403313-403315 677->679 680 4031c9-403212 GetTickCount 677->680 683 403373-403377 678->683 681 403355-403358 679->681 682 403317-40331a 679->682 684 403370 680->684 685 403218-403220 680->685 689 40335a 681->689 690 40335d-403366 call 40337a 681->690 682->684 686 40331c 682->686 684->683 687 403222 685->687 688 403225-403233 call 40337a 685->688 692 40331f-403325 686->692 687->688 688->676 700 403239-403242 688->700 689->690 690->676 698 40336d 690->698 695 403327 692->695 696 403329-403337 call 40337a 692->696 695->696 696->676 703 403339-403345 call 405ec7 696->703 698->684 702 403248-403268 call 4067da 700->702 708 40330b-40330d 702->708 709 40326e-403281 GetTickCount 702->709 710 403347-403351 703->710 711 40330f-403311 703->711 708->678 712 403283-40328b 709->712 713 4032c6-4032c8 709->713 710->692 716 403353 710->716 711->678 717 403293-4032be MulDiv wsprintfA call 4053d1 712->717 718 40328d-403291 712->718 714 4032ca-4032ce 713->714 715 4032ff-403303 713->715 720 4032d0-4032d7 call 405ec7 714->720 721 4032e5-4032f0 714->721 715->685 722 403309 715->722 716->684 723 4032c3 717->723 718->713 718->717 726 4032dc-4032de 720->726 725 4032f3-4032f7 721->725 722->684 723->713 725->702 727 4032fd 725->727 726->711 728 4032e0-4032e3 726->728 727->684 728->725
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CountTick$wsprintf
                                  • String ID: ... %d%%$@DB
                                  • API String ID: 551687249-1316549817
                                  • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                  • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                  • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                  • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 736 402d60-402d89 call 406113 738 402d8e-402d92 736->738 739 402e43-402e47 738->739 740 402d98-402d9c 738->740 741 402dc1-402dd4 740->741 742 402d9e-402dbf RegEnumValueA 740->742 744 402dfd-402e04 RegEnumKeyA 741->744 742->741 743 402e28-402e36 RegCloseKey 742->743 743->739 745 402dd6-402dd8 744->745 746 402e06-402e18 RegCloseKey call 4066b5 744->746 745->743 748 402dda-402dee call 402d60 745->748 752 402e38-402e3e 746->752 753 402e1a-402e26 RegDeleteKeyA 746->753 748->746 754 402df0-402dfc 748->754 752->739 753->739 754->744
                                  APIs
                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CloseEnum$DeleteValue
                                  • String ID:
                                  • API String ID: 1354259210-0
                                  • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                  • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                  • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                  • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 755 6d38176b-6d3817a7 call 6d381b28 759 6d3817ad-6d3817b1 755->759 760 6d3818c4-6d3818c6 755->760 761 6d3817ba-6d3817c7 call 6d382381 759->761 762 6d3817b3-6d3817b9 call 6d38233f 759->762 767 6d3817c9-6d3817ce 761->767 768 6d3817f7-6d3817fe 761->768 762->761 771 6d3817e9-6d3817ec 767->771 772 6d3817d0-6d3817d1 767->772 769 6d38181e-6d381822 768->769 770 6d381800-6d38181c call 6d382568 call 6d3815e9 call 6d3812f6 GlobalFree 768->770 777 6d38186c-6d381872 call 6d382568 769->777 778 6d381824-6d38186a call 6d3815fb call 6d382568 769->778 794 6d381873-6d381877 770->794 771->768 773 6d3817ee-6d3817ef call 6d382d53 771->773 775 6d3817d9-6d3817da call 6d382ac8 772->775 776 6d3817d3-6d3817d4 772->776 787 6d3817f4 773->787 790 6d3817df 775->790 782 6d3817e1-6d3817e7 call 6d382742 776->782 783 6d3817d6-6d3817d7 776->783 777->794 778->794 793 6d3817f6 782->793 783->768 783->775 787->793 790->787 793->768 798 6d381879-6d381887 call 6d38252e 794->798 799 6d3818b4-6d3818bb 794->799 805 6d381889-6d38188c 798->805 806 6d38189f-6d3818a6 798->806 799->760 801 6d3818bd-6d3818be GlobalFree 799->801 801->760 805->806 807 6d38188e-6d381896 805->807 806->799 808 6d3818a8-6d3818b3 call 6d381572 806->808 807->806 809 6d381898-6d381899 FreeLibrary 807->809 808->799 809->806
                                  APIs
                                    • Part of subcall function 6D381B28: GlobalFree.KERNEL32(?), ref: 6D381D99
                                    • Part of subcall function 6D381B28: GlobalFree.KERNEL32(?), ref: 6D381D9E
                                    • Part of subcall function 6D381B28: GlobalFree.KERNEL32(?), ref: 6D381DA3
                                  • GlobalFree.KERNEL32(00000000), ref: 6D381816
                                  • FreeLibrary.KERNEL32(?), ref: 6D381899
                                  • GlobalFree.KERNEL32(00000000), ref: 6D3818BE
                                    • Part of subcall function 6D38233F: GlobalAlloc.KERNEL32(?,?), ref: 6D382370
                                    • Part of subcall function 6D382742: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,6D3817E7,00000000), ref: 6D382812
                                    • Part of subcall function 6D3815FB: wsprintfA.USER32 ref: 6D381629
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                  • String ID:
                                  • API String ID: 3962662361-3916222277
                                  • Opcode ID: ef8ba81ad654f0e4392d09bc9d559f7929d9307a1761dcbef608eeb29cd8e5ca
                                  • Instruction ID: fe6af95f470217a4df40fe854d796f06c7ee0d5bb3519379d172d006f521ae86
                                  • Opcode Fuzzy Hash: ef8ba81ad654f0e4392d09bc9d559f7929d9307a1761dcbef608eeb29cd8e5ca
                                  • Instruction Fuzzy Hash: E641B0B5804206ABCF119F748D86BAA37ECBF02319F04C439EA7A9E087DF758145C7A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 812 4024a3-4024ca call 402c5e * 2 call 402cee 818 4024cf-4024d4 812->818 819 402aea-402af9 818->819 820 4024da-4024e4 818->820 822 4024f4-4024f7 820->822 823 4024e6-4024f3 call 402c5e lstrlenA 820->823 826 4024f9-40250d call 402c3c 822->826 827 40250e-402511 822->827 823->822 826->827 828 402522-402536 RegSetValueExA 827->828 829 402513-40251d call 403168 827->829 833 402538 828->833 834 40253b-402618 RegCloseKey 828->834 829->828 833->834 834->819
                                  APIs
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000023,00000011,00000002), ref: 004024EE
                                  • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,00000011,00000002), ref: 0040252E
                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,00000011,00000002), ref: 00402612
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CloseValuelstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp
                                  • API String ID: 2655323295-1605232751
                                  • Opcode ID: 06b0079c4aef01dc779783f3c5affbdbf4d6b405c4d88886d706ecd77701b95e
                                  • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                  • Opcode Fuzzy Hash: 06b0079c4aef01dc779783f3c5affbdbf4d6b405c4d88886d706ecd77701b95e
                                  • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 837 405e4f-405e59 838 405e5a-405e85 GetTickCount GetTempFileNameA 837->838 839 405e94-405e96 838->839 840 405e87-405e89 838->840 842 405e8e-405e91 839->842 840->838 841 405e8b 840->841 841->842
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00405E63
                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,004033D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?), ref: 00405E7D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                  • API String ID: 1716503409-386316673
                                  • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                  • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                  • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                  • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                  APIs
                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,?), ref: 004020F5
                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0), ref: 0040542D
                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll), ref: 0040543F
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                  • LoadLibraryExA.KERNELBASE(00000000,?,?,00000001,?), ref: 00402105
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                  • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,00000001,?), ref: 0040217F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                  • String ID:
                                  • API String ID: 2987980305-0
                                  • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                  • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                  • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                  • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                  APIs
                                    • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405CC6
                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,?,00000000,?), ref: 00401632
                                    • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes,00000000,00000000,?), ref: 00401661
                                  Strings
                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes, xrefs: 00401656
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes
                                  • API String ID: 1892508949-3094750263
                                  • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                  • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                  • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                  • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                  APIs
                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                  • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll), ref: 004061C5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID: Call
                                  • API String ID: 3356406503-1824292864
                                  • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                  • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                  • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                  • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                  APIs
                                  • GlobalFree.KERNEL32(007601F8), ref: 00401C1B
                                  • GlobalAlloc.KERNEL32(?,00000404), ref: 00401C2D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree
                                  • String ID: Call
                                  • API String ID: 3394109436-1824292864
                                  • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                  • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                  • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                  • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                  APIs
                                    • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(774D3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,774D3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                    • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                  • lstrlenA.KERNEL32 ref: 00402358
                                  • lstrlenA.KERNEL32(00000000), ref: 00402362
                                  • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FileFindlstrlen$CloseFirstOperation
                                  • String ID:
                                  • API String ID: 1486964399-0
                                  • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                  • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                  • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                  • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                  APIs
                                  • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                  • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,00000011,00000002), ref: 00402612
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Enum$CloseValue
                                  • String ID:
                                  • API String ID: 397863658-0
                                  • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                  • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                  • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                  • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                  APIs
                                  • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,00000011,00000002), ref: 00402612
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID:
                                  • API String ID: 3356406503-0
                                  • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                  • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                  • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                  • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                  • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                  • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                  • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                  APIs
                                  • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CloseDeleteValue
                                  • String ID:
                                  • API String ID: 2831762973-0
                                  • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                  • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                  • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                  • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                  APIs
                                  • OleInitialize.OLE32(00000000), ref: 004054B3
                                    • Part of subcall function 00404379: SendMessageA.USER32(0001047A,00000000,00000000,00000000), ref: 0040438B
                                  • OleUninitialize.OLE32(00000404,00000000,?,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",0000000A,?), ref: 004054FF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: InitializeMessageSendUninitialize
                                  • String ID:
                                  • API String ID: 2896919175-0
                                  • Opcode ID: 30cd364783bd55b4022a254623c8036b8c868d19a0038e692d36572ac111a596
                                  • Instruction ID: b23c7a31ffea30b7bf477630ed079ea491ec19bd3352061bfc39de2177defd21
                                  • Opcode Fuzzy Hash: 30cd364783bd55b4022a254623c8036b8c868d19a0038e692d36572ac111a596
                                  • Instruction Fuzzy Hash: 2CF090B2600600DBE6215B54A901FA677B0EB84302F45853EEF88A22E2D77958468B6C
                                  APIs
                                  • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A56
                                  • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A69
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: EnvironmentExpandStringslstrcmp
                                  • String ID:
                                  • API String ID: 1938659011-0
                                  • Opcode ID: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                  • Instruction ID: 106b93b956adcb394031d7b68410eec4a4f19a4829598155c7958b8f8b1c482a
                                  • Opcode Fuzzy Hash: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                  • Instruction Fuzzy Hash: E8F08231B01201EBCB20CF659E48AAF7EE8DF51354B10403BE145F6190D6788643DF5C
                                  APIs
                                  • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                  • GetLastError.KERNEL32 ref: 004058E7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                  • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                  • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                  • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                  APIs
                                  • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                  • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Window$EnableShow
                                  • String ID:
                                  • API String ID: 1136574915-0
                                  • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                  • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                  • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                  • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                  APIs
                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                  • CloseHandle.KERNEL32(?), ref: 0040595C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID:
                                  • API String ID: 3712363035-0
                                  • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                  • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                  • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                  • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                    • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                    • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                    • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                  • String ID:
                                  • API String ID: 2547128583-0
                                  • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                  • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                  • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                  • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                  APIs
                                  • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                  • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                  • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                  • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                  APIs
                                  • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004058F7
                                  • GetLastError.KERNEL32(?,?,0000000A,?), ref: 00405905
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                  • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                  • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                  • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                  APIs
                                  • EnumWindows.USER32(00000000), ref: 6D382B87
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: EnumWindows
                                  • String ID:
                                  • API String ID: 1129996299-0
                                  • Opcode ID: ad80cba43552446dfb1d792fddfe266cc6886dad67026c8972e9672f4c624f8b
                                  • Instruction ID: 18e10bae4e091d576c9bd9ab3a4ddb8ad61df67af9652b17bde3bc1dc06d70fb
                                  • Opcode Fuzzy Hash: ad80cba43552446dfb1d792fddfe266cc6886dad67026c8972e9672f4c624f8b
                                  • Instruction Fuzzy Hash: 1241A4BA508244FFDF31DF64DA81B7A37B8FF4631AF208826E606C7116CB3995418B91
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: wsprintf
                                  • String ID:
                                  • API String ID: 2111968516-0
                                  • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                  • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                  • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                  • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                  APIs
                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FileMove
                                  • String ID:
                                  • API String ID: 3562171763-0
                                  • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                  • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                  • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                  • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                    • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FilePointerwsprintf
                                  • String ID:
                                  • API String ID: 327478801-0
                                  • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                  • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                  • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                  • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                  APIs
                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringWrite
                                  • String ID:
                                  • API String ID: 390214022-0
                                  • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                  • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                  • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                  • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                  APIs
                                  • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                  • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                  • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                  • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                  APIs
                                  • WriteFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,?,00000000), ref: 00405EDB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                  • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                  • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                  • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,?,00000000,00000000,00000000), ref: 00405EAC
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                  • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                  • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                  • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                  APIs
                                  • VirtualProtect.KERNELBASE(6D38504C,?,?,6D38503C), ref: 6D3829CF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 4494754ba1ab83552fdc584b41f2328f02ea7b3b8789174876aeaf0684d83305
                                  • Instruction ID: a942fd1bd0bb5a7a240c8f12f9d372cabf6697cf79ea64ee16c7f73243237719
                                  • Opcode Fuzzy Hash: 4494754ba1ab83552fdc584b41f2328f02ea7b3b8789174876aeaf0684d83305
                                  • Instruction Fuzzy Hash: A9F0A5F05042C0FECB60CF28844472A3FF8BB5B35BB10452AE14AD624AE33441449B92
                                  APIs
                                  • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: PrivateProfileString
                                  • String ID:
                                  • API String ID: 1096422788-0
                                  • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                  • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                  • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                  • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                  APIs
                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID:
                                  • API String ID: 71445658-0
                                  • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                  • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                  • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                  • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                  APIs
                                  • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015CD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                  • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                  • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                  • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                  APIs
                                  • SendMessageA.USER32(0001047A,00000000,00000000,00000000), ref: 0040438B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                  • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                  • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                  • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                  APIs
                                  • SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                  • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                  • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                  • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                  APIs
                                  • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: ExecuteShell
                                  • String ID:
                                  • API String ID: 587946157-0
                                  • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                  • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                  • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                  • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                  • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                  • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                  • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID:
                                  • API String ID: 2492992576-0
                                  • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                  • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                  • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                  • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                  APIs
                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,00000000,00424440,774D23A0), ref: 0040542D
                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp\System.dll), ref: 0040543F
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                    • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                    • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                    • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,?), ref: 0040673B
                                    • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                    • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                  • String ID:
                                  • API String ID: 2972824698-0
                                  • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                  • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                  • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                  • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                  APIs
                                  • Sleep.KERNELBASE(00000000), ref: 004014E9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Sleep
                                  • String ID:
                                  • API String ID: 3472027048-0
                                  • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                  • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                  • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                  • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                  APIs
                                  • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                  • SetWindowTextA.USER32(00000000,-00430000), ref: 00404838
                                  • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                  • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                  • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                  • lstrcatA.KERNEL32(-00430000,Call), ref: 00404932
                                  • SetDlgItemTextA.USER32(?,000003FB,-00430000), ref: 00404944
                                    • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                    • Part of subcall function 00406587: CharNextA.USER32(?,*?|<>/":,00000000,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                    • Part of subcall function 00406587: CharNextA.USER32(?,?,?,00000000,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                    • Part of subcall function 00406587: CharNextA.USER32(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                    • Part of subcall function 00406587: CharPrevA.USER32(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                  • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,-00430000,00000001,00429458,-00430000,-00430000,000003FB,-00430000), ref: 00404A02
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                    • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,-00430000), ref: 00404C14
                                    • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                    • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                  • API String ID: 2624150263-1981769490
                                  • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                  • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                  • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                  • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                  APIs
                                    • Part of subcall function 6D3812A5: GlobalAlloc.KERNEL32(?,6D3812C3,?,6D38135F,-6D38504B,6D3811C0,-000000A0), ref: 6D3812AD
                                  • GlobalAlloc.KERNEL32(?,000014A4), ref: 6D381C54
                                  • lstrcpyA.KERNEL32(00000008,?), ref: 6D381C9C
                                  • lstrcpyA.KERNEL32(00000408,?), ref: 6D381CA6
                                  • GlobalFree.KERNEL32(00000000), ref: 6D381CB9
                                  • GlobalFree.KERNEL32(?), ref: 6D381D99
                                  • GlobalFree.KERNEL32(?), ref: 6D381D9E
                                  • GlobalFree.KERNEL32(?), ref: 6D381DA3
                                  • GlobalFree.KERNEL32(00000000), ref: 6D381F8A
                                  • lstrcpyA.KERNEL32(?,?), ref: 6D382128
                                  • GetModuleHandleA.KERNEL32(00000008), ref: 6D3821A4
                                  • LoadLibraryA.KERNEL32(00000008), ref: 6D3821B5
                                  • GetProcAddress.KERNEL32(?,?), ref: 6D38220E
                                  • lstrlenA.KERNEL32(00000408), ref: 6D382228
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                  • String ID:
                                  • API String ID: 245916457-0
                                  • Opcode ID: f9e5fa80b9fcd52daee46f7ae91a8f3ff3650b5d4b566b018683a8334256c1e2
                                  • Instruction ID: ac865c338cb9b31109fa2d6c60643f370bdcf65f6a95e4b0d591ca8eeabacbd8
                                  • Opcode Fuzzy Hash: f9e5fa80b9fcd52daee46f7ae91a8f3ff3650b5d4b566b018683a8334256c1e2
                                  • Instruction Fuzzy Hash: 2422EEB1D1824ADEDB21CFA8C9817BEBBF8FB06305F10852ED2B5A3282C7755545CB50
                                  APIs
                                  • CoCreateInstance.OLE32(0040851C,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040221D
                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 004022CF
                                  Strings
                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes, xrefs: 0040225D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: ByteCharCreateInstanceMultiWide
                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes
                                  • API String ID: 123533781-3094750263
                                  • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                  • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                  • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                  • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027DE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                  • Instruction ID: 474e59c826447b87e47a37c01b73ad662870a85b7ff57bc711f4e8679485c19e
                                  • Opcode Fuzzy Hash: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                  • Instruction Fuzzy Hash: 9CF0A771605110DFDB51EBA49E49AEE77689F21314F6005BBE141F20C2C6B889469B2E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                  • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                  • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                  • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                  • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                  • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                  • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                  • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                  • GlobalAlloc.KERNEL32(?,?), ref: 00404DA5
                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                  • SetWindowLongA.USER32(?,?,00405345), ref: 00404DD6
                                  • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404DE8
                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                  • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404E2E
                                  • DeleteObject.GDI32(00000110), ref: 00404E33
                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                  • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                    • Part of subcall function 00404362: SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                  • GetWindowLongA.USER32(?,?), ref: 00404F76
                                  • SetWindowLongA.USER32(?,?,00000000), ref: 00404F84
                                  • ShowWindow.USER32(?,00000005), ref: 00404F94
                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                  • SendMessageA.USER32(?,?,00000000,00000000), ref: 00405109
                                  • SendMessageA.USER32(?,00000420,00000000,?), ref: 0040512D
                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                  • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                  • GlobalFree.KERNEL32(?), ref: 00405172
                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                  • ShowWindow.USER32(?,00000000), ref: 0040531C
                                  • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                  • ShowWindow.USER32(00000000), ref: 0040532E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $M$N
                                  • API String ID: 2564846305-813528018
                                  • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                  • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                  • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                  • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                  APIs
                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                  • GetSysColor.USER32(?), ref: 00404566
                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                  • lstrlenA.KERNEL32(?), ref: 00404587
                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                  • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                  • SendMessageA.USER32(00000000), ref: 00404610
                                  • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                  • SetCursor.USER32(00000000), ref: 00404693
                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                  • SetCursor.USER32(00000000), ref: 004046AC
                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                  • SendMessageA.USER32(?,00000000,00000000), ref: 004046EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                  • String ID: Call$N$cD@
                                  • API String ID: 3103080414-3938186718
                                  • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                  • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                  • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                  • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                  APIs
                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                  • DeleteObject.GDI32(?), ref: 004010ED
                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                  • DrawTextA.USER32(00000000,Traveskoens Setup,000000FF,00000010,00000820), ref: 00401156
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                  • DeleteObject.GDI32(?), ref: 00401165
                                  • EndPaint.USER32(?,?), ref: 0040116E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: F$Traveskoens Setup
                                  • API String ID: 941294808-3973392805
                                  • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                  • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                  • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                  • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                  • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                    • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                    • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                  • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                  • wsprintfA.USER32 ref: 00405F6B
                                  • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,?,0042C618,?,?,?,?,?), ref: 00405FA6
                                  • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00405FB5
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                  • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                  • GlobalFree.KERNEL32(00000000), ref: 00406054
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                    • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                    • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                  • String ID: %s=%s$[Rename]
                                  • API String ID: 2171350718-1727408572
                                  • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                  • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                  • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                  • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                  APIs
                                  • CharNextA.USER32(?,*?|<>/":,00000000,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                  • CharNextA.USER32(?,?,?,00000000,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                  • CharNextA.USER32(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                  • CharPrevA.USER32(?,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                  Strings
                                  • *?|<>/":, xrefs: 004065CF
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00406588
                                  • "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe", xrefs: 00406587
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 589700163-1414002410
                                  • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                  • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                  • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                  • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                  APIs
                                  • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                  • GetSysColor.USER32(00000000), ref: 004043EF
                                  • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                  • SetBkMode.GDI32(?,?), ref: 00404407
                                  • GetSysColor.USER32(?), ref: 0040441A
                                  • SetBkColor.GDI32(?,?), ref: 0040442A
                                  • DeleteObject.GDI32(?), ref: 00404444
                                  • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                  • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                  • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                  • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                  APIs
                                    • Part of subcall function 6D3812A5: GlobalAlloc.KERNEL32(?,6D3812C3,?,6D38135F,-6D38504B,6D3811C0,-000000A0), ref: 6D3812AD
                                  • GlobalFree.KERNEL32(?), ref: 6D38266E
                                  • GlobalFree.KERNEL32(00000000), ref: 6D3826A8
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc
                                  • String ID:
                                  • API String ID: 1780285237-0
                                  • Opcode ID: 27aa84d90c13f3dbc16cb77de4bb95c5293c6d8f94964e6542c272fc15ec305a
                                  • Instruction ID: 5b269b539936654c68aac8baeb162357197c297409c7d2e516b2e00060f1c213
                                  • Opcode Fuzzy Hash: 27aa84d90c13f3dbc16cb77de4bb95c5293c6d8f94964e6542c272fc15ec305a
                                  • Instruction Fuzzy Hash: 7741CFB6508281EFCB218F94CE84D3FBBBEFB8B305B10852DF65297511C77198058B62
                                  APIs
                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                  • GetMessagePos.USER32 ref: 00404CA3
                                  • ScreenToClient.USER32(?,?), ref: 00404CBD
                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                  • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                  • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                  • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                  APIs
                                  • GetDC.USER32(?), ref: 00401E5D
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                  • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                  • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                  • String ID: Tahoma
                                  • API String ID: 3808545654-3580928618
                                  • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                  • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                  • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                  • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                  • MulDiv.KERNEL32(0007CAC4,?,0007CAC8), ref: 00402E90
                                  • wsprintfA.USER32 ref: 00402EA0
                                  • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                  Strings
                                  • verifying installer: %d%%, xrefs: 00402E9A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                  • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                  • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                  • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                  APIs
                                  • GlobalFree.KERNEL32(00000000), ref: 6D3824D7
                                    • Part of subcall function 6D3812B4: lstrcpynA.KERNEL32(00000000,?,6D38135F,-6D38504B,6D3811C0,-000000A0), ref: 6D3812C4
                                  • GlobalAlloc.KERNEL32(?,?), ref: 6D382452
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6D382467
                                  • GlobalAlloc.KERNEL32(?,?), ref: 6D382478
                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 6D382486
                                  • GlobalFree.KERNEL32(00000000), ref: 6D38248D
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                  • String ID:
                                  • API String ID: 3730416702-0
                                  • Opcode ID: a9725c660c2c1b48a33ba18dcf22c71a51508ef65b983e8c9fc410ad095074ae
                                  • Instruction ID: 9131888a77746b1954c5d4c85c065b6b6808759d73ad35b12b91edc79055b4c0
                                  • Opcode Fuzzy Hash: a9725c660c2c1b48a33ba18dcf22c71a51508ef65b983e8c9fc410ad095074ae
                                  • Instruction Fuzzy Hash: F041DFB5508341EFD7208F28DA40B2AB3FCFB46312F11892AF696DB582E7B09544CB71
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: FreeGlobal
                                  • String ID:
                                  • API String ID: 2979337801-0
                                  • Opcode ID: 4490fa5a4bd324cc5117bb2d6f361d047ceac384397fde46d9841ff54c9b37f0
                                  • Instruction ID: c7c26de658164d3fd6a8f77f7eb912d2ab06b85254f6915326feb257ae03ec26
                                  • Opcode Fuzzy Hash: 4490fa5a4bd324cc5117bb2d6f361d047ceac384397fde46d9841ff54c9b37f0
                                  • Instruction Fuzzy Hash: 48513976D18117AEDB918FB8C58167EBBB9BF46344F01856AD570E3103C33BDA8187A1
                                  APIs
                                  • GetDlgItem.USER32(?,?), ref: 00401DA3
                                  • GetClientRect.USER32(?,?), ref: 00401DF1
                                  • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                  • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                  • DeleteObject.GDI32(00000000), ref: 00401E45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                  • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                  • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                  • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                  APIs
                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                  • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                  • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                  • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                  APIs
                                  • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,-00430000), ref: 00404C14
                                  • wsprintfA.USER32 ref: 00404C1C
                                  • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s
                                  • API String ID: 3540041739-3551169577
                                  • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                  • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                  • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                  • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                  APIs
                                    • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,Traveskoens Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                    • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405CC6
                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405D60
                                  • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,774D3410,C:\Users\user\AppData\Local\Temp\), ref: 00405D70
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsvEA82.tmp
                                  • API String ID: 3248276644-3172172945
                                  • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                  • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                  • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                  • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                  APIs
                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C25
                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C2E
                                  • lstrcatA.KERNEL32(?,0040A014,?,?,0000000A,?), ref: 00405C3F
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C1F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrcatlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 2659869361-2145255484
                                  • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                  • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                  • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                  • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                  APIs
                                  • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,C:\Users\user\AppData\Local\Temp\nsvEA82.tmp,774D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,774D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405CC6
                                  • CharNextA.USER32(00000000), ref: 00405CCB
                                  • CharNextA.USER32(00000000), ref: 00405CDF
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsvEA82.tmp, xrefs: 00405CB9
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CharNext
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsvEA82.tmp
                                  • API String ID: 3213498283-1605232751
                                  • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                  • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                  • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                  • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,004030AB,00000001,?,?,00403722,?,?,?,0000000A,?), ref: 00402EE0
                                  • GetTickCount.KERNEL32 ref: 00402EFE
                                  • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                  • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,?,0000000A,?), ref: 00402F29
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                  • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                  • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                  • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 00405374
                                  • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                    • Part of subcall function 00404379: SendMessageA.USER32(0001047A,00000000,00000000,00000000), ref: 0040438B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                  • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                  • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                  • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                  APIs
                                  • FreeLibrary.KERNEL32(6D380000,774D3410,00000000,C:\Users\user\AppData\Local\Temp\,004039D9,004037BF,?,?,?,0000000A,?), ref: 00403A1B
                                  • GlobalFree.KERNEL32(0074F220), ref: 00403A22
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A01
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Free$GlobalLibrary
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 1100898210-2145255484
                                  • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                  • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                  • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                  • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                  APIs
                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A), ref: 00405C6C
                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrlen
                                  • String ID: C:\Users\user\Desktop
                                  • API String ID: 2709904686-3080008178
                                  • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                  • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                  • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                  • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                  APIs
                                  • GlobalAlloc.KERNEL32(?,?), ref: 6D38116B
                                  • GlobalAlloc.KERNEL32(?,?), ref: 6D3811D8
                                  • GlobalFree.KERNEL32(?), ref: 6D381286
                                  • GlobalFree.KERNEL32(00000000), ref: 6D38129B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3743326317.000000006D381000.00000020.00000001.01000000.00000008.sdmp, Offset: 6D380000, based on PE: true
                                  • Associated: 00000000.00000002.3743303493.000000006D380000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743345174.000000006D384000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  • Associated: 00000000.00000002.3743363989.000000006D386000.00000002.00000001.01000000.00000008.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_6d380000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree
                                  • String ID:
                                  • API String ID: 3394109436-0
                                  • Opcode ID: 8efe88b3584c85a8faec41a2506bb37ffca06d3a341c4732e23ecad98442f4aa
                                  • Instruction ID: dda3a4caf3cb5c3f6d38f72f062c474216bf427525c3c73bffd54ee831d2b2b4
                                  • Opcode Fuzzy Hash: 8efe88b3584c85a8faec41a2506bb37ffca06d3a341c4732e23ecad98442f4aa
                                  • Instruction Fuzzy Hash: 8351C0B5504386AFDB01CF68C885B76BBFCFB4B386B044059E666DB216D731D900CB91
                                  APIs
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                  • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.3737669340.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.3737638617.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737696771.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737719938.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.3737905990.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                  • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                  • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                  • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C