Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe

Overview

General Information

Sample name:COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
Analysis ID:1489834
MD5:6bbfded2baa5a18cc97d10516ee91c78
SHA1:9e39944c9d057d134b119c677be07975704e546e
SHA256:636597dd8c59135be43119197ee60db2268abaa5d8a60f4c0ac296acd9dc444f
Tags:DHLexeFormbook
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Drops script at startup location
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Query firmware table information (likely to detect VMs)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates processes with suspicious names
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
One or more processes crash
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe (PID: 3284 cmdline: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe" MD5: 6BBFDED2BAA5A18CC97D10516EE91C78)
    • name.exe (PID: 3700 cmdline: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe" MD5: 6BBFDED2BAA5A18CC97D10516EE91C78)
      • svchost.exe (PID: 2768 cmdline: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • explorer.exe (PID: 4084 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
          • explorer.exe (PID: 4132 cmdline: "C:\Windows\SysWOW64\explorer.exe" MD5: DD6597597673F72E10C9DE7901FBA0A8)
            • cmd.exe (PID: 6764 cmdline: /c del "C:\Windows\SysWOW64\svchost.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 6768 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • explorer.exe (PID: 6296 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
          • wscript.exe (PID: 7020 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
            • name.exe (PID: 2100 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 6BBFDED2BAA5A18CC97D10516EE91C78)
              • svchost.exe (PID: 6680 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
          • mstsc.exe (PID: 4640 cmdline: "C:\Windows\SysWOW64\mstsc.exe" MD5: EA4A02BE14C405327EEBA8D9AD2BD42C)
          • WerFault.exe (PID: 6212 cmdline: C:\Windows\system32\WerFault.exe -u -p 4084 -s 7332 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
{"C2 list": ["www.weight-loss-003.today/jd21/"], "decoy": ["bankownedproperties-0.bond", "slab-leak-repair-74697.bond", "tvtwenty20sr.top", "scw-iot.net", "circusenergy.online", "030002787.xyz", "propertiesforrentus11.bond", "defi-banksystem.online", "gkbet168.net", "joycasino-ed46.top", "sctttc-or.top", "borghardt.xyz", "therealtorpeddler.info", "macexpress.online", "bobbyharvey.store", "dating-dd-de.info", "thetrue.one", "alqahtani.site", "mahlubini.africa", "truck-driver-jobs-42274.bond", "packaging-services-17231.xyz", "badcreditloans59.xyz", "cellphonesfxw.today", "applyzentavra.com", "basscolofers.shop", "knee-pain-treatment-140741.xyz", "saltyfashion.shop", "quantive.tech", "cldvpn.sbs", "bolehapasaja16.shop", "nextdoor3.store", "forklift-jobs-29768.bond", "pools-99305.bond", "3780.cyou", "solveiterzsolutions.fun", "key-ring.xyz", "replyingendoplasmed.pro", "infanbs.shop", "apple0ficial-ld.info", "stress-relief-44110.bond", "r86gd377hi.rent", "lww20.top", "apartments-for-rent-series.sbs", "emiratesnseic.top", "senior-living-25596.bond", "hostease.cloud", "walk-in-tubs-30303.bond", "childrenfirstcenter.xyz", "45941978.top", "pw7-golden-painting-ldm.lat", "0yf.com", "tyumk.xyz", "utopartses.com", "hearing-aids-77773.bond", "frametoryframes.shop", "mvtb.pics", "speeddeals.online", "cyber-eu.digital", "hm23s.top", "pools-80761.bond", "2002w.app", "authentication-app-69447.bond", "legendhud.shop", "xmld101.icu"]}
SourceRuleDescriptionAuthorStrings
00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cb90:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b8f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c8fa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18819:$sqlite3step: 68 34 1C 7B E1
      • 0x1892c:$sqlite3step: 68 34 1C 7B E1
      • 0x18848:$sqlite3text: 68 38 2A 90 C5
      • 0x1896d:$sqlite3text: 68 38 2A 90 C5
      • 0x1885b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18983:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 61 entries
      SourceRuleDescriptionAuthorStrings
      9.2.name.exe.b50000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        9.2.name.exe.b50000.1.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          9.2.name.exe.b50000.1.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x5451:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1bd90:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x9bcf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x14ab7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          9.2.name.exe.b50000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x143a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b2f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x979a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1361c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa493:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1aaf7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bafa:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          9.2.name.exe.b50000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17a19:$sqlite3step: 68 34 1C 7B E1
          • 0x17b2c:$sqlite3step: 68 34 1C 7B E1
          • 0x17a48:$sqlite3text: 68 38 2A 90 C5
          • 0x17b6d:$sqlite3text: 68 38 2A 90 C5
          • 0x17a5b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17b83:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 35 entries

          System Summary

          barindex
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 4084, ParentProcessName: explorer.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 7020, ProcessName: wscript.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", CommandLine: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", CommandLine|base64offset|contains: N !, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", ParentImage: C:\Users\user\AppData\Local\directory\name.exe, ParentProcessId: 3700, ParentProcessName: name.exe, ProcessCommandLine: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", ProcessId: 2768, ProcessName: svchost.exe
          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 4084, ParentProcessName: explorer.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 7020, ProcessName: wscript.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", CommandLine: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", CommandLine|base64offset|contains: N !, Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", ParentImage: C:\Users\user\AppData\Local\directory\name.exe, ParentProcessId: 3700, ParentProcessName: name.exe, ProcessCommandLine: "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe", ProcessId: 2768, ProcessName: svchost.exe

          Data Obfuscation

          barindex
          Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 3700, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
          Timestamp:2024-08-08T07:42:07.576537+0200
          SID:2031453
          Severity:1
          Source Port:49710
          Destination Port:80
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-08T07:41:02.068628+0200
          SID:2031453
          Severity:1
          Source Port:49742
          Destination Port:80
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected
          Timestamp:2024-08-08T07:42:54.485193+0200
          SID:2031453
          Severity:1
          Source Port:49732
          Destination Port:80
          Protocol:TCP
          Classtype:Malware Command and Control Activity Detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://www.emiratesnseic.top/jd21/Avira URL Cloud: Label: malware
          Source: http://www.apple0ficial-ld.info/jd21/FwAvira URL Cloud: Label: malware
          Source: http://www.propertiesforrentus11.bond/jd21/Avira URL Cloud: Label: phishing
          Source: http://www.propertiesforrentus11.bond/jd21/www.tyumk.xyzAvira URL Cloud: Label: phishing
          Source: http://www.emiratesnseic.top/jd21/www.030002787.xyzAvira URL Cloud: Label: malware
          Source: http://www.frametoryframes.shop/jd21/www.dating-dd-de.infoAvira URL Cloud: Label: malware
          Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.weight-loss-003.today/jd21/"], "decoy": ["bankownedproperties-0.bond", "slab-leak-repair-74697.bond", "tvtwenty20sr.top", "scw-iot.net", "circusenergy.online", "030002787.xyz", "propertiesforrentus11.bond", "defi-banksystem.online", "gkbet168.net", "joycasino-ed46.top", "sctttc-or.top", "borghardt.xyz", "therealtorpeddler.info", "macexpress.online", "bobbyharvey.store", "dating-dd-de.info", "thetrue.one", "alqahtani.site", "mahlubini.africa", "truck-driver-jobs-42274.bond", "packaging-services-17231.xyz", "badcreditloans59.xyz", "cellphonesfxw.today", "applyzentavra.com", "basscolofers.shop", "knee-pain-treatment-140741.xyz", "saltyfashion.shop", "quantive.tech", "cldvpn.sbs", "bolehapasaja16.shop", "nextdoor3.store", "forklift-jobs-29768.bond", "pools-99305.bond", "3780.cyou", "solveiterzsolutions.fun", "key-ring.xyz", "replyingendoplasmed.pro", "infanbs.shop", "apple0ficial-ld.info", "stress-relief-44110.bond", "r86gd377hi.rent", "lww20.top", "apartments-for-rent-series.sbs", "emiratesnseic.top", "senior-living-25596.bond", "hostease.cloud", "walk-in-tubs-30303.bond", "childrenfirstcenter.xyz", "45941978.top", "pw7-golden-painting-ldm.lat", "0yf.com", "tyumk.xyz", "utopartses.com", "hearing-aids-77773.bond", "frametoryframes.shop", "mvtb.pics", "speeddeals.online", "cyber-eu.digital", "hm23s.top", "pools-80761.bond", "2002w.app", "authentication-app-69447.bond", "legendhud.shop", "xmld101.icu"]}
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeJoe Sandbox ML: detected
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: Binary string: explorer.pdbUGP source: svchost.exe, 00000003.00000003.1510322479.0000000005F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1508016117.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2667304367.0000000000530000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1447006703.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1448663351.0000000004040000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1512120743.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1451455558.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1512120743.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1449707067.0000000003800000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.0000000005370000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.000000000550E000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1512748826.0000000005018000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1514643940.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, name.exe, 00000009.00000003.1585809461.0000000003460000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1587047954.0000000003600000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1591635154.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1589838750.0000000003600000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1632870881.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1625486793.000000000491A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1447006703.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1448663351.0000000004040000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1512120743.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1451455558.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1512120743.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1449707067.0000000003800000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.0000000005370000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.000000000550E000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1512748826.0000000005018000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1514643940.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, name.exe, 00000009.00000003.1585809461.0000000003460000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1587047954.0000000003600000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1591635154.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1589838750.0000000003600000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1632870881.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1625486793.000000000491A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mstsc.pdbGCTL source: svchost.exe, 0000000A.00000003.1623794995.0000000005700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1624185049.0000000005900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1631509443.0000000005610000.00000040.10000000.00040000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1634982577.0000000000910000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: explorer.pdb source: svchost.exe, 00000003.00000003.1510322479.0000000005F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1508016117.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2667304367.0000000000530000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdb source: explorer.exe, 00000004.00000002.2357034825.0000000010A5F000.00000004.80000000.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2683028624.000000000336B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2686373132.00000000058BF000.00000004.10000000.00040000.00000000.sdmp, explorer.exe, 00000015.00000002.2692699255.000000000A24F000.00000004.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdbUGP source: explorer.exe, 00000004.00000002.2357034825.0000000010A5F000.00000004.80000000.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2683028624.000000000336B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2686373132.00000000058BF000.00000004.10000000.00040000.00000000.sdmp, explorer.exe, 00000015.00000002.2692699255.000000000A24F000.00000004.80000000.00040000.00000000.sdmp
          Source: Binary string: mstsc.pdb source: svchost.exe, 0000000A.00000003.1623794995.0000000005700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1624185049.0000000005900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1631509443.0000000005610000.00000040.10000000.00040000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1634982577.0000000000910000.00000040.80000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046DBBE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0043C2A2 FindFirstFileExW,0_2_0043C2A2
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004768EE FindFirstFileW,FindClose,0_2_004768EE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0047698F
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0046D076
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0046D3A9
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00479642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00479642
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0047979D
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00479B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00479B2B
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00475C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00475C97
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0068DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_0068DBBE
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0065C2A2 FindFirstFileExW,2_2_0065C2A2
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006968EE FindFirstFileW,FindClose,2_2_006968EE
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0069698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_0069698F
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0068D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0068D076
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0068D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0068D3A9
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00699642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00699642
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0069979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0069979D
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00699B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00699B2B
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00695C97 FindFirstFileW,FindNextFileW,FindClose,2_2_00695C97
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then pop ebx3_2_00407B1A

          Networking

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 185.53.179.91 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.23.184.95 80
          Source: Malware configuration extractorURLs: www.weight-loss-003.today/jd21/
          Source: DNS query: www.borghardt.xyz
          Source: global trafficHTTP traffic detected: GET /jd21/?uzud=6Gu9CMF4xxBwNWcJ0Rc7SYqx+yd/BzhFIF9ofXjjgiHpTqtqGAdfmqUQNhv6VtLeomt1&IjBDz2=9rAhxBy0 HTTP/1.1Host: www.authentication-app-69447.bondConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /jd21/?FPTX=E8EgvcVhhAQQFir9OK6E+Mqm7tqMiVehFrZTPh8pbZDzIj0aN6RyatkqXtPCo6PBps4o&BlO=O0DXpF3H2 HTTP/1.1Host: www.hm23s.topConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 185.53.179.91 185.53.179.91
          Source: Joe Sandbox ViewASN Name: TEAMINTERNET-ASDE TEAMINTERNET-ASDE
          Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0047CE44
          Source: global trafficHTTP traffic detected: GET /jd21/?uzud=6Gu9CMF4xxBwNWcJ0Rc7SYqx+yd/BzhFIF9ofXjjgiHpTqtqGAdfmqUQNhv6VtLeomt1&IjBDz2=9rAhxBy0 HTTP/1.1Host: www.authentication-app-69447.bondConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /jd21/?FPTX=E8EgvcVhhAQQFir9OK6E+Mqm7tqMiVehFrZTPh8pbZDzIj0aN6RyatkqXtPCo6PBps4o&BlO=O0DXpF3H2 HTTP/1.1Host: www.hm23s.topConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficDNS traffic detected: DNS query: www.45941978.top
          Source: global trafficDNS traffic detected: DNS query: www.authentication-app-69447.bond
          Source: global trafficDNS traffic detected: DNS query: www.borghardt.xyz
          Source: global trafficDNS traffic detected: DNS query: api.msn.com
          Source: global trafficDNS traffic detected: DNS query: www.hm23s.top
          Source: global trafficDNS traffic detected: DNS query: www.alqahtani.site
          Source: explorer.exe, 00000004.00000003.2284163975.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2401347592.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: explorer.exe, 00000004.00000003.2284163975.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2401347592.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000004.00000003.2284163975.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2401347592.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: explorer.exe, 00000004.00000002.2343353135.0000000004405000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455411195.0000000004405000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ns.adobeS
          Source: explorer.exe, 00000004.00000003.2284163975.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.000000000926A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2401347592.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000004.00000000.1457725429.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.00000000090DA000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000004.00000002.2345504981.0000000007720000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000002.2341720057.0000000002C80000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000002.2345469427.0000000007710000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.030002787.xyz
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.030002787.xyz/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.030002787.xyz/jd21/www.joycasino-ed46.top
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.030002787.xyzReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2002w.app
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2002w.app/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2002w.app/jd21/www.propertiesforrentus11.bond
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.2002w.appReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.45941978.top
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.45941978.top/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.45941978.top/jd21/www.authentication-app-69447.bond
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.45941978.topReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.alqahtani.site
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.alqahtani.site/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.alqahtani.site/jd21/www.circusenergy.online
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.alqahtani.siteReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apple0ficial-ld.info
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apple0ficial-ld.info/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apple0ficial-ld.info/jd21/Fw
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apple0ficial-ld.infoReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.authentication-app-69447.bond
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.authentication-app-69447.bond/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.authentication-app-69447.bond/jd21/www.borghardt.xyz
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.authentication-app-69447.bond/jd21/www.cellphonesfxw.today
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.authentication-app-69447.bondReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.badcreditloans59.xyz
          Source: explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.badcreditloans59.xyz/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.badcreditloans59.xyzReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.borghardt.xyz
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.borghardt.xyz/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.borghardt.xyz/jd21/www.weight-loss-003.today
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.borghardt.xyzReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cellphonesfxw.today
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cellphonesfxw.today/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cellphonesfxw.today/jd21/www.pools-99305.bond
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cellphonesfxw.todayReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.circusenergy.online
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.circusenergy.online/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.circusenergy.online/jd21/www.forklift-jobs-29768.bond
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.circusenergy.onlineReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dating-dd-de.info
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dating-dd-de.info/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dating-dd-de.info/jd21/www.mvtb.pics
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dating-dd-de.infoReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.emiratesnseic.top
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.emiratesnseic.top/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.emiratesnseic.top/jd21/www.030002787.xyz
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.emiratesnseic.topReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.forklift-jobs-29768.bond
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.forklift-jobs-29768.bond/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.forklift-jobs-29768.bond/jd21/www.tyumk.xyz
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.forklift-jobs-29768.bondReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.frametoryframes.shop
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.frametoryframes.shop/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.frametoryframes.shop/jd21/www.dating-dd-de.info
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.frametoryframes.shopReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.gkbet168.net
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.gkbet168.net/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.gkbet168.net/jd21/www.sctttc-or.top
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.gkbet168.netReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.hm23s.top
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.hm23s.top/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.hm23s.top/jd21/www.alqahtani.site
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.hm23s.topReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.joycasino-ed46.top
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.joycasino-ed46.top/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.joycasino-ed46.top/jd21/www.xmld101.icu
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.joycasino-ed46.topReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mahlubini.africa
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mahlubini.africa/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mahlubini.africa/jd21/www.weight-loss-003.today
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mahlubini.africaReferer:
          Source: explorer.exe, 00000015.00000003.2419145359.000000000C102000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
          Source: explorer.exe, 00000004.00000000.1457725429.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.0000000009237000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.c
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mvtb.pics
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mvtb.pics/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mvtb.pics/jd21/www.2002w.app
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mvtb.pics/jd21/www.apple0ficial-ld.info
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mvtb.picsReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nextdoor3.store
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nextdoor3.store/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nextdoor3.store/jd21/www.frametoryframes.shop
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.nextdoor3.storeReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pools-99305.bond
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pools-99305.bond/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pools-99305.bond/jd21/www.gkbet168.net
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pools-99305.bondReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.propertiesforrentus11.bond
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.propertiesforrentus11.bond/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.propertiesforrentus11.bond/jd21/www.tyumk.xyz
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.propertiesforrentus11.bondReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sctttc-or.top
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sctttc-or.top/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sctttc-or.top/jd21/www.solveiterzsolutions.fun
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sctttc-or.topReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.solveiterzsolutions.fun
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.solveiterzsolutions.fun/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.solveiterzsolutions.fun/jd21/www.mahlubini.africa
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.solveiterzsolutions.funReferer:
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.therealtorpeddler.info
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.therealtorpeddler.info/jd21/
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.therealtorpeddler.info/jd21/www.authentication-app-69447.bond
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.therealtorpeddler.infoReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tyumk.xyz
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tyumk.xyz/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tyumk.xyz/jd21/www.badcreditloans59.xyz
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tyumk.xyz/jd21/www.therealtorpeddler.info
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.tyumk.xyzReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.weight-loss-003.today
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.weight-loss-003.today/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.weight-loss-003.today/jd21/www.emiratesnseic.top
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.weight-loss-003.today/jd21/www.mvtb.pics
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.weight-loss-003.todayReferer:
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xmld101.icu
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xmld101.icu/jd21/
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xmld101.icu/jd21/www.nextdoor3.store
          Source: explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xmld101.icuReferer:
          Source: explorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
          Source: explorer.exe, 00000004.00000002.2355211941.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppaBg
          Source: explorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2355211941.000000000C0FD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: explorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSA4
          Source: explorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOSd
          Source: explorer.exe, 00000004.00000002.2355211941.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS~
          Source: explorer.exe, 00000004.00000002.2344169455.0000000007046000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.000000000702D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286380844.0000000007043000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000004.00000000.1457725429.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.0000000009239000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=0E948A694F8C48079B908C8EA9DDF9EA&timeOut=5000&oc
          Source: explorer.exe, 00000004.00000003.2284163975.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397384870.000000000926A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000004.00000003.2284163975.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2399125053.0000000007674000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.0000000007674000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Teaser/recordhigh.svg
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gK4J
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gK4J-dark
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA-dark
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMhz-dark
          Source: explorer.exe, 00000004.00000002.2351312373.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1464190970.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1b2aMG.img
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1hGNsX.img
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAT0qC2.img
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzME7S.img
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYTL1i.img
          Source: explorer.exe, 00000004.00000002.2351312373.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1464190970.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2401347592.0000000009274000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
          Source: explorer.exe, 00000004.00000002.2351312373.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1464190970.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.comer
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
          Source: explorer.exe, 00000004.00000000.1464190970.000000000BDF5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/EM0
          Source: explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
          Source: explorer.exe, 00000004.00000002.2351312373.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1464190970.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com48
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/foodanddrink/foodnews/black-slimy-matter-on-mint-leaves-toxic-chemicals-ne
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/personalfinance/the-no-1-phrase-people-who-are-good-at-small-talk-al
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/trump-campaign-says-he-raised-more-than-45-million-in-3rd-qu
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/who-is-andy-biggs-what-to-know-about-the-arizona-republican-
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/predicting-what-the-pac-12-would-look-like-after-expansion-wi
          Source: explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/stop-planting-new-forests-scientists-say/ar-AA1hFI09
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
          Source: explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0047EAFF
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0047ED6A
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0069ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_0069ED6A
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0047EAFF
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0046AA57
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00499576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00499576
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006B9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_006B9576

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: name.exe PID: 3700, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: svchost.exe PID: 2768, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: explorer.exe PID: 4132, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: name.exe PID: 2100, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: svchost.exe PID: 6680, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: mstsc.exe PID: 4640, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe, 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e916afc1-e
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe, 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d02c7f73-5
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe, 00000000.00000003.1431920314.0000000003791000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_42676e2a-3
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe, 00000000.00000003.1431920314.0000000003791000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4349cbd9-b
          Source: name.exeString found in binary or memory: This is a third-party compiled AutoIt script.
          Source: name.exe, 00000002.00000000.1432252125.00000000006E2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_db035e93-8
          Source: name.exe, 00000002.00000000.1432252125.00000000006E2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7da88d46-1
          Source: name.exe, 00000009.00000002.1590364793.00000000006E2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_066e17a3-4
          Source: name.exe, 00000009.00000002.1590364793.00000000006E2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dedc5070-2
          Source: initial sampleStatic PE information: Filename: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A330 NtCreateFile,3_2_0041A330
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A3E0 NtReadFile,3_2_0041A3E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A460 NtClose,3_2_0041A460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A510 NtAllocateVirtualMemory,3_2_0041A510
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A3DA NtReadFile,3_2_0041A3DA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A45B NtClose,3_2_0041A45B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041A50A NtAllocateVirtualMemory,3_2_0041A50A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72BF0 NtAllocateVirtualMemory,LdrInitializeThunk,3_2_03C72BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72B60 NtClose,LdrInitializeThunk,3_2_03C72B60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72AD0 NtReadFile,LdrInitializeThunk,3_2_03C72AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72FE0 NtCreateFile,LdrInitializeThunk,3_2_03C72FE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72F90 NtProtectVirtualMemory,LdrInitializeThunk,3_2_03C72F90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72FB0 NtResumeThread,LdrInitializeThunk,3_2_03C72FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72F30 NtCreateSection,LdrInitializeThunk,3_2_03C72F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72E80 NtReadVirtualMemory,LdrInitializeThunk,3_2_03C72E80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,3_2_03C72EA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72DD0 NtDelayExecution,LdrInitializeThunk,3_2_03C72DD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72DF0 NtQuerySystemInformation,LdrInitializeThunk,3_2_03C72DF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72D10 NtMapViewOfSection,LdrInitializeThunk,3_2_03C72D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72D30 NtUnmapViewOfSection,LdrInitializeThunk,3_2_03C72D30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72CA0 NtQueryInformationToken,LdrInitializeThunk,3_2_03C72CA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C74340 NtSetContextThread,3_2_03C74340
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C74650 NtSuspendThread,3_2_03C74650
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72BE0 NtQueryValueKey,3_2_03C72BE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72B80 NtQueryInformationFile,3_2_03C72B80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72BA0 NtEnumerateValueKey,3_2_03C72BA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72AF0 NtWriteFile,3_2_03C72AF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72AB0 NtWaitForSingleObject,3_2_03C72AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72FA0 NtQuerySection,3_2_03C72FA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72F60 NtCreateProcessEx,3_2_03C72F60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72EE0 NtQueueApcThread,3_2_03C72EE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72E30 NtWriteVirtualMemory,3_2_03C72E30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72DB0 NtEnumerateKey,3_2_03C72DB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72D00 NtSetInformationFile,3_2_03C72D00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72CC0 NtQueryVirtualMemory,3_2_03C72CC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72CF0 NtOpenProcess,3_2_03C72CF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72C60 NtCreateKey,3_2_03C72C60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72C70 NtFreeVirtualMemory,3_2_03C72C70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72C00 NtQueryInformationProcess,3_2_03C72C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73090 NtSetValueKey,3_2_03C73090
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73010 NtOpenDirectoryObject,3_2_03C73010
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C735C0 NtCreateMutant,3_2_03C735C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C739B0 NtGetContextThread,3_2_03C739B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73D70 NtOpenThread,3_2_03C73D70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C73D10 NtOpenProcessToken,3_2_03C73D10
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCA036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,RtlQueueApcWow64Thread,NtResumeThread,NtClose,3_2_03BCA036
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCA042 NtQueryInformationProcess,3_2_03BCA042
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0046D5EB
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00461201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00461201
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0046E8F6
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0068E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_0068E8F6
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0040BF400_2_0040BF40
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004720460_2_00472046
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004080600_2_00408060
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004682980_2_00468298
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0043E4FF0_2_0043E4FF
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0043676B0_2_0043676B
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004948730_2_00494873
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0040CAF00_2_0040CAF0
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0042CAA00_2_0042CAA0
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0041CC390_2_0041CC39
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00436DD90_2_00436DD9
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0041B1190_2_0041B119
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004091C00_2_004091C0
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004213940_2_00421394
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004217060_2_00421706
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0042781B0_2_0042781B
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0041997D0_2_0041997D
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004079200_2_00407920
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004219B00_2_004219B0
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00427A4A0_2_00427A4A
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00421C770_2_00421C77
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00427CA70_2_00427CA7
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0048BE440_2_0048BE44
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00439EEE0_2_00439EEE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00421F320_2_00421F32
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_019A36400_2_019A3640
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006280602_2_00628060
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006920462_2_00692046
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006882982_2_00688298
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0065E4FF2_2_0065E4FF
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0065676B2_2_0065676B
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006B48732_2_006B4873
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0062CAF02_2_0062CAF0
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0064CAA02_2_0064CAA0
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0063CC392_2_0063CC39
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00656DD92_2_00656DD9
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0063B1192_2_0063B119
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006291C02_2_006291C0
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006413942_2_00641394
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006417062_2_00641706
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0064781B2_2_0064781B
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0063997D2_2_0063997D
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006279202_2_00627920
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006419B02_2_006419B0
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00647A4A2_2_00647A4A
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00641C772_2_00641C77
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00647CA72_2_00647CA7
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006ABE442_2_006ABE44
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00659EEE2_2_00659EEE
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0062BF402_2_0062BF40
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00641F322_2_00641F32
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_01DE36402_2_01DE3640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004010303_2_00401030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E0C03_2_0041E0C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E2AA3_2_0041E2AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E3343_2_0041E334
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041DBD23_2_0041DBD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041D5733_2_0041D573
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00402D883_2_00402D88
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00402D903_2_00402D90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00409E603_2_00409E60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041EE603_2_0041EE60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00409E1A3_2_00409E1A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E61E3_2_0041E61E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E6393_2_0041E639
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041DF123_2_0041DF12
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00402FB03_2_00402FB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F03_2_03C4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D003E63_2_03D003E6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA3523_2_03CFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC02C03_2_03CC02C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE02743_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF81CC3_2_03CF81CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF41A23_2_03CF41A2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D001AA3_2_03D001AA
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC81583_2_03CC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C301003_2_03C30100
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA1183_2_03CDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD20003_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3C7C03_2_03C3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C647503_2_03C64750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C407703_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5C6E03_2_03C5C6E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D005913_2_03D00591
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C405353_2_03C40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEE4F63_2_03CEE4F6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF24463_2_03CF2446
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE44203_2_03CE4420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF6BD73_2_03CF6BD7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFAB403_2_03CFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA803_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A03_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D0A9A63_2_03D0A9A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C569623_2_03C56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E8F03_2_03C6E8F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C268B83_2_03C268B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4A8403_2_03C4A840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C428403_2_03C42840
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32FC83_2_03C32FC8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4CFE03_2_03C4CFE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBEFA03_2_03CBEFA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB4F403_2_03CB4F40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C82F283_2_03C82F28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C60F303_2_03C60F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE2F303_2_03CE2F30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFEEDB3_2_03CFEEDB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C52E903_2_03C52E90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFCE933_2_03CFCE93
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40E593_2_03C40E59
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFEE263_2_03CFEE26
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3ADE03_2_03C3ADE0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C58DBF3_2_03C58DBF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4AD003_2_03C4AD00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDCD1F3_2_03CDCD1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30CF23_2_03C30CF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0CB53_2_03CE0CB5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40C003_2_03C40C00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C8739A3_2_03C8739A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2D34C3_2_03C2D34C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF132D3_2_03CF132D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5B2C03_2_03C5B2C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE12ED3_2_03CE12ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C452A03_2_03C452A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4B1B03_2_03C4B1B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7516C3_2_03C7516C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2F1723_2_03C2F172
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D0B16B3_2_03D0B16B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEF0CC3_2_03CEF0CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C470C03_2_03C470C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF70E93_2_03CF70E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFF0E03_2_03CFF0E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFF7B03_2_03CFF7B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF16CC3_2_03CF16CC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C856303_2_03C85630
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D095C33_2_03D095C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDD5B03_2_03CDD5B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF75713_2_03CF7571
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C314603_2_03C31460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFF43F3_2_03CFF43F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB5BF03_2_03CB5BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7DBF93_2_03C7DBF9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5FB803_2_03C5FB80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFB763_2_03CFFB76
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEDAC63_2_03CEDAC6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDDAAC3_2_03CDDAAC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C85AA03_2_03C85AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE1AA33_2_03CE1AA3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFA493_2_03CFFA49
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF7A463_2_03CF7A46
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB3A6C3_2_03CB3A6C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C499503_2_03C49950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5B9503_2_03C5B950
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD59103_2_03CD5910
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C438E03_2_03C438E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAD8003_2_03CAD800
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C03FD23_2_03C03FD2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C03FD53_2_03C03FD5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C41F923_2_03C41F92
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFFB13_2_03CFFFB1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFF093_2_03CFFF09
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C49EB03_2_03C49EB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5FDC03_2_03C5FDC0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C43D403_2_03C43D40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF1D5A3_2_03CF1D5A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF7D733_2_03CF7D73
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFFCF23_2_03CFFCF2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB9C323_2_03CB9C32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCA0363_2_03BCA036
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCB2323_2_03BCB232
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BC10823_2_03BC1082
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCE5CD3_2_03BCE5CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BC5B303_2_03BC5B30
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BC5B323_2_03BC5B32
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BC89123_2_03BC8912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BC2D023_2_03BC2D02
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: String function: 00420A30 appears 46 times
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: String function: 0041F9F2 appears 40 times
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: String function: 00409CB3 appears 31 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C87E54 appears 111 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03CBF290 appears 105 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C75130 appears 58 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03C2B970 appears 280 times
          Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03CAEA12 appears 86 times
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00640A30 appears 46 times
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 0063F9F2 appears 40 times
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00629CB3 appears 31 times
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4084 -s 7332
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
          Source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: name.exe PID: 3700, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: svchost.exe PID: 2768, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: explorer.exe PID: 4132, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: name.exe PID: 2100, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: svchost.exe PID: 6680, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: mstsc.exe PID: 4640, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@246/17@7/2
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004737B5 GetLastError,FormatMessageW,0_2_004737B5
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004610BF AdjustTokenPrivileges,CloseHandle,0_2_004610BF
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004616C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004616C3
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006810BF AdjustTokenPrivileges,CloseHandle,2_2_006810BF
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006816C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_006816C3
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004751CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_004751CD
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0048A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0048A67C
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047648E
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004042A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_004042A2
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeFile created: C:\Users\user\AppData\Local\directoryJump to behavior
          Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess4084
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6768:120:WilError_03
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeFile created: C:\Users\user\AppData\Local\Temp\autD446.tmpJump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\explorer.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\explorer.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeFile read: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe "C:\Windows\SysWOW64\explorer.exe"
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\svchost.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\directory\name.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mstsc.exe "C:\Windows\SysWOW64\mstsc.exe"
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 4084 -s 7332
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\explorer.exe explorer.exe
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\explorer.exe "C:\Windows\SysWOW64\explorer.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\mstsc.exe "C:\Windows\SysWOW64\mstsc.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\svchost.exe"Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: cdprt.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: mfsrcsnk.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: credui.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: cryptui.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: ktmw32.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: aepic.dll
          Source: C:\Windows\explorer.exeSection loaded: twinapi.dll
          Source: C:\Windows\explorer.exeSection loaded: userenv.dll
          Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dll
          Source: C:\Windows\explorer.exeSection loaded: powrprof.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
          Source: C:\Windows\explorer.exeSection loaded: dxgi.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
          Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\explorer.exeSection loaded: propsys.dll
          Source: C:\Windows\explorer.exeSection loaded: coremessaging.dll
          Source: C:\Windows\explorer.exeSection loaded: urlmon.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.storage.dll
          Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\explorer.exeSection loaded: wtsapi32.dll
          Source: C:\Windows\explorer.exeSection loaded: wininet.dll
          Source: C:\Windows\explorer.exeSection loaded: uxtheme.dll
          Source: C:\Windows\explorer.exeSection loaded: dwmapi.dll
          Source: C:\Windows\explorer.exeSection loaded: sspicli.dll
          Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\explorer.exeSection loaded: twinapi.appcore.dll
          Source: C:\Windows\explorer.exeSection loaded: ntmarta.dll
          Source: C:\Windows\explorer.exeSection loaded: cryptsp.dll
          Source: C:\Windows\explorer.exeSection loaded: wldp.dll
          Source: C:\Windows\explorer.exeSection loaded: iertutil.dll
          Source: C:\Windows\explorer.exeSection loaded: srvcli.dll
          Source: C:\Windows\explorer.exeSection loaded: netutils.dll
          Source: C:\Windows\explorer.exeSection loaded: umpdc.dll
          Source: C:\Windows\explorer.exeSection loaded: ninput.dll
          Source: C:\Windows\explorer.exeSection loaded: appresolver.dll
          Source: C:\Windows\explorer.exeSection loaded: bcp47langs.dll
          Source: C:\Windows\explorer.exeSection loaded: slc.dll
          Source: C:\Windows\explorer.exeSection loaded: sppc.dll
          Source: C:\Windows\explorer.exeSection loaded: profapi.dll
          Source: C:\Windows\explorer.exeSection loaded: onecoreuapcommonproxystub.dll
          Source: C:\Windows\explorer.exeSection loaded: starttiledata.dll
          Source: C:\Windows\explorer.exeSection loaded: idstore.dll
          Source: C:\Windows\explorer.exeSection loaded: usermgrcli.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryps.dll
          Source: C:\Windows\explorer.exeSection loaded: wlidprov.dll
          Source: C:\Windows\explorer.exeSection loaded: samcli.dll
          Source: C:\Windows\explorer.exeSection loaded: policymanager.dll
          Source: C:\Windows\explorer.exeSection loaded: msvcp110_win.dll
          Source: C:\Windows\explorer.exeSection loaded: usermgrproxy.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.applicationmodel.dll
          Source: C:\Windows\explorer.exeSection loaded: appxdeploymentclient.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.dll
          Source: C:\Windows\explorer.exeSection loaded: winsta.dll
          Source: C:\Windows\explorer.exeSection loaded: sndvolsso.dll
          Source: C:\Windows\explorer.exeSection loaded: mmdevapi.dll
          Source: C:\Windows\explorer.exeSection loaded: devobj.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.staterepositoryclient.dll
          Source: C:\Windows\explorer.exeSection loaded: oleacc.dll
          Source: C:\Windows\explorer.exeSection loaded: wintypes.dll
          Source: C:\Windows\explorer.exeSection loaded: textshaping.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.ui.dll
          Source: C:\Windows\explorer.exeSection loaded: windowmanagementapi.dll
          Source: C:\Windows\explorer.exeSection loaded: textinputframework.dll
          Source: C:\Windows\explorer.exeSection loaded: inputhost.dll
          Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dll
          Source: C:\Windows\explorer.exeSection loaded: coreuicomponents.dll
          Source: C:\Windows\explorer.exeSection loaded: windowscodecs.dll
          Source: C:\Windows\explorer.exeSection loaded: appextension.dll
          Source: C:\Windows\explorer.exeSection loaded: dcomp.dll
          Source: C:\Windows\explorer.exeSection loaded: d3d11.dll
          Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.cloudstore.schema.shell.dll
          Source: C:\Windows\explorer.exeSection loaded: d3d10warp.dll
          Source: C:\Windows\explorer.exeSection loaded: dxcore.dll
          Source: C:\Windows\explorer.exeSection loaded: d2d1.dll
          Source: C:\Windows\explorer.exeSection loaded: dwrite.dll
          Source: C:\Windows\explorer.exeSection loaded: xmllite.dll
          Source: C:\Windows\explorer.exeSection loaded: cldapi.dll
          Source: C:\Windows\explorer.exeSection loaded: fltlib.dll
          Source: C:\Windows\explorer.exeSection loaded: dataexchange.dll
          Source: C:\Windows\explorer.exeSection loaded: apphelp.dll
          Source: C:\Windows\explorer.exeSection loaded: tiledatarepository.dll
          Source: C:\Windows\explorer.exeSection loaded: staterepository.core.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.staterepository.dll
          Source: C:\Windows\explorer.exeSection loaded: explorerframe.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorycore.dll
          Source: C:\Windows\explorer.exeSection loaded: mrmcorer.dll
          Source: C:\Windows\explorer.exeSection loaded: languageoverlayutil.dll
          Source: C:\Windows\explorer.exeSection loaded: bcp47mrm.dll
          Source: C:\Windows\explorer.exeSection loaded: twinui.pcshell.dll
          Source: C:\Windows\explorer.exeSection loaded: wkscli.dll
          Source: C:\Windows\explorer.exeSection loaded: wincorlib.dll
          Source: C:\Windows\explorer.exeSection loaded: cdp.dll
          Source: C:\Windows\explorer.exeSection loaded: dsreg.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.immersiveshell.serviceprovider.dll
          Source: C:\Windows\explorer.exeSection loaded: thumbcache.dll
          Source: C:\Windows\explorer.exeSection loaded: edputil.dll
          Source: C:\Windows\explorer.exeSection loaded: onecorecommonproxystub.dll
          Source: C:\Windows\explorer.exeSection loaded: photometadatahandler.dll
          Source: C:\Windows\explorer.exeSection loaded: ntshrui.dll
          Source: C:\Windows\explorer.exeSection loaded: cscapi.dll
          Source: C:\Windows\explorer.exeSection loaded: linkinfo.dll
          Source: C:\Windows\explorer.exeSection loaded: ehstorshell.dll
          Source: C:\Windows\explorer.exeSection loaded: cscui.dll
          Source: C:\Windows\explorer.exeSection loaded: provsvc.dll
          Source: C:\Windows\explorer.exeSection loaded: twinui.appcore.dll
          Source: C:\Windows\explorer.exeSection loaded: twinui.dll
          Source: C:\Windows\explorer.exeSection loaded: pdh.dll
          Source: C:\Windows\explorer.exeSection loaded: applicationframe.dll
          Source: C:\Windows\explorer.exeSection loaded: rmclient.dll
          Source: C:\Windows\explorer.exeSection loaded: holographicextensions.dll
          Source: C:\Windows\explorer.exeSection loaded: virtualmonitormanager.dll
          Source: C:\Windows\explorer.exeSection loaded: resourcepolicyclient.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.ui.immersive.dll
          Source: C:\Windows\explorer.exeSection loaded: abovelockapphost.dll
          Source: C:\Windows\explorer.exeSection loaded: npsm.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.shell.bluelightreduction.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.web.dll
          Source: C:\Windows\explorer.exeSection loaded: mscms.dll
          Source: C:\Windows\explorer.exeSection loaded: coloradapterclient.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.internal.signals.dll
          Source: C:\Windows\explorer.exeSection loaded: tdh.dll
          Source: C:\Windows\explorer.exeSection loaded: cryptbase.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.staterepositorybroker.dll
          Source: C:\Windows\explorer.exeSection loaded: mfplat.dll
          Source: C:\Windows\explorer.exeSection loaded: rtworkq.dll
          Source: C:\Windows\explorer.exeSection loaded: taskflowdataengine.dll
          Source: C:\Windows\explorer.exeSection loaded: structuredquery.dll
          Source: C:\Windows\explorer.exeSection loaded: actxprxy.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.security.authentication.web.core.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.data.activities.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.system.launcher.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.shell.servicehostbuilder.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.internal.ui.shell.windowtabmanager.dll
          Source: C:\Windows\explorer.exeSection loaded: notificationcontrollerps.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.devices.enumeration.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.globalization.dll
          Source: C:\Windows\explorer.exeSection loaded: icu.dll
          Source: C:\Windows\explorer.exeSection loaded: mswb7.dll
          Source: C:\Windows\explorer.exeSection loaded: devdispitemprovider.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.networking.connectivity.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.ui.core.textinput.dll
          Source: C:\Windows\explorer.exeSection loaded: uianimation.dll
          Source: C:\Windows\explorer.exeSection loaded: windowsudk.shellcommon.dll
          Source: C:\Windows\explorer.exeSection loaded: dictationmanager.dll
          Source: C:\Windows\explorer.exeSection loaded: npmproxy.dll
          Source: C:\Windows\explorer.exeSection loaded: ondemandconnroutehelper.dll
          Source: C:\Windows\explorer.exeSection loaded: winhttp.dll
          Source: C:\Windows\explorer.exeSection loaded: mswsock.dll
          Source: C:\Windows\explorer.exeSection loaded: winnsi.dll
          Source: C:\Windows\explorer.exeSection loaded: dpapi.dll
          Source: C:\Windows\explorer.exeSection loaded: msasn1.dll
          Source: C:\Windows\explorer.exeSection loaded: rsaenh.dll
          Source: C:\Windows\explorer.exeSection loaded: dnsapi.dll
          Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dll
          Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dll
          Source: C:\Windows\explorer.exeSection loaded: schannel.dll
          Source: C:\Windows\explorer.exeSection loaded: mskeyprotect.dll
          Source: C:\Windows\explorer.exeSection loaded: ntasn1.dll
          Source: C:\Windows\explorer.exeSection loaded: ncrypt.dll
          Source: C:\Windows\explorer.exeSection loaded: ncryptsslp.dll
          Source: C:\Windows\explorer.exeSection loaded: gpapi.dll
          Source: C:\Windows\explorer.exeSection loaded: taskschd.dll
          Source: C:\Windows\explorer.exeSection loaded: stobject.dll
          Source: C:\Windows\explorer.exeSection loaded: wmiclnt.dll
          Source: C:\Windows\explorer.exeSection loaded: workfoldersshell.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.fileexplorer.common.dll
          Source: C:\Windows\explorer.exeSection loaded: pcshellcommonproxystub.dll
          Source: C:\Windows\explorer.exeSection loaded: execmodelproxy.dll
          Source: C:\Windows\explorer.exeSection loaded: daxexec.dll
          Source: C:\Windows\explorer.exeSection loaded: container.dll
          Source: C:\Windows\explorer.exeSection loaded: cryptngc.dll
          Source: C:\Windows\explorer.exeSection loaded: cflapi.dll
          Source: C:\Windows\explorer.exeSection loaded: shellcommoncommonproxystub.dll
          Source: C:\Windows\explorer.exeSection loaded: uiautomationcore.dll
          Source: C:\Windows\explorer.exeSection loaded: capabilityaccessmanagerclient.dll
          Source: C:\Windows\explorer.exeSection loaded: samlib.dll
          Source: C:\Windows\explorer.exeSection loaded: batmeter.dll
          Source: C:\Windows\explorer.exeSection loaded: sxs.dll
          Source: C:\Windows\explorer.exeSection loaded: inputswitch.dll
          Source: C:\Windows\explorer.exeSection loaded: es.dll
          Source: C:\Windows\explorer.exeSection loaded: prnfldr.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.ui.shell.dll
          Source: C:\Windows\explorer.exeSection loaded: wpnclient.dll
          Source: C:\Windows\explorer.exeSection loaded: atlthunk.dll
          Source: C:\Windows\explorer.exeSection loaded: dxp.dll
          Source: C:\Windows\explorer.exeSection loaded: shdocvw.dll
          Source: C:\Windows\explorer.exeSection loaded: audioses.dll
          Source: C:\Windows\explorer.exeSection loaded: syncreg.dll
          Source: C:\Windows\explorer.exeSection loaded: actioncenter.dll
          Source: C:\Windows\explorer.exeSection loaded: wevtapi.dll
          Source: C:\Windows\explorer.exeSection loaded: wscinterop.dll
          Source: C:\Windows\explorer.exeSection loaded: wscapi.dll
          Source: C:\Windows\explorer.exeSection loaded: werconcpl.dll
          Source: C:\Windows\explorer.exeSection loaded: framedynos.dll
          Source: C:\Windows\explorer.exeSection loaded: wer.dll
          Source: C:\Windows\explorer.exeSection loaded: hcproviders.dll
          Source: C:\Windows\explorer.exeSection loaded: pnidui.dll
          Source: C:\Windows\explorer.exeSection loaded: mobilenetworking.dll
          Source: C:\Windows\explorer.exeSection loaded: netprofm.dll
          Source: C:\Windows\explorer.exeSection loaded: networkuxbroker.dll
          Source: C:\Windows\explorer.exeSection loaded: ethernetmediamanager.dll
          Source: C:\Windows\explorer.exeSection loaded: wlanapi.dll
          Source: C:\Windows\explorer.exeSection loaded: ncsi.dll
          Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dll
          Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dll
          Source: C:\Windows\explorer.exeSection loaded: dusmapi.dll
          Source: C:\Windows\explorer.exeSection loaded: wpdshserviceobj.dll
          Source: C:\Windows\explorer.exeSection loaded: portabledevicetypes.dll
          Source: C:\Windows\explorer.exeSection loaded: portabledeviceapi.dll
          Source: C:\Windows\explorer.exeSection loaded: cscobj.dll
          Source: C:\Windows\explorer.exeSection loaded: srchadmin.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.storage.search.dll
          Source: C:\Windows\explorer.exeSection loaded: synccenter.dll
          Source: C:\Windows\explorer.exeSection loaded: imapi2.dll
          Source: C:\Windows\explorer.exeSection loaded: ieproxy.dll
          Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dll
          Source: C:\Windows\explorer.exeSection loaded: storageusage.dll
          Source: C:\Windows\explorer.exeSection loaded: fhcfg.dll
          Source: C:\Windows\explorer.exeSection loaded: efsutil.dll
          Source: C:\Windows\explorer.exeSection loaded: mpr.dll
          Source: C:\Windows\explorer.exeSection loaded: netapi32.dll
          Source: C:\Windows\explorer.exeSection loaded: dsrole.dll
          Source: C:\Windows\explorer.exeSection loaded: windows.internal.system.userprofile.dll
          Source: C:\Windows\explorer.exeSection loaded: cloudexperiencehostbroker.dll
          Source: C:\Windows\explorer.exeSection loaded: credui.dll
          Source: C:\Windows\explorer.exeSection loaded: dui70.dll
          Source: C:\Windows\explorer.exeSection loaded: wdscore.dll
          Source: C:\Windows\explorer.exeSection loaded: dbghelp.dll
          Source: C:\Windows\explorer.exeSection loaded: dbgcore.dll
          Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dll
          Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dll
          Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dll
          Source: C:\Windows\explorer.exeSection loaded: bluetoothapis.dll
          Source: C:\Windows\explorer.exeSection loaded: settingsync.dll
          Source: C:\Windows\explorer.exeSection loaded: settingsynccore.dll
          Source: C:\Windows\explorer.exeSection loaded: wpnapps.dll
          Source: C:\Windows\explorer.exeSection loaded: msxml6.dll
          Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{50CE75BC-766C-4136-BF5E-9197AA23569E}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic file information: File size 1145344 > 1048576
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: explorer.pdbUGP source: svchost.exe, 00000003.00000003.1510322479.0000000005F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1508016117.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2667304367.0000000000530000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: name.exe, 00000002.00000003.1447006703.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1448663351.0000000004040000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1512120743.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1451455558.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1512120743.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1449707067.0000000003800000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.0000000005370000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.000000000550E000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1512748826.0000000005018000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1514643940.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, name.exe, 00000009.00000003.1585809461.0000000003460000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1587047954.0000000003600000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1591635154.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1589838750.0000000003600000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1632870881.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1625486793.000000000491A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: name.exe, 00000002.00000003.1447006703.0000000003EA0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000002.00000003.1448663351.0000000004040000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000003.00000002.1512120743.0000000003C00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1451455558.0000000003A00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.1512120743.0000000003D9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1449707067.0000000003800000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.0000000005370000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2684825001.000000000550E000.00000040.00001000.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1512748826.0000000005018000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.1514643940.00000000051C4000.00000004.00000020.00020000.00000000.sdmp, name.exe, 00000009.00000003.1585809461.0000000003460000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000009.00000003.1587047954.0000000003600000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1591635154.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1627471777.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1589838750.0000000003600000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1632870881.0000000004ACD000.00000004.00000020.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004E1E000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1636234422.0000000004C80000.00000040.00001000.00020000.00000000.sdmp, mstsc.exe, 0000000B.00000003.1625486793.000000000491A000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mstsc.pdbGCTL source: svchost.exe, 0000000A.00000003.1623794995.0000000005700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1624185049.0000000005900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1631509443.0000000005610000.00000040.10000000.00040000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1634982577.0000000000910000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: explorer.pdb source: svchost.exe, 00000003.00000003.1510322479.0000000005F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1508016117.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2667304367.0000000000530000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdb source: explorer.exe, 00000004.00000002.2357034825.0000000010A5F000.00000004.80000000.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2683028624.000000000336B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2686373132.00000000058BF000.00000004.10000000.00040000.00000000.sdmp, explorer.exe, 00000015.00000002.2692699255.000000000A24F000.00000004.80000000.00040000.00000000.sdmp
          Source: Binary string: svchost.pdbUGP source: explorer.exe, 00000004.00000002.2357034825.0000000010A5F000.00000004.80000000.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.2683028624.000000000336B000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2686373132.00000000058BF000.00000004.10000000.00040000.00000000.sdmp, explorer.exe, 00000015.00000002.2692699255.000000000A24F000.00000004.80000000.00040000.00000000.sdmp
          Source: Binary string: mstsc.pdb source: svchost.exe, 0000000A.00000003.1623794995.0000000005700000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1624185049.0000000005900000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1631509443.0000000005610000.00000040.10000000.00040000.00000000.sdmp, mstsc.exe, 0000000B.00000002.1634982577.0000000000910000.00000040.80000000.00040000.00000000.sdmp
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004042DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004042DE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00420A76 push ecx; ret 0_2_00420A89
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00640A76 push ecx; ret 2_2_00640A89
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041F18F pushfd ; ret 3_2_0041F190
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00416A48 push ecx; ret 3_2_00416A4A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040E462 push C7DC0245h; retf 3_2_0040E46B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041D4D2 push eax; ret 3_2_0041D4D8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041D4DB push eax; ret 3_2_0041D542
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041D485 push eax; ret 3_2_0041D4D8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041D53C push eax; ret 3_2_0041D542
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E5FF push es; ret 3_2_0041E600
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041774B push edi; retf 3_2_00417755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C0225F pushad ; ret 3_2_03C027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C027FA pushad ; ret 3_2_03C027F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C309AD push ecx; mov dword ptr [esp], ecx3_2_03C309B6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C0283D push eax; iretd 3_2_03C02858
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C01368 push eax; iretd 3_2_03C01369
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C01065 push edi; ret 3_2_03C0108A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C018F3 push edx; iretd 3_2_03C01906
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCEB1E push esp; retn 0000h3_2_03BCEB1F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCEB02 push esp; retn 0000h3_2_03BCEB03
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03BCE9B5 push esp; retn 0000h3_2_03BCEAE7
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeFile created: \commercail invoice and dhl awb tracking details.exe
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeFile created: \commercail invoice and dhl awb tracking details.exeJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
          Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0041F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0041F98E
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00491C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00491C41
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0063F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_0063F98E
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006B1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_006B1C41
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\directory\name.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97284
          Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformation
          Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: 1DE3264
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD324
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFBCB7B0774
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFBCB7B0154
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD8A4
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFBCB7ADA44
          Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD1E4
          Source: C:\Users\user\AppData\Local\directory\name.exeAPI/Special instruction interceptor: Address: B43264
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD324
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7B0774
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD944
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD504
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD544
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD1E4
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7B0154
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7AD8A4
          Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: 7FFBCB7ADA44
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\svchost.exeRDTSC instruction interceptor: First address: 409B7E second address: 409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\explorer.exeRDTSC instruction interceptor: First address: 3209904 second address: 320990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\explorer.exeRDTSC instruction interceptor: First address: 3209B7E second address: 3209B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 2B19904 second address: 2B1990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\mstsc.exeRDTSC instruction interceptor: First address: 2B19B7E second address: 2B19B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\explorer.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00409AB0 rdtsc 3_2_00409AB0
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 2108Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 7829Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 854Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 834Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 794Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeWindow / User API: threadDelayed 9178Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 549
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 536
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeAPI coverage: 3.7 %
          Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 3.9 %
          Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 2.0 %
          Source: C:\Windows\explorer.exe TID: 3832Thread sleep time: -4216000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 3832Thread sleep time: -15658000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exe TID: 5672Thread sleep count: 794 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exe TID: 5672Thread sleep time: -1588000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exe TID: 5672Thread sleep count: 9178 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exe TID: 5672Thread sleep time: -18356000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046DBBE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0043C2A2 FindFirstFileExW,0_2_0043C2A2
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004768EE FindFirstFileW,FindClose,0_2_004768EE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0047698F
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0046D076
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0046D3A9
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00479642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00479642
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0047979D
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00479B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00479B2B
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00475C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00475C97
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0068DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_0068DBBE
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0065C2A2 FindFirstFileExW,2_2_0065C2A2
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006968EE FindFirstFileW,FindClose,2_2_006968EE
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0069698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_0069698F
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0068D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0068D076
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0068D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_0068D3A9
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00699642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00699642
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0069979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_0069979D
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00699B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00699B2B
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00695C97 FindFirstFileW,FindNextFileW,FindClose,2_2_00695C97
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004042DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004042DE
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
          Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
          Source: explorer.exe, 00000015.00000003.2397199751.0000000007739000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual USB Mouse
          Source: explorer.exe, 00000004.00000002.2346753313.0000000009330000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}F
          Source: explorer.exe, 00000015.00000003.2441187379.000000000C2E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000D&@v
          Source: explorer.exe, 00000015.00000003.2441187379.000000000C2E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&Rs
          Source: explorer.exe, 00000004.00000002.2339985971.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00=
          Source: explorer.exe, 00000004.00000000.1457725429.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.0000000009255000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.00000000092A5000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.0000000009239000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397384870.0000000009244000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.00000000092A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000015.00000003.2441187379.000000000C2E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: explorer.exe, 00000004.00000000.1457725429.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.00000000090DA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000004.00000003.2284163975.000000000926A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
          Source: wscript.exe, 00000008.00000002.1575785785.0000026229712000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\~%vW9
          Source: explorer.exe, 00000004.00000000.1457725429.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.00000000090DA000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en\volume.inf_loc
          Source: explorer.exe, 00000004.00000002.2339985971.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000004.00000003.2284163975.000000000926A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTcaVMWare
          Source: explorer.exe, 00000015.00000003.2441187379.000000000C2E4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000@v
          Source: explorer.exe, 00000015.00000002.2689644828.0000000009009000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: NXTVMWare
          Source: explorer.exe, 00000015.00000002.2667973410.0000000000C50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000_IDENTIFIER=Intel64 Family 6 ModWs
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C17C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000$
          Source: explorer.exe, 00000015.00000002.2689644828.00000000090B0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2VMware Virtual USB MouseJC:\Windows\System32\DDORes.dll,-2212`yh
          Source: explorer.exe, 00000015.00000003.2397115154.0000000007741000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wsPVMware VMCI Bus Devicesdevicedesc%;VMware VMCI Bus Devicet\AppData\Local\M
          Source: explorer.exe, 00000015.00000002.2689644828.0000000009009000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\HarddiskVolume1\??\Volume{ad6cc5d8-f1a9-4873-be33-91b2f05e9306}\??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963Ds
          Source: wscript.exe, 00000008.00000002.1575785785.0000026229712000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]_
          Source: explorer.exe, 00000015.00000002.2667973410.0000000000C50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C287000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000er
          Source: explorer.exe, 00000015.00000002.2698810069.000000000C0CD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000004.00000002.2339985971.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\explorer.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\explorer.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\mstsc.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00409AB0 rdtsc 3_2_00409AB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040ACF0 LdrLoadDll,3_2_0040ACF0
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0047EAA2 BlockInput,0_2_0047EAA2
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00432622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00432622
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004042DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004042DE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00424CE8 mov eax, dword ptr fs:[00000030h]0_2_00424CE8
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_019A3530 mov eax, dword ptr fs:[00000030h]0_2_019A3530
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_019A34D0 mov eax, dword ptr fs:[00000030h]0_2_019A34D0
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_019A1E70 mov eax, dword ptr fs:[00000030h]0_2_019A1E70
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00644CE8 mov eax, dword ptr fs:[00000030h]2_2_00644CE8
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_01DE3530 mov eax, dword ptr fs:[00000030h]2_2_01DE3530
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_01DE34D0 mov eax, dword ptr fs:[00000030h]2_2_01DE34D0
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_01DE1E70 mov eax, dword ptr fs:[00000030h]2_2_01DE1E70
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEC3CD mov eax, dword ptr fs:[00000030h]3_2_03CEC3CD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A3C0 mov eax, dword ptr fs:[00000030h]3_2_03C3A3C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C383C0 mov eax, dword ptr fs:[00000030h]3_2_03C383C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB63C0 mov eax, dword ptr fs:[00000030h]3_2_03CB63C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov eax, dword ptr fs:[00000030h]3_2_03CDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov eax, dword ptr fs:[00000030h]3_2_03CDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov ecx, dword ptr fs:[00000030h]3_2_03CDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE3DB mov eax, dword ptr fs:[00000030h]3_2_03CDE3DB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD43D4 mov eax, dword ptr fs:[00000030h]3_2_03CD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD43D4 mov eax, dword ptr fs:[00000030h]3_2_03CD43D4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C403E9 mov eax, dword ptr fs:[00000030h]3_2_03C403E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03C4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03C4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E3F0 mov eax, dword ptr fs:[00000030h]3_2_03C4E3F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C663FF mov eax, dword ptr fs:[00000030h]3_2_03C663FF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E388 mov eax, dword ptr fs:[00000030h]3_2_03C2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E388 mov eax, dword ptr fs:[00000030h]3_2_03C2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E388 mov eax, dword ptr fs:[00000030h]3_2_03C2E388
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5438F mov eax, dword ptr fs:[00000030h]3_2_03C5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5438F mov eax, dword ptr fs:[00000030h]3_2_03C5438F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28397 mov eax, dword ptr fs:[00000030h]3_2_03C28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28397 mov eax, dword ptr fs:[00000030h]3_2_03C28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28397 mov eax, dword ptr fs:[00000030h]3_2_03C28397
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB2349 mov eax, dword ptr fs:[00000030h]3_2_03CB2349
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov ecx, dword ptr fs:[00000030h]3_2_03CB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB035C mov eax, dword ptr fs:[00000030h]3_2_03CB035C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA352 mov eax, dword ptr fs:[00000030h]3_2_03CFA352
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD8350 mov ecx, dword ptr fs:[00000030h]3_2_03CD8350
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D0634F mov eax, dword ptr fs:[00000030h]3_2_03D0634F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD437C mov eax, dword ptr fs:[00000030h]3_2_03CD437C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A30B mov eax, dword ptr fs:[00000030h]3_2_03C6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A30B mov eax, dword ptr fs:[00000030h]3_2_03C6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A30B mov eax, dword ptr fs:[00000030h]3_2_03C6A30B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C310 mov ecx, dword ptr fs:[00000030h]3_2_03C2C310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50310 mov ecx, dword ptr fs:[00000030h]3_2_03C50310
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D08324 mov eax, dword ptr fs:[00000030h]3_2_03D08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D08324 mov ecx, dword ptr fs:[00000030h]3_2_03D08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D08324 mov eax, dword ptr fs:[00000030h]3_2_03D08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D08324 mov eax, dword ptr fs:[00000030h]3_2_03D08324
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A2C3 mov eax, dword ptr fs:[00000030h]3_2_03C3A2C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D062D6 mov eax, dword ptr fs:[00000030h]3_2_03D062D6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402E1 mov eax, dword ptr fs:[00000030h]3_2_03C402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402E1 mov eax, dword ptr fs:[00000030h]3_2_03C402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402E1 mov eax, dword ptr fs:[00000030h]3_2_03C402E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E284 mov eax, dword ptr fs:[00000030h]3_2_03C6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E284 mov eax, dword ptr fs:[00000030h]3_2_03C6E284
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0283 mov eax, dword ptr fs:[00000030h]3_2_03CB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0283 mov eax, dword ptr fs:[00000030h]3_2_03CB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0283 mov eax, dword ptr fs:[00000030h]3_2_03CB0283
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402A0 mov eax, dword ptr fs:[00000030h]3_2_03C402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C402A0 mov eax, dword ptr fs:[00000030h]3_2_03C402A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov ecx, dword ptr fs:[00000030h]3_2_03CC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC62A0 mov eax, dword ptr fs:[00000030h]3_2_03CC62A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB8243 mov eax, dword ptr fs:[00000030h]3_2_03CB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB8243 mov ecx, dword ptr fs:[00000030h]3_2_03CB8243
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D0625D mov eax, dword ptr fs:[00000030h]3_2_03D0625D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A250 mov eax, dword ptr fs:[00000030h]3_2_03C2A250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36259 mov eax, dword ptr fs:[00000030h]3_2_03C36259
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA250 mov eax, dword ptr fs:[00000030h]3_2_03CEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA250 mov eax, dword ptr fs:[00000030h]3_2_03CEA250
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34260 mov eax, dword ptr fs:[00000030h]3_2_03C34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34260 mov eax, dword ptr fs:[00000030h]3_2_03C34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34260 mov eax, dword ptr fs:[00000030h]3_2_03C34260
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2826B mov eax, dword ptr fs:[00000030h]3_2_03C2826B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE0274 mov eax, dword ptr fs:[00000030h]3_2_03CE0274
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2823B mov eax, dword ptr fs:[00000030h]3_2_03C2823B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF61C3 mov eax, dword ptr fs:[00000030h]3_2_03CF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF61C3 mov eax, dword ptr fs:[00000030h]3_2_03CF61C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov ecx, dword ptr fs:[00000030h]3_2_03CAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE1D0 mov eax, dword ptr fs:[00000030h]3_2_03CAE1D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D061E5 mov eax, dword ptr fs:[00000030h]3_2_03D061E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C601F8 mov eax, dword ptr fs:[00000030h]3_2_03C601F8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C70185 mov eax, dword ptr fs:[00000030h]3_2_03C70185
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEC188 mov eax, dword ptr fs:[00000030h]3_2_03CEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEC188 mov eax, dword ptr fs:[00000030h]3_2_03CEC188
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4180 mov eax, dword ptr fs:[00000030h]3_2_03CD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4180 mov eax, dword ptr fs:[00000030h]3_2_03CD4180
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB019F mov eax, dword ptr fs:[00000030h]3_2_03CB019F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A197 mov eax, dword ptr fs:[00000030h]3_2_03C2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A197 mov eax, dword ptr fs:[00000030h]3_2_03C2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A197 mov eax, dword ptr fs:[00000030h]3_2_03C2A197
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov ecx, dword ptr fs:[00000030h]3_2_03CC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC4144 mov eax, dword ptr fs:[00000030h]3_2_03CC4144
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C156 mov eax, dword ptr fs:[00000030h]3_2_03C2C156
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC8158 mov eax, dword ptr fs:[00000030h]3_2_03CC8158
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36154 mov eax, dword ptr fs:[00000030h]3_2_03C36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36154 mov eax, dword ptr fs:[00000030h]3_2_03C36154
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04164 mov eax, dword ptr fs:[00000030h]3_2_03D04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04164 mov eax, dword ptr fs:[00000030h]3_2_03D04164
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov eax, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDE10E mov ecx, dword ptr fs:[00000030h]3_2_03CDE10E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov ecx, dword ptr fs:[00000030h]3_2_03CDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov eax, dword ptr fs:[00000030h]3_2_03CDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov eax, dword ptr fs:[00000030h]3_2_03CDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDA118 mov eax, dword ptr fs:[00000030h]3_2_03CDA118
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF0115 mov eax, dword ptr fs:[00000030h]3_2_03CF0115
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C60124 mov eax, dword ptr fs:[00000030h]3_2_03C60124
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB20DE mov eax, dword ptr fs:[00000030h]3_2_03CB20DE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A0E3 mov ecx, dword ptr fs:[00000030h]3_2_03C2A0E3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C380E9 mov eax, dword ptr fs:[00000030h]3_2_03C380E9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB60E0 mov eax, dword ptr fs:[00000030h]3_2_03CB60E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C0F0 mov eax, dword ptr fs:[00000030h]3_2_03C2C0F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C720F0 mov ecx, dword ptr fs:[00000030h]3_2_03C720F0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3208A mov eax, dword ptr fs:[00000030h]3_2_03C3208A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C280A0 mov eax, dword ptr fs:[00000030h]3_2_03C280A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC80A8 mov eax, dword ptr fs:[00000030h]3_2_03CC80A8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF60B8 mov eax, dword ptr fs:[00000030h]3_2_03CF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF60B8 mov ecx, dword ptr fs:[00000030h]3_2_03CF60B8
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32050 mov eax, dword ptr fs:[00000030h]3_2_03C32050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6050 mov eax, dword ptr fs:[00000030h]3_2_03CB6050
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5C073 mov eax, dword ptr fs:[00000030h]3_2_03C5C073
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB4000 mov ecx, dword ptr fs:[00000030h]3_2_03CB4000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD2000 mov eax, dword ptr fs:[00000030h]3_2_03CD2000
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E016 mov eax, dword ptr fs:[00000030h]3_2_03C4E016
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2A020 mov eax, dword ptr fs:[00000030h]3_2_03C2A020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C020 mov eax, dword ptr fs:[00000030h]3_2_03C2C020
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6030 mov eax, dword ptr fs:[00000030h]3_2_03CC6030
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3C7C0 mov eax, dword ptr fs:[00000030h]3_2_03C3C7C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB07C3 mov eax, dword ptr fs:[00000030h]3_2_03CB07C3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C527ED mov eax, dword ptr fs:[00000030h]3_2_03C527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C527ED mov eax, dword ptr fs:[00000030h]3_2_03C527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C527ED mov eax, dword ptr fs:[00000030h]3_2_03C527ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE7E1 mov eax, dword ptr fs:[00000030h]3_2_03CBE7E1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C347FB mov eax, dword ptr fs:[00000030h]3_2_03C347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C347FB mov eax, dword ptr fs:[00000030h]3_2_03C347FB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD678E mov eax, dword ptr fs:[00000030h]3_2_03CD678E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C307AF mov eax, dword ptr fs:[00000030h]3_2_03C307AF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE47A0 mov eax, dword ptr fs:[00000030h]3_2_03CE47A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6674D mov esi, dword ptr fs:[00000030h]3_2_03C6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6674D mov eax, dword ptr fs:[00000030h]3_2_03C6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6674D mov eax, dword ptr fs:[00000030h]3_2_03C6674D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30750 mov eax, dword ptr fs:[00000030h]3_2_03C30750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE75D mov eax, dword ptr fs:[00000030h]3_2_03CBE75D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72750 mov eax, dword ptr fs:[00000030h]3_2_03C72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72750 mov eax, dword ptr fs:[00000030h]3_2_03C72750
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB4755 mov eax, dword ptr fs:[00000030h]3_2_03CB4755
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38770 mov eax, dword ptr fs:[00000030h]3_2_03C38770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40770 mov eax, dword ptr fs:[00000030h]3_2_03C40770
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C700 mov eax, dword ptr fs:[00000030h]3_2_03C6C700
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30710 mov eax, dword ptr fs:[00000030h]3_2_03C30710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C60710 mov eax, dword ptr fs:[00000030h]3_2_03C60710
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C720 mov eax, dword ptr fs:[00000030h]3_2_03C6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C720 mov eax, dword ptr fs:[00000030h]3_2_03C6C720
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6273C mov eax, dword ptr fs:[00000030h]3_2_03C6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6273C mov ecx, dword ptr fs:[00000030h]3_2_03C6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6273C mov eax, dword ptr fs:[00000030h]3_2_03C6273C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAC730 mov eax, dword ptr fs:[00000030h]3_2_03CAC730
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A6C7 mov ebx, dword ptr fs:[00000030h]3_2_03C6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A6C7 mov eax, dword ptr fs:[00000030h]3_2_03C6A6C7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE6F2 mov eax, dword ptr fs:[00000030h]3_2_03CAE6F2
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB06F1 mov eax, dword ptr fs:[00000030h]3_2_03CB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB06F1 mov eax, dword ptr fs:[00000030h]3_2_03CB06F1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34690 mov eax, dword ptr fs:[00000030h]3_2_03C34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C34690 mov eax, dword ptr fs:[00000030h]3_2_03C34690
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C6A6 mov eax, dword ptr fs:[00000030h]3_2_03C6C6A6
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C666B0 mov eax, dword ptr fs:[00000030h]3_2_03C666B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4C640 mov eax, dword ptr fs:[00000030h]3_2_03C4C640
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF866E mov eax, dword ptr fs:[00000030h]3_2_03CF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF866E mov eax, dword ptr fs:[00000030h]3_2_03CF866E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A660 mov eax, dword ptr fs:[00000030h]3_2_03C6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A660 mov eax, dword ptr fs:[00000030h]3_2_03C6A660
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C62674 mov eax, dword ptr fs:[00000030h]3_2_03C62674
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE609 mov eax, dword ptr fs:[00000030h]3_2_03CAE609
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4260B mov eax, dword ptr fs:[00000030h]3_2_03C4260B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C72619 mov eax, dword ptr fs:[00000030h]3_2_03C72619
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C4E627 mov eax, dword ptr fs:[00000030h]3_2_03C4E627
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C66620 mov eax, dword ptr fs:[00000030h]3_2_03C66620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68620 mov eax, dword ptr fs:[00000030h]3_2_03C68620
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3262C mov eax, dword ptr fs:[00000030h]3_2_03C3262C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E5CF mov eax, dword ptr fs:[00000030h]3_2_03C6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E5CF mov eax, dword ptr fs:[00000030h]3_2_03C6E5CF
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C365D0 mov eax, dword ptr fs:[00000030h]3_2_03C365D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A5D0 mov eax, dword ptr fs:[00000030h]3_2_03C6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A5D0 mov eax, dword ptr fs:[00000030h]3_2_03C6A5D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E5E7 mov eax, dword ptr fs:[00000030h]3_2_03C5E5E7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C325E0 mov eax, dword ptr fs:[00000030h]3_2_03C325E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C5ED mov eax, dword ptr fs:[00000030h]3_2_03C6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C5ED mov eax, dword ptr fs:[00000030h]3_2_03C6C5ED
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32582 mov eax, dword ptr fs:[00000030h]3_2_03C32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C32582 mov ecx, dword ptr fs:[00000030h]3_2_03C32582
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C64588 mov eax, dword ptr fs:[00000030h]3_2_03C64588
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E59C mov eax, dword ptr fs:[00000030h]3_2_03C6E59C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB05A7 mov eax, dword ptr fs:[00000030h]3_2_03CB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB05A7 mov eax, dword ptr fs:[00000030h]3_2_03CB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB05A7 mov eax, dword ptr fs:[00000030h]3_2_03CB05A7
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C545B1 mov eax, dword ptr fs:[00000030h]3_2_03C545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C545B1 mov eax, dword ptr fs:[00000030h]3_2_03C545B1
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38550 mov eax, dword ptr fs:[00000030h]3_2_03C38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38550 mov eax, dword ptr fs:[00000030h]3_2_03C38550
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6656A mov eax, dword ptr fs:[00000030h]3_2_03C6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6656A mov eax, dword ptr fs:[00000030h]3_2_03C6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6656A mov eax, dword ptr fs:[00000030h]3_2_03C6656A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6500 mov eax, dword ptr fs:[00000030h]3_2_03CC6500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04500 mov eax, dword ptr fs:[00000030h]3_2_03D04500
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40535 mov eax, dword ptr fs:[00000030h]3_2_03C40535
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E53E mov eax, dword ptr fs:[00000030h]3_2_03C5E53E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C304E5 mov ecx, dword ptr fs:[00000030h]3_2_03C304E5
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA49A mov eax, dword ptr fs:[00000030h]3_2_03CEA49A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C364AB mov eax, dword ptr fs:[00000030h]3_2_03C364AB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C644B0 mov ecx, dword ptr fs:[00000030h]3_2_03C644B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBA4B0 mov eax, dword ptr fs:[00000030h]3_2_03CBA4B0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6E443 mov eax, dword ptr fs:[00000030h]3_2_03C6E443
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CEA456 mov eax, dword ptr fs:[00000030h]3_2_03CEA456
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2645D mov eax, dword ptr fs:[00000030h]3_2_03C2645D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5245A mov eax, dword ptr fs:[00000030h]3_2_03C5245A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBC460 mov ecx, dword ptr fs:[00000030h]3_2_03CBC460
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5A470 mov eax, dword ptr fs:[00000030h]3_2_03C5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5A470 mov eax, dword ptr fs:[00000030h]3_2_03C5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5A470 mov eax, dword ptr fs:[00000030h]3_2_03C5A470
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68402 mov eax, dword ptr fs:[00000030h]3_2_03C68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68402 mov eax, dword ptr fs:[00000030h]3_2_03C68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68402 mov eax, dword ptr fs:[00000030h]3_2_03C68402
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E420 mov eax, dword ptr fs:[00000030h]3_2_03C2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E420 mov eax, dword ptr fs:[00000030h]3_2_03C2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2E420 mov eax, dword ptr fs:[00000030h]3_2_03C2E420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2C427 mov eax, dword ptr fs:[00000030h]3_2_03C2C427
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB6420 mov eax, dword ptr fs:[00000030h]3_2_03CB6420
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6A430 mov eax, dword ptr fs:[00000030h]3_2_03C6A430
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50BCB mov eax, dword ptr fs:[00000030h]3_2_03C50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50BCB mov eax, dword ptr fs:[00000030h]3_2_03C50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C50BCB mov eax, dword ptr fs:[00000030h]3_2_03C50BCB
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30BCD mov eax, dword ptr fs:[00000030h]3_2_03C30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30BCD mov eax, dword ptr fs:[00000030h]3_2_03C30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30BCD mov eax, dword ptr fs:[00000030h]3_2_03C30BCD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDEBD0 mov eax, dword ptr fs:[00000030h]3_2_03CDEBD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38BF0 mov eax, dword ptr fs:[00000030h]3_2_03C38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38BF0 mov eax, dword ptr fs:[00000030h]3_2_03C38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38BF0 mov eax, dword ptr fs:[00000030h]3_2_03C38BF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EBFC mov eax, dword ptr fs:[00000030h]3_2_03C5EBFC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBCBF0 mov eax, dword ptr fs:[00000030h]3_2_03CBCBF0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40BBE mov eax, dword ptr fs:[00000030h]3_2_03C40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40BBE mov eax, dword ptr fs:[00000030h]3_2_03C40BBE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4BB0 mov eax, dword ptr fs:[00000030h]3_2_03CE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4BB0 mov eax, dword ptr fs:[00000030h]3_2_03CE4BB0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4B4B mov eax, dword ptr fs:[00000030h]3_2_03CE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CE4B4B mov eax, dword ptr fs:[00000030h]3_2_03CE4B4B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D02B57 mov eax, dword ptr fs:[00000030h]3_2_03D02B57
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6B40 mov eax, dword ptr fs:[00000030h]3_2_03CC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC6B40 mov eax, dword ptr fs:[00000030h]3_2_03CC6B40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFAB40 mov eax, dword ptr fs:[00000030h]3_2_03CFAB40
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD8B42 mov eax, dword ptr fs:[00000030h]3_2_03CD8B42
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28B50 mov eax, dword ptr fs:[00000030h]3_2_03C28B50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDEB50 mov eax, dword ptr fs:[00000030h]3_2_03CDEB50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C2CB7E mov eax, dword ptr fs:[00000030h]3_2_03C2CB7E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04B00 mov eax, dword ptr fs:[00000030h]3_2_03D04B00
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAEB1D mov eax, dword ptr fs:[00000030h]3_2_03CAEB1D
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EB20 mov eax, dword ptr fs:[00000030h]3_2_03C5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EB20 mov eax, dword ptr fs:[00000030h]3_2_03C5EB20
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF8B28 mov eax, dword ptr fs:[00000030h]3_2_03CF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CF8B28 mov eax, dword ptr fs:[00000030h]3_2_03CF8B28
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86ACC mov eax, dword ptr fs:[00000030h]3_2_03C86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86ACC mov eax, dword ptr fs:[00000030h]3_2_03C86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86ACC mov eax, dword ptr fs:[00000030h]3_2_03C86ACC
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30AD0 mov eax, dword ptr fs:[00000030h]3_2_03C30AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C64AD0 mov eax, dword ptr fs:[00000030h]3_2_03C64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C64AD0 mov eax, dword ptr fs:[00000030h]3_2_03C64AD0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6AAEE mov eax, dword ptr fs:[00000030h]3_2_03C6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6AAEE mov eax, dword ptr fs:[00000030h]3_2_03C6AAEE
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3EA80 mov eax, dword ptr fs:[00000030h]3_2_03C3EA80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04A80 mov eax, dword ptr fs:[00000030h]3_2_03D04A80
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C68A90 mov edx, dword ptr fs:[00000030h]3_2_03C68A90
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38AA0 mov eax, dword ptr fs:[00000030h]3_2_03C38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C38AA0 mov eax, dword ptr fs:[00000030h]3_2_03C38AA0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C86AA4 mov eax, dword ptr fs:[00000030h]3_2_03C86AA4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C36A50 mov eax, dword ptr fs:[00000030h]3_2_03C36A50
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40A5B mov eax, dword ptr fs:[00000030h]3_2_03C40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C40A5B mov eax, dword ptr fs:[00000030h]3_2_03C40A5B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA6F mov eax, dword ptr fs:[00000030h]3_2_03C6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA6F mov eax, dword ptr fs:[00000030h]3_2_03C6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA6F mov eax, dword ptr fs:[00000030h]3_2_03C6CA6F
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CDEA60 mov eax, dword ptr fs:[00000030h]3_2_03CDEA60
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CACA72 mov eax, dword ptr fs:[00000030h]3_2_03CACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CACA72 mov eax, dword ptr fs:[00000030h]3_2_03CACA72
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBCA11 mov eax, dword ptr fs:[00000030h]3_2_03CBCA11
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA24 mov eax, dword ptr fs:[00000030h]3_2_03C6CA24
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5EA2E mov eax, dword ptr fs:[00000030h]3_2_03C5EA2E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C54A35 mov eax, dword ptr fs:[00000030h]3_2_03C54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C54A35 mov eax, dword ptr fs:[00000030h]3_2_03C54A35
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6CA38 mov eax, dword ptr fs:[00000030h]3_2_03C6CA38
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC69C0 mov eax, dword ptr fs:[00000030h]3_2_03CC69C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C3A9D0 mov eax, dword ptr fs:[00000030h]3_2_03C3A9D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C649D0 mov eax, dword ptr fs:[00000030h]3_2_03C649D0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA9D3 mov eax, dword ptr fs:[00000030h]3_2_03CFA9D3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBE9E0 mov eax, dword ptr fs:[00000030h]3_2_03CBE9E0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C629F9 mov eax, dword ptr fs:[00000030h]3_2_03C629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C629F9 mov eax, dword ptr fs:[00000030h]3_2_03C629F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C429A0 mov eax, dword ptr fs:[00000030h]3_2_03C429A0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C309AD mov eax, dword ptr fs:[00000030h]3_2_03C309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C309AD mov eax, dword ptr fs:[00000030h]3_2_03C309AD
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB89B3 mov esi, dword ptr fs:[00000030h]3_2_03CB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB89B3 mov eax, dword ptr fs:[00000030h]3_2_03CB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB89B3 mov eax, dword ptr fs:[00000030h]3_2_03CB89B3
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB0946 mov eax, dword ptr fs:[00000030h]3_2_03CB0946
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D04940 mov eax, dword ptr fs:[00000030h]3_2_03D04940
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C56962 mov eax, dword ptr fs:[00000030h]3_2_03C56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C56962 mov eax, dword ptr fs:[00000030h]3_2_03C56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C56962 mov eax, dword ptr fs:[00000030h]3_2_03C56962
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E mov eax, dword ptr fs:[00000030h]3_2_03C7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E mov edx, dword ptr fs:[00000030h]3_2_03C7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C7096E mov eax, dword ptr fs:[00000030h]3_2_03C7096E
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4978 mov eax, dword ptr fs:[00000030h]3_2_03CD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CD4978 mov eax, dword ptr fs:[00000030h]3_2_03CD4978
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBC97C mov eax, dword ptr fs:[00000030h]3_2_03CBC97C
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE908 mov eax, dword ptr fs:[00000030h]3_2_03CAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CAE908 mov eax, dword ptr fs:[00000030h]3_2_03CAE908
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CBC912 mov eax, dword ptr fs:[00000030h]3_2_03CBC912
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28918 mov eax, dword ptr fs:[00000030h]3_2_03C28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C28918 mov eax, dword ptr fs:[00000030h]3_2_03C28918
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CB892A mov eax, dword ptr fs:[00000030h]3_2_03CB892A
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CC892B mov eax, dword ptr fs:[00000030h]3_2_03CC892B
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C5E8C0 mov eax, dword ptr fs:[00000030h]3_2_03C5E8C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03D008C0 mov eax, dword ptr fs:[00000030h]3_2_03D008C0
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03CFA8E4 mov eax, dword ptr fs:[00000030h]3_2_03CFA8E4
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C8F9 mov eax, dword ptr fs:[00000030h]3_2_03C6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C6C8F9 mov eax, dword ptr fs:[00000030h]3_2_03C6C8F9
          Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_03C30887 mov eax, dword ptr fs:[00000030h]3_2_03C30887
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00460B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00460B62
          Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00432622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00432622
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0042083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042083F
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004209D5 SetUnhandledExceptionFilter,0_2_004209D5
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00420C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00420C21
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00652622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00652622
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_0064083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_0064083F
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006409D5 SetUnhandledExceptionFilter,2_2_006409D5
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_00640C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00640C21

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 185.53.179.91 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.23.184.95 80
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\mstsc.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 4084Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeThread register set: target process: 4084Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeThread register set: target process: 6296Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 4084Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection unmapped: C:\Windows\SysWOW64\explorer.exe base address: 530000Jump to behavior
          Source: C:\Windows\SysWOW64\svchost.exeSection unmapped: C:\Windows\SysWOW64\mstsc.exe base address: 910000Jump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 3012008Jump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 3166008Jump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00461201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00461201
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00442BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00442BA5
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0046B226 SendInput,keybd_event,0_2_0046B226
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004822DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_004822DA
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\explorer.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Windows\SysWOW64\svchost.exe"Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00460B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00460B62
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00461663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00461663
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe, 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmp, COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe, 00000000.00000003.1431920314.0000000003791000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
          Source: COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe, name.exe, svchost.exe, 00000003.00000003.1510322479.0000000005F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1508016117.0000000005A00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000004.00000000.1454178466.0000000001090000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000004.00000000.1453898977.0000000000A28000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2339985971.0000000000A20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000004.00000000.1454178466.0000000001090000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: 0Program Manager
          Source: explorer.exe, 00000015.00000002.2667973410.0000000000C50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0Progman
          Source: svchost.exe, 00000003.00000003.1510322479.0000000005F00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000003.1508016117.0000000005A00000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.2667304367.0000000000530000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: f+SDefaultShellSoftware\Microsoft\Windows NT\CurrentVersion\Winlogon\AlternateShells/NoUACCheck/NoShellRegistrationAndUACCheck/NoShellRegistrationCheckProxy DesktopProgmanLocal\ExplorerIsShellMutex
          Source: explorer.exe, 00000004.00000000.1454178466.0000000001090000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: explorer.exe, 00000004.00000000.1457725429.000000000936E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.000000000936E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.000000000936E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd]1Q
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00420698 cpuid 0_2_00420698
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00478195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00478195
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0045D27A GetUserNameW,0_2_0045D27A
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_0043B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0043B952
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_004042DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004042DE
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: name.exeBinary or memory string: WIN_81
          Source: name.exeBinary or memory string: WIN_XP
          Source: name.exe, 00000009.00000002.1590364793.00000000006E2000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
          Source: name.exeBinary or memory string: WIN_XPe
          Source: name.exeBinary or memory string: WIN_VISTA
          Source: name.exeBinary or memory string: WIN_7
          Source: name.exeBinary or memory string: WIN_8

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 9.2.name.exe.b50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.name.exe.1df0000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00481204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00481204
          Source: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exeCode function: 0_2_00481806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00481806
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006A1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_006A1204
          Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 2_2_006A1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_006A1806
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information111
          Scripting
          2
          Valid Accounts
          1
          Native API
          111
          Scripting
          1
          Exploitation for Privilege Escalation
          1
          Disable or Modify Tools
          21
          Input Capture
          2
          System Time Discovery
          Remote Services1
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Shared Modules
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory1
          Account Discovery
          Remote Desktop Protocol21
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAt2
          Valid Accounts
          2
          Valid Accounts
          3
          Obfuscated Files or Information
          Security Account Manager3
          File and Directory Discovery
          SMB/Windows Admin Shares3
          Clipboard Data
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCron2
          Registry Run Keys / Startup Folder
          21
          Access Token Manipulation
          1
          DLL Side-Loading
          NTDS216
          System Information Discovery
          Distributed Component Object ModelInput Capture12
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script612
          Process Injection
          1
          Masquerading
          LSA Secrets451
          Security Software Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
          Registry Run Keys / Startup Folder
          2
          Valid Accounts
          Cached Domain Credentials23
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items23
          Virtualization/Sandbox Evasion
          DCSync3
          Process Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
          Access Token Manipulation
          Proc Filesystem11
          Application Window Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt612
          Process Injection
          /etc/passwd and /etc/shadow1
          System Owner/User Discovery
          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1489834 Sample: COMMERCAIL INVOICE AND DHL ... Startdate: 08/08/2024 Architecture: WINDOWS Score: 100 53 www.borghardt.xyz 2->53 55 www.hm23s.top 2->55 57 6 other IPs or domains 2->57 71 Found malware configuration 2->71 73 Malicious sample detected (through community Yara rule) 2->73 75 Antivirus detection for URL or domain 2->75 79 9 other signatures 2->79 12 COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe 6 2->12         started        signatures3 77 Performs DNS queries to domains with low reputation 53->77 process4 file5 51 C:\Users\user\AppData\Local\...\name.exe, PE32 12->51 dropped 117 Binary is likely a compiled AutoIt script file 12->117 16 name.exe 3 12->16         started        signatures6 process7 file8 49 C:\Users\user\AppData\Roaming\...\name.vbs, data 16->49 dropped 63 Binary is likely a compiled AutoIt script file 16->63 65 Machine Learning detection for dropped file 16->65 67 Drops VBS files to the startup folder 16->67 69 4 other signatures 16->69 20 svchost.exe 16->20         started        signatures9 process10 signatures11 81 Modifies the context of a thread in another process (thread injection) 20->81 83 Maps a DLL or memory area into another process 20->83 85 Sample uses process hollowing technique 20->85 87 3 other signatures 20->87 23 explorer.exe 37 2 20->23 injected process12 dnsIp13 59 www.authentication-app-69447.bond 185.53.179.91, 49710, 80 TEAMINTERNET-ASDE Germany 23->59 99 System process connects to network (likely due to code injection or exploit) 23->99 27 wscript.exe 1 23->27         started        30 explorer.exe 23->30         started        32 mstsc.exe 23->32         started        34 WerFault.exe 21 23->34         started        signatures14 process15 signatures16 101 Windows Scripting host queries suspicious COM object (likely to drop second stage) 27->101 36 name.exe 2 27->36         started        103 Modifies the context of a thread in another process (thread injection) 30->103 105 Maps a DLL or memory area into another process 30->105 107 Tries to detect virtualization through RDTSC time measurements 30->107 109 Switches to a custom stack to bypass stack traces 30->109 39 explorer.exe 30->39         started        42 cmd.exe 1 30->42         started        process17 dnsIp18 89 Binary is likely a compiled AutoIt script file 36->89 91 Writes to foreign memory regions 36->91 93 Maps a DLL or memory area into another process 36->93 44 svchost.exe 36->44         started        61 hm23s.top 154.23.184.95, 49732, 80 COGENT-174US United States 39->61 95 System process connects to network (likely due to code injection or exploit) 39->95 97 Query firmware table information (likely to detect VMs) 39->97 47 conhost.exe 42->47         started        signatures19 process20 signatures21 111 Modifies the context of a thread in another process (thread injection) 44->111 113 Maps a DLL or memory area into another process 44->113 115 Sample uses process hollowing technique 44->115

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLink
          hm23s.top0%VirustotalBrowse
          alqahtani.site1%VirustotalBrowse
          www.45941978.top1%VirustotalBrowse
          www.alqahtani.site0%VirustotalBrowse
          api.msn.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%URL Reputationsafe
          https://api.msn.com:443/v1/news/Feed/Windows?0%URL Reputationsafe
          https://excel.office.com0%URL Reputationsafe
          http://www.2002w.app/jd21/www.propertiesforrentus11.bond0%Avira URL Cloudsafe
          https://android.notify.windows.com/iOSA40%Avira URL Cloudsafe
          http://www.mahlubini.africa/jd21/www.weight-loss-003.today0%Avira URL Cloudsafe
          http://www.emiratesnseic.top/jd21/100%Avira URL Cloudmalware
          https://powerpoint.office.comer0%Avira URL Cloudsafe
          https://word.office.com0%URL Reputationsafe
          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%URL Reputationsafe
          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%URL Reputationsafe
          https://outlook.com0%URL Reputationsafe
          http://www.dating-dd-de.infoReferer:0%Avira URL Cloudsafe
          https://android.notify.windows.com/iOS0%URL Reputationsafe
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%URL Reputationsafe
          https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the0%URL Reputationsafe
          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg0%URL Reputationsafe
          https://api.msn.com/v1/news/Feed/Windows?0%URL Reputationsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gK4J-dark0%Avira URL Cloudsafe
          https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world0%Avira URL Cloudsafe
          http://www.pools-99305.bond0%Avira URL Cloudsafe
          http://www.tyumk.xyz/jd21/www.therealtorpeddler.info0%Avira URL Cloudsafe
          http://www.solveiterzsolutions.fun/jd21/www.mahlubini.africa0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gK4J-dark0%VirustotalBrowse
          http://www.pools-99305.bond0%VirustotalBrowse
          https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-10%Avira URL Cloudsafe
          https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-0%Avira URL Cloudsafe
          http://www.frametoryframes.shop0%Avira URL Cloudsafe
          http://www.joycasino-ed46.top/jd21/0%Avira URL Cloudsafe
          https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-0%Avira URL Cloudsafe
          http://www.hm23s.top/jd21/0%Avira URL Cloudsafe
          www.weight-loss-003.today/jd21/0%Avira URL Cloudsafe
          http://www.weight-loss-003.today0%Avira URL Cloudsafe
          http://www.2002w.app0%Avira URL Cloudsafe
          http://www.badcreditloans59.xyz/jd21/0%Avira URL Cloudsafe
          http://www.authentication-app-69447.bond/jd21/www.cellphonesfxw.today0%Avira URL Cloudsafe
          http://www.therealtorpeddler.info/jd21/0%Avira URL Cloudsafe
          http://www.sctttc-or.topReferer:0%Avira URL Cloudsafe
          http://www.pools-99305.bondReferer:0%Avira URL Cloudsafe
          http://www.pools-99305.bond/jd21/www.gkbet168.net0%Avira URL Cloudsafe
          http://www.badcreditloans59.xyz0%Avira URL Cloudsafe
          http://www.apple0ficial-ld.info/jd21/Fw100%Avira URL Cloudmalware
          http://www.hm23s.top0%Avira URL Cloudsafe
          http://www.tyumk.xyz/jd21/0%Avira URL Cloudsafe
          http://www.xmld101.icu0%Avira URL Cloudsafe
          http://www.authentication-app-69447.bond0%Avira URL Cloudsafe
          http://www.mahlubini.africaReferer:0%Avira URL Cloudsafe
          https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zeal0%Avira URL Cloudsafe
          http://www.badcreditloans59.xyzReferer:0%Avira URL Cloudsafe
          http://www.microsoft.c0%Avira URL Cloudsafe
          https://wns.windows.com/0%Avira URL Cloudsafe
          https://android.notify.windows.com/iOSd0%Avira URL Cloudsafe
          http://www.propertiesforrentus11.bondReferer:0%Avira URL Cloudsafe
          https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsi0%Avira URL Cloudsafe
          http://www.propertiesforrentus11.bond/jd21/100%Avira URL Cloudphishing
          http://www.nextdoor3.store/jd21/www.frametoryframes.shop0%Avira URL Cloudsafe
          http://www.hm23s.top/jd21/www.alqahtani.site0%Avira URL Cloudsafe
          http://www.nextdoor3.storeReferer:0%Avira URL Cloudsafe
          http://www.sctttc-or.top/jd21/0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark0%Avira URL Cloudsafe
          http://www.authentication-app-69447.bond/jd21/0%Avira URL Cloudsafe
          http://www.cellphonesfxw.today0%Avira URL Cloudsafe
          https://www.msn.com/en-us/foodanddrink/foodnews/black-slimy-matter-on-mint-leaves-toxic-chemicals-ne0%Avira URL Cloudsafe
          http://www.propertiesforrentus11.bond/jd21/www.tyumk.xyz100%Avira URL Cloudphishing
          http://www.mvtb.pics/jd21/0%Avira URL Cloudsafe
          http://www.sctttc-or.top/jd21/www.solveiterzsolutions.fun0%Avira URL Cloudsafe
          http://www.hm23s.topReferer:0%Avira URL Cloudsafe
          http://www.alqahtani.siteReferer:0%Avira URL Cloudsafe
          http://www.apple0ficial-ld.infoReferer:0%Avira URL Cloudsafe
          http://www.gkbet168.netReferer:0%Avira URL Cloudsafe
          http://www.forklift-jobs-29768.bondReferer:0%Avira URL Cloudsafe
          http://www.xmld101.icu/jd21/www.nextdoor3.store0%Avira URL Cloudsafe
          https://android.notify.windows.com/iOS~0%Avira URL Cloudsafe
          http://www.emiratesnseic.topReferer:0%Avira URL Cloudsafe
          http://www.emiratesnseic.top/jd21/www.030002787.xyz100%Avira URL Cloudmalware
          http://www.frametoryframes.shopReferer:0%Avira URL Cloudsafe
          http://www.dating-dd-de.info/jd21/0%Avira URL Cloudsafe
          http://www.dating-dd-de.info0%Avira URL Cloudsafe
          http://www.borghardt.xyz0%Avira URL Cloudsafe
          http://www.joycasino-ed46.topReferer:0%Avira URL Cloudsafe
          http://www.alqahtani.site/jd21/0%Avira URL Cloudsafe
          http://www.gkbet168.net0%Avira URL Cloudsafe
          http://www.weight-loss-003.today/jd21/www.emiratesnseic.top0%Avira URL Cloudsafe
          http://www.tyumk.xyz/jd21/www.badcreditloans59.xyz0%Avira URL Cloudsafe
          http://www.alqahtani.site/jd21/www.circusenergy.online0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBA0%Avira URL Cloudsafe
          http://www.weight-loss-003.today/jd21/0%Avira URL Cloudsafe
          https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandin0%Avira URL Cloudsafe
          http://www.emiratesnseic.top0%Avira URL Cloudsafe
          http://www.45941978.topReferer:0%Avira URL Cloudsafe
          http://www.tyumk.xyz0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-dark0%Avira URL Cloudsafe
          http://www.circusenergy.online0%Avira URL Cloudsafe
          http://www.mvtb.pics/jd21/www.apple0ficial-ld.info0%Avira URL Cloudsafe
          http://www.frametoryframes.shop/jd21/www.dating-dd-de.info100%Avira URL Cloudmalware
          http://www.therealtorpeddler.info0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT0%Avira URL Cloudsafe
          http://www.therealtorpeddler.infoReferer:0%Avira URL Cloudsafe
          http://www.forklift-jobs-29768.bond0%Avira URL Cloudsafe
          https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          hm23s.top
          154.23.184.95
          truetrueunknown
          alqahtani.site
          3.33.130.190
          truetrueunknown
          www.authentication-app-69447.bond
          185.53.179.91
          truetrue
            unknown
            www.45941978.top
            unknown
            unknowntrueunknown
            www.alqahtani.site
            unknown
            unknowntrueunknown
            www.borghardt.xyz
            unknown
            unknowntrue
              unknown
              www.hm23s.top
              unknown
              unknowntrue
                unknown
                api.msn.com
                unknown
                unknowntrueunknown
                NameMaliciousAntivirus DetectionReputation
                www.weight-loss-003.today/jd21/true
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.emiratesnseic.top/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                https://powerpoint.office.comerexplorer.exe, 00000004.00000002.2351312373.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1464190970.000000000BBB0000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.2002w.app/jd21/www.propertiesforrentus11.bondexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://android.notify.windows.com/iOSA4explorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.mahlubini.africa/jd21/www.weight-loss-003.todayexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.dating-dd-de.infoReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gK4J-darkexplorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-worldexplorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000004.00000003.2284163975.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1457725429.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000091FB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397384870.000000000926A000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.000000000926A000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.pools-99305.bondexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                http://www.tyumk.xyz/jd21/www.therealtorpeddler.infoexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.solveiterzsolutions.fun/jd21/www.mahlubini.africaexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://excel.office.comexplorer.exe, 00000004.00000002.2351312373.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1464190970.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.msn.com/en-us/money/personalfinance/the-big-3-mistakes-financial-advisors-say-that-the-1explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.frametoryframes.shopexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/news/crime/bar-fight-leaves-man-in-critical-condition-suspect-arrested-in-explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.joycasino-ed46.top/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.hm23s.top/jd21/explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.weight-loss-003.todayexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.2002w.appexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.badcreditloans59.xyz/jd21/explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.authentication-app-69447.bond/jd21/www.cellphonesfxw.todayexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sctttc-or.topReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.therealtorpeddler.info/jd21/explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.pools-99305.bondReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.badcreditloans59.xyzexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.pools-99305.bond/jd21/www.gkbet168.netexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.apple0ficial-ld.info/jd21/Fwexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://www.hm23s.topexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tyumk.xyz/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.xmld101.icuexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.authentication-app-69447.bondexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.mahlubini.africaReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/Zealandia-Continent_map_en.svg/1870px-Zealexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.badcreditloans59.xyzReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://wns.windows.com/explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.microsoft.cexplorer.exe, 00000004.00000000.1457725429.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.0000000009237000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.0000000009237000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://android.notify.windows.com/iOSdexplorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.propertiesforrentus11.bondReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://assets.msn.com/weathermapdata/1/static/weather/taskbar/animation/WeatherInsights/WeatherInsiexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.propertiesforrentus11.bond/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                http://www.nextdoor3.store/jd21/www.frametoryframes.shopexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.hm23s.top/jd21/www.alqahtani.siteexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://word.office.comexplorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.nextdoor3.storeReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.sctttc-or.top/jd21/explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.authentication-app-69447.bond/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.cellphonesfxw.todayexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/foodanddrink/foodnews/black-slimy-matter-on-mint-leaves-toxic-chemicals-neexplorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.propertiesforrentus11.bond/jd21/www.tyumk.xyzexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: phishing
                unknown
                https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.mvtb.pics/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.sctttc-or.top/jd21/www.solveiterzsolutions.funexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://outlook.comexplorer.exe, 00000004.00000002.2351312373.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1464190970.000000000BBB0000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2397231985.0000000009274000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.hm23s.topReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.alqahtani.siteReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.apple0ficial-ld.infoReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.gkbet168.netReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.forklift-jobs-29768.bondReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.xmld101.icu/jd21/www.nextdoor3.storeexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://android.notify.windows.com/iOS~explorer.exe, 00000004.00000002.2355211941.000000000C0FD000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.emiratesnseic.topReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.emiratesnseic.top/jd21/www.030002787.xyzexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmptrue
                • Avira URL Cloud: malware
                unknown
                http://www.frametoryframes.shopReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.dating-dd-de.infoexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.dating-dd-de.info/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.borghardt.xyzexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.joycasino-ed46.topReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.alqahtani.site/jd21/explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.gkbet168.netexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://android.notify.windows.com/iOSexplorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2355211941.000000000C0FD000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.weight-loss-003.today/jd21/www.emiratesnseic.topexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000004.00000000.1464190970.000000000BC80000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2352030315.000000000BCB7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2286095962.000000000BCB4000.00000004.00000001.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.tyumk.xyz/jd21/www.badcreditloans59.xyzexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svgexplorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.alqahtani.site/jd21/www.circusenergy.onlineexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gKBAexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.weight-loss-003.today/jd21/explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/sports/other/washington-state-ad-asks-ncaa-for-compassion-and-understandinexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.45941978.topReferer:explorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.emiratesnseic.topexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.tyumk.xyzexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gF9k-darkexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000004.00000000.1457725429.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000002.2346753313.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2284163975.00000000090DA000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2691561420.0000000009239000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://www.circusenergy.onlineexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.mvtb.pics/jd21/www.apple0ficial-ld.infoexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.frametoryframes.shop/jd21/www.dating-dd-de.infoexplorer.exe, 00000004.00000002.2355563195.000000000C1DE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000003.2285121110.000000000C1DE000.00000004.00000001.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://www.therealtorpeddler.infoexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.therealtorpeddler.infoReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.forklift-jobs-29768.bondexplorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/news/politics/who-is-andy-biggs-what-to-know-about-the-arizona-republican-explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://www.msn.com/en-us/weather/topstories/first-map-of-earth-s-lost-continent-has-been-published/explorer.exe, 00000004.00000002.2344169455.0000000006F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000004.00000000.1455950786.0000000006F0F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000015.00000003.2350390233.00000000075E4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000015.00000002.2686276323.00000000075E4000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.cellphonesfxw.todayReferer:explorer.exe, 00000015.00000002.2698810069.000000000C158000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                185.53.179.91
                www.authentication-app-69447.bondGermany
                61969TEAMINTERNET-ASDEtrue
                154.23.184.95
                hm23s.topUnited States
                174COGENT-174UStrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1489834
                Start date and time:2024-08-08 07:40:09 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 9m 31s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:36
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:1
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                Detection:MAL
                Classification:mal100.troj.expl.evad.winEXE@246/17@7/2
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 52
                • Number of non-executed functions: 289
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, UserOOBEBroker.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTaskHost.exe, SearchApp.exe, audiodg.exe, WerFault.exe, ShellExperienceHost.exe, WMIADAP.exe, conhost.exe, svchost.exe, StartMenuExperienceHost.exe, TextInputHost.exe, mobsync.exe
                • Excluded IPs from analysis (whitelisted): 204.79.197.203, 2.23.209.149, 2.23.209.142, 2.23.209.148, 2.23.209.144, 2.23.209.143, 2.23.209.158, 2.23.209.156, 2.23.209.150, 2.23.209.154, 2.23.209.133, 2.23.209.140, 2.23.209.141, 2.23.209.131, 2.23.209.130, 2.23.209.135, 2.23.209.132
                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, r.bing.com.edgekey.net, a-0003.a-msedge.net, ctldl.windowsupdate.com, p-static.bing.trafficmanager.net, www-www.bing.com.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, login.live.com, r.bing.com, api-msn-com.a-0003.a-msedge.net
                • Not all processes where analyzed, report is missing behavior information
                • Report creation exceeded maximum time and may have missing disassembly code information.
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                • Report size getting too big, too many NtCreateKey calls found.
                • Report size getting too big, too many NtEnumerateKey calls found.
                • Report size getting too big, too many NtEnumerateValueKey calls found.
                • Report size getting too big, too many NtOpenFile calls found.
                • Report size getting too big, too many NtOpenKey calls found.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryAttributesFile calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.
                TimeTypeDescription
                01:41:09API Interceptor2201706x Sleep call for process: explorer.exe modified
                07:41:13AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                185.53.179.91MKCC-MEC-RFQ-115-2024.exeGet hashmaliciousFormBookBrowse
                • www.gb-electric-wheelchairs-8j.bond/ts59/?S0GhCH=DR-Lh8FH5BP&Upql=mB8uG6w8zpafFuNLwvQmLBNoWWmhhT+Pa5pMyx7Kkg5PpWq+xUX3NBFKVrOgvyVjJmhQ
                2024 Lusail Fence-WITH STICKER-2-003.exeGet hashmaliciousFormBookBrowse
                • www.gb-electric-wheelchairs-8j.bond/ts59/?7n=mB8uG6w8zpafFuNLwvQmLBNoWWmhhT+Pa5pMyx7Kkg5PpWq+xUX3NBFKVo2JmSZYGQcG7mEBYw==&2d8=3fe8kxnx8zVX-2L
                RFQINL0607_Commerical_list.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.pingpongtable-sg.bond/fg83/?IpZXsVy=vgcZVq2vlo6tIZLwBMCb9IR7Fd0F2pwxk1GGseMFxnAAiVZXKfn9ZK8RnpW3pp9l3vJN&kxopsN=MlyXbd0X
                Scan_Doc.vbsGet hashmaliciousFormBookBrowse
                • www.hyperpigmentation-91528.bond/g94s/?DrKTC2=LjGd&e8a=tzSFV3H7hErTYvWZwPPC/GAyGN0rrg2x5F2fwYgRRUbDdRuSW2XehEr5Lw08uOFm07l+
                E-dekont_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.credit-cards-54889.com/mi94/?7n-Lh=wX1E+PP8GJLUwW4mj+Nza6lWe8cbBzPUrOMOJyU3aq2wOfqE4jFrkNQnwJ4n6caLvu5m&7nrLOp=h2JXJD
                ekstre_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.credit-cards-54889.com/mi94/?_N6l56=wX1E+PP8GJLUwW4mj+Nza6lWe8cbBzPUrOMOJyU3aq2wOfqE4jFrkNQnwJ4n6caLvu5m&3fK0g=JxoL4
                ekstre.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.credit-cards-54889.com/mi94/?iN64=wX1E+PP8GJLUwW4mj+Nza6lWe8cbBzPUrOMOJyU3aq2wOfqE4jFrkNQnwJ4n6caLvu5m&7ncHc8=Tv6lQt-XnpBl3ra
                ekstre.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.credit-cards-54889.com/mi94/?-Z=6lfDx&5jbDpbb=wX1E+PP8GJLUwW4mj+Nza6lWe8cbBzPUrOMOJyU3aq2wOfqE4jFrkNQnwJ4n6caLvu5m
                E-DEKONT_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.credit-cards-54889.com/mi94/?YtxdA=ClrLPvDXABoDT8&uZgtA=wX1E+PP8GJLUwW4mj+Nza6lWe8cbBzPUrOMOJyU3aq2wOfqE4jFrkNQnwJ4n6caLvu5m
                Ziraat_Bankasi_Swift_Mesaji.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.credit-cards-54889.com/mi94/?w88pk=wX1E+PP8GJLUwW4mj+Nza6lWe8cbBzPUrOMOJyU3aq2wOfqE4jFrkNQnwJ4n6caLvu5m&Sr94=9rXXvvGp
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                COGENT-174USPURCHASE ORDER170624.exeGet hashmaliciousFormBookBrowse
                • 38.181.21.123
                http://guqtg.frooskivpn.com/4guusj15181vCAj1127elpjnhawbx14030EJAOJSTOQCIWNIN24527KYKP17651B16#l8054dcdz5aasx7h9lz4sls75gk825optascqsrhl95ahyhhm7Get hashmaliciousPhisherBrowse
                • 154.62.105.142
                arm5-20240807-1021.elfGet hashmaliciousMiraiBrowse
                • 38.83.59.14
                x86.elfGet hashmaliciousUnknownBrowse
                • 149.113.123.228
                Document 240000807.exeGet hashmaliciousFormBookBrowse
                • 154.23.184.141
                SecuriteInfo.com.Trojan.MSIL.Injector.13809.31159.exeGet hashmaliciousFormBookBrowse
                • 154.40.37.235
                botx.x86.elfGet hashmaliciousMiraiBrowse
                • 38.73.2.131
                botx.arm6.elfGet hashmaliciousMiraiBrowse
                • 38.116.142.121
                botx.mips.elfGet hashmaliciousMiraiBrowse
                • 38.100.71.68
                botx.mpsl.elfGet hashmaliciousMiraiBrowse
                • 38.138.245.238
                TEAMINTERNET-ASDEDHL SHIPPING DOCUMENT.exeGet hashmaliciousFormBookBrowse
                • 185.53.179.93
                DHL SHIPPING DOCUMENT.exeGet hashmaliciousFormBookBrowse
                • 185.53.179.93
                counter.exeGet hashmaliciousBdaejecBrowse
                • 185.53.178.50
                http://myuhnj.orgGet hashmaliciousUnknownBrowse
                • 185.53.177.52
                CSCEC Middle East (L.L.C).exeGet hashmaliciousFormBookBrowse
                • 185.53.179.94
                gUJak0onLk.elfGet hashmaliciousUnknownBrowse
                • 185.53.178.6
                bJrO2iUerN.elfGet hashmaliciousUnknownBrowse
                • 185.53.178.52
                DHL_TOC2_2407081728458457.pdf.exeGet hashmaliciousFormBookBrowse
                • 185.53.179.93
                Akb38lKYd6rDV8l.exeGet hashmaliciousFormBookBrowse
                • 185.53.179.90
                http://le100.netGet hashmaliciousUnknownBrowse
                • 185.53.179.170
                No context
                No context
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):2.3047172103944074
                Encrypted:false
                SSDEEP:384:dsCmL3BxwjA2at2gCR0CPzzuiFXY4lO8k:dsv3BxwjCtpw0QzzuiFXY4lO8
                MD5:F8D35DDA68CDD5A731B343672C1DEB7D
                SHA1:7B29EC032BFB4CB2752D814CE4690182537C2CA2
                SHA-256:E31C9459D23B360E82B9644A8ADEAA435BC9D525A424CE975AE66C59D8928719
                SHA-512:FA362B1D96749BA433BC30BBD5EE0B32D8584BA86F192FEA31FF9EFCE3712B7426B294074259092B91FDBF5E04FD9CBB4CAF6BCA53DCD245AE07ADAC07EAC31B
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.7.5.6.9.3.5.6.6.7.9.7.7.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....R.e.p.o.r.t.F.l.a.g.s.=.5.2.4.2.8.8.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.d.5.b.5.0.a.3.-.d.c.f.6.-.4.3.d.1.-.9.d.c.9.-.f.0.1.2.b.5.9.b.e.f.b.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.d.4.f.2.a.2.8.-.f.9.b.9.-.4.5.1.3.-.9.9.a.f.-.0.8.6.6.8.7.1.1.2.7.7.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.E.x.p.l.o.r.e.r...E.X.E.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.E.X.P.L.O.R.E.R...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.f.4.-.0.0.0.1.-.0.0.1.4.-.2.3.b.1.-.3.e.5.5.4.6.e.9.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.9.0.b.0.8.0.e.0.6.5.5.7.2.0.c.a.d.8.c.1.c.a.e.4.b.8.1.9.3.c.9.3.8.2.c.9.a.c.9.2.!.e.x.p.l.o.r.e.r...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.0.2././.1.2././.2.1.:.2.0.:.5.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 17 streams, Thu Aug 8 05:42:37 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):1097368
                Entropy (8bit):1.3775605199157
                Encrypted:false
                SSDEEP:1536:BDJiGcq/uPhgsHsVi5K1MJn9aC0tUrvs5/Y9plY5v70WtpBU:qGcq/agsd5KwVvsalUY
                MD5:FDBB1E497D28E614856DC18005FE888F
                SHA1:E59F99884BE12B32C8D166D11FE835305522BDAD
                SHA-256:2B402E04CE4F27725772A3541C744BF6F34960D13A58CD297EC4F4BD4E9D3A0D
                SHA-512:275D51F7A2373B1DBC3287477DD5F262332731403FFCB06C23BCE44C0B5BE4C4B3E134F6C7BCA3FC107C55C312F333A7299F061E7C974E09B3F08E022B530819
                Malicious:false
                Preview:MDMP..a..... ........Z.f................ .......,k..@...........l...........H.......4.... ..........x.......8...........T...$........c...Z..................................................................................................................eJ..............Lw......................T............@.f............................. ..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...............................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):10848
                Entropy (8bit):3.701144529395122
                Encrypted:false
                SSDEEP:192:R6l7wVeJCMim6YSL2gmfqzV/prs89bBJjssXXfhsrm:R6lXJZ96Y+2gmfqzVbBJj3XXf7
                MD5:B231373CE5FD9E4A9070C07200990CE0
                SHA1:AA23105D7FBC23CF40CD8667179A477A675114A0
                SHA-256:48EA2793A7E6A32C4BB2AAFEDE54C36D332677494F8BAE53CA7B8FADE3A4DAB6
                SHA-512:D0773E092803024E10D1550EF1C05AB6AE8A661985673C175219B069A7C1B1382FF5D31ED00F881F13E744F9FE47FE637454F9118E0CF6687318D5356ABD16DD
                Malicious:false
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.4.0.8.4.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4724
                Entropy (8bit):4.4645528479159635
                Encrypted:false
                SSDEEP:48:cvIwWl8zsaCJg771I9LgWpW8VYUWYm8M4JYmFmsyq85cdykb9Q32d:uIjffI7UZ7VPJus5ba32d
                MD5:DD88BEEF11A98846FFA9BA383E42EAF8
                SHA1:16684BB090CF8A18A4926B44969740ED8106EB83
                SHA-256:A2639A0ACE126110EEAF0FA7876051D29D5C0E8673615F2184764B20952929C3
                SHA-512:BFF9D6E0B33E21DBC897B3F085346EAD44DDDDF92B01B32161F3117F402384BF54C1A1C265DE63591DDBE8B9784B7989D4890E6B8FC45C8C491B4E4DEB190F9A
                Malicious:false
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="446205" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\explorer.exe
                File Type:data
                Category:dropped
                Size (bytes):107416
                Entropy (8bit):4.00146126861522
                Encrypted:false
                SSDEEP:768:Gl81kJGIqXWhjk0QsVWohnN5LxKNCjBlzTPieb6PR1vPqtOJd5m5oypQqW3/g3hY:XkZq4VWohtaeJ3hOihGxnlhEFOfKWB
                MD5:9F9198EAB2EE73A08AC473D869D4C070
                SHA1:E07A68E10997365DE2B55B0C255A0EC5C555BF46
                SHA-256:500B1AF973EBF54CD3E2784A600D1E83C24DDC00345BCA15264547B1CD49B399
                SHA-512:699145A300DB0AADC40DF28B69F45DB66AA1B7B1CA87D836C47867CA7F23DB4F2B682F2F6579F2976CE916024EDEDF3DDA661C45CBB5E94C3994DFC02CC057F9
                Malicious:false
                Preview:....h... .......`.......P...........`...X.......]...................8...V.......e.n.-.C.H.;.e.n.-.G.B..............................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................h.u.b.e.r.t.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u......................(..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>...........................................
                Process:C:\Windows\explorer.exe
                File Type:data
                Category:dropped
                Size (bytes):107416
                Entropy (8bit):4.001734371574568
                Encrypted:false
                SSDEEP:768:pl8PkuGIqXWhjk0QsVWohnN5LxKNCjBlzTPieb6PR1vPqtOJd5m5oypQqW3/g3hy:gkAq4VWohtaeJ3hOihGxnlhEFOfKWT
                MD5:4DCAC9700FE92B44FF765D20DAA92871
                SHA1:8013F405D00B886BA66BED525D686CD4BA9CF0AA
                SHA-256:748CF37BCFAB4C5015042578911610CDDAD0880DD40CA71A689E1218C85F40F5
                SHA-512:3BEA6066F93F851E02CE67BF94BB5A9A3D9563ED142ABEBF0404F5913D3632D7D2210317BA694478905B35E0F87AE012F5CBE409093F8C72B56373FA85D54245
                Malicious:false
                Preview:....h... .......`.......P...........`...X.......]...................8...V.......e.n.-.C.H.;.e.n.-.G.B..............................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................h.u.b.e.r.t.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....`.1...........Start Menu..F............................................S.t.a.r.t. .M.e.n.u......................(..........P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>...........................................
                Process:C:\Windows\explorer.exe
                File Type:JSON data
                Category:dropped
                Size (bytes):713
                Entropy (8bit):5.125716386089798
                Encrypted:false
                SSDEEP:12:YWgc2TtlH+5ksi0YOmXeH+2yrZMAdrKC8K/y8kEUq1HLxycXNNZ/TCB893c3Z:Yzc2THHpBeHt0drc6UE14
                MD5:9DF018BE4A6E955617B6ECF550019758
                SHA1:72735F807B4E05E1343B83EF04F5B4FF7800BF3C
                SHA-256:F1CE8D3217DDCC9D0BD8ACAFA27E3F9FF3A9DBD4D38380D3F20D2753D9884F65
                SHA-512:6718CE76822D7834432D5BE600B5277B53B863E5FB5C6393CE48819FAF4A8F765E821D83A2E50E82D79599AE0E35A1BA9B07E20C90BC334C70C263CC97EE2AA0
                Malicious:false
                Preview:{"serviceContext":{"serviceActivityId":"66b45ad3-aadb-44b6-aecd-203c7cb85e34","responseCreationDateTime":"0001-01-01T00:00:00","debugId":"66b45ad3-aadb-44b6-aecd-203c7cb85e34|2024-08-08T05:42:44.1205295Z|fabric_msn|ESU|News_493"},"expirationDateTime":"0001-01-01T00:00:00","showBadge":false,"settings":{"refreshIntervalMinutes":0,"feedEnabled":true,"evolvedNotificationLifecycleEnabled":false,"showBadgeOnRotationsForEvolvedNotificationLifecycle":false,"webView2Enabled":false,"webView2EnabledV1":false,"flyoutV2EndpointEnabled":false,"showAnimation":false,"useTallerFlyoutSize":false,"useDynamicHeight":false,"useWiderFlyoutSize":false,"reclaimEnabled":false,"isPreviewDurationsEnabled":false},"isPartial":false}
                Process:C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                File Type:data
                Category:dropped
                Size (bytes):189952
                Entropy (8bit):7.873503870484802
                Encrypted:false
                SSDEEP:3072:gj4c0BP3xrQnPTtC4lz3xHhYeBF12d17MOb7DdDb9CqRdSNcq7uCB6EEY:gUcCPB0P9zBVBid17MYn9CqRE9NBN
                MD5:DBCB9855B67E210D080D2E1403F56A2E
                SHA1:AD5694CF00B3F428E7C0B7CB5553D4B106B152EB
                SHA-256:3577F2DA62B92766AEBCDE882FFDCC6E68AA89E62719C7BCCA162E78E1E40B5A
                SHA-512:95A5FFE088707BA151C5FB59CA022EF89AA32057673A984DCE630A2D3941B6D31D8FA5603F28F9DE20B78E11D9B2E0DB33427DC654755379659BBF8F67565F2E
                Malicious:false
                Preview:~.s..6HNKa.J...}.9;...mAF...3E6JR6HNK9YSCH0NGAP98O1PEBN83H.E6J\).@K.P.b.1..`.QQ<. 7-)JR%.&W$<Y<n)\y!6&.')a.vko\?!'`5>B.E6JR6HN8(l.t8k.p1...?j..D..B8h.nL..|>...U...>...P['. ..N83H3E6J.sHN.8XSU...GAP98O1P.BL98I9E6.P6HNK9YSCH..FAP)8O1.GBN8sH3U6JR4HNN9XSCH0NBAQ98O1PE.L83J3E6JR6JN..YSSH0^GAP9(O1@EBN83H#E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSm<U63AP9<.3PERN83.1E6ZR6HNK9YSCH0NGAp98/1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9YSCH0NGAP98O1PEBN83H3E6JR6HNK9
                Process:C:\Users\user\AppData\Local\directory\name.exe
                File Type:data
                Category:dropped
                Size (bytes):185708
                Entropy (8bit):7.9786424774458595
                Encrypted:false
                SSDEEP:3072:w9/P7AyjyulPbCNR1SSfEdPCoh3E0ht3Te4XJitaotxjHHuQ:w9X7AyjHczEd6oJE0T64ktaorjHHuQ
                MD5:13900728115BC9E464A82F15A402FC36
                SHA1:68353AA94A6D6DD8BC4ADFDD00646A9E1F24AEAA
                SHA-256:315CAAC20BD6AACFB0189D072356D5C0849C826BD7BFCD506636A2368011914F
                SHA-512:8655D9EC03F82BE3DB56BAC4213B5FA1D73591AA67AB3E290CADC34843C1C61CCB6F4169CF977B30C971D7ED748E82DC9A8021489081C454CA9F037E50C91C36
                Malicious:false
                Preview:EA06.....G.q...N..{[.W.....{s..;e...h.~.bgE.R.@...S..&..=..9.S.5.-..8..1`..rS.R.....1.b..J.Fy..M.UJK..U.....).^d3i4BO)....}r.!..&...\.k3.E.st.Z..../....1.&..B.Z?..f_.|.D0.......G?.*.nO..G.`.......).y.b.U.k. .......&sE.g.....o......x.Q.-.."gU.x&..u:sX..T....6T.....U:.....t..x.i.S.4...H.C......sm.Uf.0..y...(. ..91..@....s8..K..@...............=...........V.e}..2...cgF.X..:4.....g.......Fc.=...l........8.V.5....D..k.-L..y.3nwC_..S.=..3u6....< ..\.h.:..+5..Q8.*$....<.h.g....0..##..R0..N./<..).......(.J5....{.t.OGc...?..>.m...g........>..M....1=.7>3^....Z.....r'.:5<.k5......N......=.Wp..G+...P...}?...q.....!E.x._-$...F)...G...q..i.[q..,8..."c..a;......~6T>\.o..;~....Q.h..?...u..0.}N.i..8..z....'.O.o)..H7u..S.o...........L"........W....83).....d.0....]0=....5...\{...2.Y........T......o..5.Yv..x..x.....T..#.....U:..]..pl5>L....M..=.f....f6..?}u...^M2........q..L.V.F.c..i.......2.x..k...>.......A..N,zS.....(.29\.t)v~.;...Z...n....p....J.....\...0.X..H..w
                Process:C:\Users\user\AppData\Local\directory\name.exe
                File Type:data
                Category:dropped
                Size (bytes):9798
                Entropy (8bit):7.632945449116072
                Encrypted:false
                SSDEEP:192:7zsoknxxSuLnhWgAI8o4i97xr3fiax+uDj9lN:fCnTSu9tt4iPr3fiajDjh
                MD5:85E8AB1310AA7CCFF7D96E49B6394EF5
                SHA1:A0F53C629DD518AA49188AF66660E91377A08380
                SHA-256:C5B24D222D7671AEC195C53E329D8FD782FE4A2BEB1DB9662C607BDD2B1E3288
                SHA-512:1DE95912FD16B1C802E69CC99CD9456CD53D5AE1265B75BE2DC5172E3B3C828442D5B0620F390749E55C06273142781CBFDE5494D555813C230E5306E469215C
                Malicious:false
                Preview:EA06..p........j..-..U.o9.......}i..m ...o=.......wi.Og..]........K........|...o..i.Om@.....?.N...@..h......t...9.Z..y@..6...o.z..Z......g.@.N.V...Z....N..s.........@.N....r.'.....c ....Ah.H.....P.F.3<..[..6...\.n....' ...x..x....B......Z'.0.O-s{L.|...Z. 5_..v.....5_..~.U....5_....U...5_..n.U..' 5\..>3...O@^.h.Z..y=.z..}=......@........G../Z..h......j......|.u....$.../.}?...g.G_T.......>_.......zy<.............................`.M..`... ...j...@..`.'.;..@{>KL..c..-3...Zg.._..~....A.>KH#G.i..3|v...G.;.. 8_..yj..i|v.....j.h.-V.......U..>..-..m......;..?..'...L..6...f..+P.fg.....=...`...f...E...Y....3.............v............2p....<d....,vp...D......!+P.''.....,f}9.Z.v.......r.9.X...c3.\.sm.Y.!...Gg ....,f.@.O.. .#>.....c..........~.h.s.....,vt...L..t......40......g`..........4..@.6.-..p..S.e..9...S..N...;<.`..@...@...y?.....c....['..wx.....vz....... .E......y6....p.c3.]..;..b.!....F ...B5j...........v|......f..].....B3......;?.X...h....X........g....Ng..e..j...
                Process:C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                File Type:data
                Category:dropped
                Size (bytes):185708
                Entropy (8bit):7.9786424774458595
                Encrypted:false
                SSDEEP:3072:w9/P7AyjyulPbCNR1SSfEdPCoh3E0ht3Te4XJitaotxjHHuQ:w9X7AyjHczEd6oJE0T64ktaorjHHuQ
                MD5:13900728115BC9E464A82F15A402FC36
                SHA1:68353AA94A6D6DD8BC4ADFDD00646A9E1F24AEAA
                SHA-256:315CAAC20BD6AACFB0189D072356D5C0849C826BD7BFCD506636A2368011914F
                SHA-512:8655D9EC03F82BE3DB56BAC4213B5FA1D73591AA67AB3E290CADC34843C1C61CCB6F4169CF977B30C971D7ED748E82DC9A8021489081C454CA9F037E50C91C36
                Malicious:false
                Preview:EA06.....G.q...N..{[.W.....{s..;e...h.~.bgE.R.@...S..&..=..9.S.5.-..8..1`..rS.R.....1.b..J.Fy..M.UJK..U.....).^d3i4BO)....}r.!..&...\.k3.E.st.Z..../....1.&..B.Z?..f_.|.D0.......G?.*.nO..G.`.......).y.b.U.k. .......&sE.g.....o......x.Q.-.."gU.x&..u:sX..T....6T.....U:.....t..x.i.S.4...H.C......sm.Uf.0..y...(. ..91..@....s8..K..@...............=...........V.e}..2...cgF.X..:4.....g.......Fc.=...l........8.V.5....D..k.-L..y.3nwC_..S.=..3u6....< ..\.h.:..+5..Q8.*$....<.h.g....0..##..R0..N./<..).......(.J5....{.t.OGc...?..>.m...g........>..M....1=.7>3^....Z.....r'.:5<.k5......N......=.Wp..G+...P...}?...q.....!E.x._-$...F)...G...q..i.[q..,8..."c..a;......~6T>\.o..;~....Q.h..?...u..0.}N.i..8..z....'.O.o)..H7u..S.o...........L"........W....83).....d.0....]0=....5...\{...2.Y........T......o..5.Yv..x..x.....T..#.....U:..]..pl5>L....M..=.f....f6..?}u...^M2........q..L.V.F.c..i.......2.x..k...>.......A..N,zS.....(.29\.t)v~.;...Z...n....p....J.....\...0.X..H..w
                Process:C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                File Type:data
                Category:dropped
                Size (bytes):9798
                Entropy (8bit):7.632945449116072
                Encrypted:false
                SSDEEP:192:7zsoknxxSuLnhWgAI8o4i97xr3fiax+uDj9lN:fCnTSu9tt4iPr3fiajDjh
                MD5:85E8AB1310AA7CCFF7D96E49B6394EF5
                SHA1:A0F53C629DD518AA49188AF66660E91377A08380
                SHA-256:C5B24D222D7671AEC195C53E329D8FD782FE4A2BEB1DB9662C607BDD2B1E3288
                SHA-512:1DE95912FD16B1C802E69CC99CD9456CD53D5AE1265B75BE2DC5172E3B3C828442D5B0620F390749E55C06273142781CBFDE5494D555813C230E5306E469215C
                Malicious:false
                Preview:EA06..p........j..-..U.o9.......}i..m ...o=.......wi.Og..]........K........|...o..i.Om@.....?.N...@..h......t...9.Z..y@..6...o.z..Z......g.@.N.V...Z....N..s.........@.N....r.'.....c ....Ah.H.....P.F.3<..[..6...\.n....' ...x..x....B......Z'.0.O-s{L.|...Z. 5_..v.....5_..~.U....5_....U...5_..n.U..' 5\..>3...O@^.h.Z..y=.z..}=......@........G../Z..h......j......|.u....$.../.}?...g.G_T.......>_.......zy<.............................`.M..`... ...j...@..`.'.;..@{>KL..c..-3...Zg.._..~....A.>KH#G.i..3|v...G.;.. 8_..yj..i|v.....j.h.-V.......U..>..-..m......;..?..'...L..6...f..+P.fg.....=...`...f...E...Y....3.............v............2p....<d....,vp...D......!+P.''.....,f}9.Z.v.......r.9.X...c3.\.sm.Y.!...Gg ....,f.@.O.. .#>.....c..........~.h.s.....,vt...L..t......40......g`..........4..@.6.-..p..S.e..9...S..N...;<.`..@...@...y?.....c....['..wx.....vz....... .E......y6....p.c3.]..;..b.!....F ...B5j...........v|......f..].....B3......;?.X...h....X........g....Ng..e..j...
                Process:C:\Users\user\AppData\Local\directory\name.exe
                File Type:data
                Category:dropped
                Size (bytes):185708
                Entropy (8bit):7.9786424774458595
                Encrypted:false
                SSDEEP:3072:w9/P7AyjyulPbCNR1SSfEdPCoh3E0ht3Te4XJitaotxjHHuQ:w9X7AyjHczEd6oJE0T64ktaorjHHuQ
                MD5:13900728115BC9E464A82F15A402FC36
                SHA1:68353AA94A6D6DD8BC4ADFDD00646A9E1F24AEAA
                SHA-256:315CAAC20BD6AACFB0189D072356D5C0849C826BD7BFCD506636A2368011914F
                SHA-512:8655D9EC03F82BE3DB56BAC4213B5FA1D73591AA67AB3E290CADC34843C1C61CCB6F4169CF977B30C971D7ED748E82DC9A8021489081C454CA9F037E50C91C36
                Malicious:false
                Preview:EA06.....G.q...N..{[.W.....{s..;e...h.~.bgE.R.@...S..&..=..9.S.5.-..8..1`..rS.R.....1.b..J.Fy..M.UJK..U.....).^d3i4BO)....}r.!..&...\.k3.E.st.Z..../....1.&..B.Z?..f_.|.D0.......G?.*.nO..G.`.......).y.b.U.k. .......&sE.g.....o......x.Q.-.."gU.x&..u:sX..T....6T.....U:.....t..x.i.S.4...H.C......sm.Uf.0..y...(. ..91..@....s8..K..@...............=...........V.e}..2...cgF.X..:4.....g.......Fc.=...l........8.V.5....D..k.-L..y.3nwC_..S.=..3u6....< ..\.h.:..+5..Q8.*$....<.h.g....0..##..R0..N./<..).......(.J5....{.t.OGc...?..>.m...g........>..M....1=.7>3^....Z.....r'.:5<.k5......N......=.Wp..G+...P...}?...q.....!E.x._-$...F)...G...q..i.[q..,8..."c..a;......~6T>\.o..;~....Q.h..?...u..0.}N.i..8..z....'.O.o)..H7u..S.o...........L"........W....83).....d.0....]0=....5...\{...2.Y........T......o..5.Yv..x..x.....T..#.....U:..]..pl5>L....M..=.f....f6..?}u...^M2........q..L.V.F.c..i.......2.x..k...>.......A..N,zS.....(.29\.t)v~.;...Z...n....p....J.....\...0.X..H..w
                Process:C:\Users\user\AppData\Local\directory\name.exe
                File Type:data
                Category:dropped
                Size (bytes):9798
                Entropy (8bit):7.632945449116072
                Encrypted:false
                SSDEEP:192:7zsoknxxSuLnhWgAI8o4i97xr3fiax+uDj9lN:fCnTSu9tt4iPr3fiajDjh
                MD5:85E8AB1310AA7CCFF7D96E49B6394EF5
                SHA1:A0F53C629DD518AA49188AF66660E91377A08380
                SHA-256:C5B24D222D7671AEC195C53E329D8FD782FE4A2BEB1DB9662C607BDD2B1E3288
                SHA-512:1DE95912FD16B1C802E69CC99CD9456CD53D5AE1265B75BE2DC5172E3B3C828442D5B0620F390749E55C06273142781CBFDE5494D555813C230E5306E469215C
                Malicious:false
                Preview:EA06..p........j..-..U.o9.......}i..m ...o=.......wi.Og..]........K........|...o..i.Om@.....?.N...@..h......t...9.Z..y@..6...o.z..Z......g.@.N.V...Z....N..s.........@.N....r.'.....c ....Ah.H.....P.F.3<..[..6...\.n....' ...x..x....B......Z'.0.O-s{L.|...Z. 5_..v.....5_..~.U....5_....U...5_..n.U..' 5\..>3...O@^.h.Z..y=.z..}=......@........G../Z..h......j......|.u....$.../.}?...g.G_T.......>_.......zy<.............................`.M..`... ...j...@..`.'.;..@{>KL..c..-3...Zg.._..~....A.>KH#G.i..3|v...G.;.. 8_..yj..i|v.....j.h.-V.......U..>..-..m......;..?..'...L..6...f..+P.fg.....=...`...f...E...Y....3.............v............2p....<d....,vp...D......!+P.''.....,f}9.Z.v.......r.9.X...c3.\.sm.Y.!...Gg ....,f.@.O.. .#>.....c..........~.h.s.....,vt...L..t......40......g`..........4..@.6.-..p..S.e..9...S..N...;<.`..@...@...y?.....c....['..wx.....vz....... .E......y6....p.c3.]..;..b.!....F ...B5j...........v|......f..].....B3......;?.X...h....X........g....Ng..e..j...
                Process:C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                File Type:data
                Category:dropped
                Size (bytes):28674
                Entropy (8bit):3.5884077472816505
                Encrypted:false
                SSDEEP:768:zOuVKtIXQWYw6zZgb+bUwCzFptdX9xDMPUuXbf12lZ+pTPpY9nx7lyilDxZTh:zNnrKVP0yilzh
                MD5:EE4CF49F57DBE9B317975148FC646C5A
                SHA1:D108703EB6FCD1CCE8EC0D2EF6CD0A8724DE207D
                SHA-256:B9D18F83221F16F2F21FF6596E108562172C0E51EE1E78FAE29FD4D512F9DC54
                SHA-512:5178A4E46D5D964F6AE9352749DCB29402AC6F75F85B117D4179FB04AF1FD4FAF8C2F588D1CB62D107E67FA9A3C4212C5C60BD9ADA662F7989EEC9ACDF6732DA
                Malicious:false
                Preview:7.<<?ilj?8ljjj797777<=<>i?=i777777==?@;<?;i@=<777777==?@;k?=ih>9777777==?@<<??i?=l777777==?@;<?hi@=<777777==?@;k?jih=j777777==?@<<?li?::777777==?@;<@7i@:9777777==?@;k@9ih9l777777==?@<<@;i?=;777777==?@;<@=i@=j777777==?@;k@?ih=j777777==?@<<@h::j7==?@;<@ji@=l777777==?@?k;;mmmmmmih>;777777==?@@<;=mmmmmmi?=;777777==?@?<;?mmmmmmi@=j777777==?@?k;hmmmmmmih=j777777==?@@<;jmmmmmmi?9l777777==?@?<;lmmmmmmi@=;777777==?@?k<7mmmmmmih=j777777==?@@<<9mmmmmmi?=j777777==?@?<<;mmmmmm::j@==?@?k<=mmmmmmih><777777==?@<<k7i?>:777777==?@;<k9i@=<777777==?@;kk;ih>9777777==?@<<k=i?::777777==?@;<k?i@:9777777==?@;kkhih9l777777==?@<<kji?=;777777==?@;<kli@=j777777==?@;kl7ih=j777777==?@<<l9::j7==?@;<l;i@=8777777==?@?k=?mmmmmmih=;777777==?@@<=hmmmmmmi?>=777777==?@?<=jmmmmmmi@=8777777==?@?k=lmmmmmmih>7777777==?@@<>7mmmmmmi?=@777777==?@?<>9mmmmmmi@::777777==?@?k>;mmmmmmih:9777777==?@@<>=mmmmmmi?9l777777==?@?<>?mmmmmmi@=;777777==?@?k>hmmmmmmih=j777777==?@@<>jmmmmmmi?=j777777==?@?<>lmmmmmm::j@==?@;k?7ih>:777777==?@<<h7i?=?
                Process:C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):1145344
                Entropy (8bit):7.006978595704728
                Encrypted:false
                SSDEEP:24576:nqDEvCTbMWu7rQYlBQcBiT6rprG8a4dz681iuw:nTvC/MTQYxsWR7a4h6Eiu
                MD5:6BBFDED2BAA5A18CC97D10516EE91C78
                SHA1:9E39944C9D057D134B119C677BE07975704E546E
                SHA-256:636597DD8C59135BE43119197EE60DB2268ABAA5D8A60F4C0AC296ACD9DC444F
                SHA-512:4D952C2ED6A876BD639B2A9E4BAA5EEADBF01F314BCD1A2C80DA564C4594330A5B26DC351C528B5C0D574E7013B387349CE77A274257B0DF902A48E707545605
                Malicious:true
                Antivirus:
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L...3..f..........".................w.............@.................................o.....@...@.......@.....................d...|....@.......................P...u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc........@......................@..@.reloc...u...P...v..................@..B........................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\directory\name.exe
                File Type:data
                Category:dropped
                Size (bytes):270
                Entropy (8bit):3.417626411866224
                Encrypted:false
                SSDEEP:6:DMM8lfm3OOQdUfclwL1UEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNlwBQ1A1z4mA2n
                MD5:351EC8C2B40C00A311F6BAD2F7D440D6
                SHA1:ADA0755D548E4B6257B50D665E6CEB9ECF221955
                SHA-256:DCC00A312BA3D4049532E70CA0F9E2BE03A22C633F09123DEBDA40F021EE9443
                SHA-512:150DF05A0B2E481848D6CA49CE5E0C38FCD4F76BB814A1838F9B9F5DE7425BD80FD2EF3B2B2A77DDCD47446D65395817E651A4E9D9636F483BB70DD0944B039B
                Malicious:true
                Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.h.u.b.e.r.t.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.006978595704728
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                File size:1'145'344 bytes
                MD5:6bbfded2baa5a18cc97d10516ee91c78
                SHA1:9e39944c9d057d134b119c677be07975704e546e
                SHA256:636597dd8c59135be43119197ee60db2268abaa5d8a60f4c0ac296acd9dc444f
                SHA512:4d952c2ed6a876bd639b2a9e4baa5eeadbf01f314bcd1a2c80da564c4594330a5b26dc351c528b5c0d574e7013b387349ce77a274257b0df902a48e707545605
                SSDEEP:24576:nqDEvCTbMWu7rQYlBQcBiT6rprG8a4dz681iuw:nTvC/MTQYxsWR7a4h6Eiu
                TLSH:7F35BF0273C1D062FF9B96334B5AF6115BBC69260123E62F13981D7ABE701B1563E7A3
                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                Icon Hash:aaf3e3e3938382a0
                Entrypoint:0x420577
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                Time Stamp:0x66B2F733 [Wed Aug 7 04:25:23 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:5
                OS Version Minor:1
                File Version Major:5
                File Version Minor:1
                Subsystem Version Major:5
                Subsystem Version Minor:1
                Import Hash:948cc502fe9226992dce9417f952fce3
                Instruction
                call 00007FA5B04C76E3h
                jmp 00007FA5B04C6FEFh
                push ebp
                mov ebp, esp
                push esi
                push dword ptr [ebp+08h]
                mov esi, ecx
                call 00007FA5B04C71CDh
                mov dword ptr [esi], 0049FDF0h
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                and dword ptr [ecx+04h], 00000000h
                mov eax, ecx
                and dword ptr [ecx+08h], 00000000h
                mov dword ptr [ecx+04h], 0049FDF8h
                mov dword ptr [ecx], 0049FDF0h
                ret
                push ebp
                mov ebp, esp
                push esi
                push dword ptr [ebp+08h]
                mov esi, ecx
                call 00007FA5B04C719Ah
                mov dword ptr [esi], 0049FE0Ch
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                and dword ptr [ecx+04h], 00000000h
                mov eax, ecx
                and dword ptr [ecx+08h], 00000000h
                mov dword ptr [ecx+04h], 0049FE14h
                mov dword ptr [ecx], 0049FE0Ch
                ret
                push ebp
                mov ebp, esp
                push esi
                mov esi, ecx
                lea eax, dword ptr [esi+04h]
                mov dword ptr [esi], 0049FDD0h
                and dword ptr [eax], 00000000h
                and dword ptr [eax+04h], 00000000h
                push eax
                mov eax, dword ptr [ebp+08h]
                add eax, 04h
                push eax
                call 00007FA5B04C9D8Dh
                pop ecx
                pop ecx
                mov eax, esi
                pop esi
                pop ebp
                retn 0004h
                lea eax, dword ptr [ecx+04h]
                mov dword ptr [ecx], 0049FDD0h
                push eax
                call 00007FA5B04C9DD8h
                pop ecx
                ret
                push ebp
                mov ebp, esp
                push esi
                mov esi, ecx
                lea eax, dword ptr [esi+04h]
                mov dword ptr [esi], 0049FDD0h
                push eax
                call 00007FA5B04C9DC1h
                test byte ptr [ebp+08h], 00000001h
                pop ecx
                Programming Language:
                • [ C ] VS2008 SP1 build 30729
                • [IMP] VS2008 SP1 build 30729
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x40ea8.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1150000x7594.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0xd40000x40ea80x41000494435903c147b73430fffbe7f0382baFalse0.8984375data7.826116146702784IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1150000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                RT_RCDATA0xdc7b80x3816edata1.0003525694039401
                RT_GROUP_ICON0x1149280x76dataEnglishGreat Britain0.6610169491525424
                RT_GROUP_ICON0x1149a00x14dataEnglishGreat Britain1.25
                RT_GROUP_ICON0x1149b40x14dataEnglishGreat Britain1.15
                RT_GROUP_ICON0x1149c80x14dataEnglishGreat Britain1.25
                RT_VERSION0x1149dc0xdcdataEnglishGreat Britain0.6181818181818182
                RT_MANIFEST0x114ab80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                DLLImport
                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                PSAPI.DLLGetProcessMemoryInfo
                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                UxTheme.dllIsThemeActive
                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                Language of compilation systemCountry where language is spokenMap
                EnglishGreat Britain
                TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                2024-08-08T07:42:07.576537+0200TCP2031453ET MALWARE FormBook CnC Checkin (GET)14971080192.168.2.8185.53.179.91
                2024-08-08T07:41:02.068628+0200TCP2031453ET MALWARE FormBook CnC Checkin (GET)14974280192.168.2.83.33.130.190
                2024-08-08T07:42:54.485193+0200TCP2031453ET MALWARE FormBook CnC Checkin (GET)14973280192.168.2.8154.23.184.95
                TimestampSource PortDest PortSource IPDest IP
                Aug 8, 2024 07:42:07.061240911 CEST4971080192.168.2.8185.53.179.91
                Aug 8, 2024 07:42:07.066268921 CEST8049710185.53.179.91192.168.2.8
                Aug 8, 2024 07:42:07.066390991 CEST4971080192.168.2.8185.53.179.91
                Aug 8, 2024 07:42:07.066473961 CEST4971080192.168.2.8185.53.179.91
                Aug 8, 2024 07:42:07.072401047 CEST8049710185.53.179.91192.168.2.8
                Aug 8, 2024 07:42:07.569130898 CEST4971080192.168.2.8185.53.179.91
                Aug 8, 2024 07:42:07.574790955 CEST8049710185.53.179.91192.168.2.8
                Aug 8, 2024 07:42:07.576536894 CEST4971080192.168.2.8185.53.179.91
                Aug 8, 2024 07:42:53.882800102 CEST4973280192.168.2.8154.23.184.95
                Aug 8, 2024 07:42:53.887706995 CEST8049732154.23.184.95192.168.2.8
                Aug 8, 2024 07:42:53.889226913 CEST4973280192.168.2.8154.23.184.95
                Aug 8, 2024 07:42:53.889275074 CEST4973280192.168.2.8154.23.184.95
                Aug 8, 2024 07:42:53.894062042 CEST8049732154.23.184.95192.168.2.8
                Aug 8, 2024 07:42:54.398386002 CEST4973280192.168.2.8154.23.184.95
                Aug 8, 2024 07:42:54.446926117 CEST8049732154.23.184.95192.168.2.8
                Aug 8, 2024 07:42:54.483900070 CEST8049732154.23.184.95192.168.2.8
                Aug 8, 2024 07:42:54.485193014 CEST4973280192.168.2.8154.23.184.95
                TimestampSource PortDest PortSource IPDest IP
                Aug 8, 2024 07:41:46.976159096 CEST4991953192.168.2.81.1.1.1
                Aug 8, 2024 07:41:47.242764950 CEST53499191.1.1.1192.168.2.8
                Aug 8, 2024 07:42:06.991030931 CEST5813953192.168.2.81.1.1.1
                Aug 8, 2024 07:42:07.060318947 CEST53581391.1.1.1192.168.2.8
                Aug 8, 2024 07:42:26.023390055 CEST5449553192.168.2.81.1.1.1
                Aug 8, 2024 07:42:26.039946079 CEST53544951.1.1.1192.168.2.8
                Aug 8, 2024 07:42:43.110415936 CEST4926453192.168.2.81.1.1.1
                Aug 8, 2024 07:42:53.556288958 CEST6117253192.168.2.81.1.1.1
                Aug 8, 2024 07:42:53.877638102 CEST53611721.1.1.1192.168.2.8
                Aug 8, 2024 07:43:17.166632891 CEST5995653192.168.2.81.1.1.1
                Aug 8, 2024 07:43:18.169378042 CEST5995653192.168.2.81.1.1.1
                Aug 8, 2024 07:43:18.170994043 CEST53599561.1.1.1192.168.2.8
                Aug 8, 2024 07:43:18.176214933 CEST53599561.1.1.1192.168.2.8
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Aug 8, 2024 07:41:46.976159096 CEST192.168.2.81.1.1.10x8e38Standard query (0)www.45941978.topA (IP address)IN (0x0001)false
                Aug 8, 2024 07:42:06.991030931 CEST192.168.2.81.1.1.10xf4eStandard query (0)www.authentication-app-69447.bondA (IP address)IN (0x0001)false
                Aug 8, 2024 07:42:26.023390055 CEST192.168.2.81.1.1.10xd2f4Standard query (0)www.borghardt.xyzA (IP address)IN (0x0001)false
                Aug 8, 2024 07:42:43.110415936 CEST192.168.2.81.1.1.10xc19bStandard query (0)api.msn.comA (IP address)IN (0x0001)false
                Aug 8, 2024 07:42:53.556288958 CEST192.168.2.81.1.1.10xb8aaStandard query (0)www.hm23s.topA (IP address)IN (0x0001)false
                Aug 8, 2024 07:43:17.166632891 CEST192.168.2.81.1.1.10x2c6bStandard query (0)www.alqahtani.siteA (IP address)IN (0x0001)false
                Aug 8, 2024 07:43:18.169378042 CEST192.168.2.81.1.1.10x2c6bStandard query (0)www.alqahtani.siteA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Aug 8, 2024 07:42:07.060318947 CEST1.1.1.1192.168.2.80xf4eNo error (0)www.authentication-app-69447.bond185.53.179.91A (IP address)IN (0x0001)false
                Aug 8, 2024 07:42:26.039946079 CEST1.1.1.1192.168.2.80xd2f4Name error (3)www.borghardt.xyznonenoneA (IP address)IN (0x0001)false
                Aug 8, 2024 07:42:43.117471933 CEST1.1.1.1192.168.2.80xc19bNo error (0)api.msn.comapi-msn-com.a-0003.a-msedge.netCNAME (Canonical name)IN (0x0001)false
                Aug 8, 2024 07:42:53.877638102 CEST1.1.1.1192.168.2.80xb8aaNo error (0)www.hm23s.tophm23s.topCNAME (Canonical name)IN (0x0001)false
                Aug 8, 2024 07:42:53.877638102 CEST1.1.1.1192.168.2.80xb8aaNo error (0)hm23s.top154.23.184.95A (IP address)IN (0x0001)false
                Aug 8, 2024 07:43:18.170994043 CEST1.1.1.1192.168.2.80x2c6bNo error (0)www.alqahtani.sitealqahtani.siteCNAME (Canonical name)IN (0x0001)false
                Aug 8, 2024 07:43:18.170994043 CEST1.1.1.1192.168.2.80x2c6bNo error (0)alqahtani.site3.33.130.190A (IP address)IN (0x0001)false
                Aug 8, 2024 07:43:18.170994043 CEST1.1.1.1192.168.2.80x2c6bNo error (0)alqahtani.site15.197.148.33A (IP address)IN (0x0001)false
                Aug 8, 2024 07:43:18.176214933 CEST1.1.1.1192.168.2.80x2c6bNo error (0)www.alqahtani.sitealqahtani.siteCNAME (Canonical name)IN (0x0001)false
                Aug 8, 2024 07:43:18.176214933 CEST1.1.1.1192.168.2.80x2c6bNo error (0)alqahtani.site15.197.148.33A (IP address)IN (0x0001)false
                Aug 8, 2024 07:43:18.176214933 CEST1.1.1.1192.168.2.80x2c6bNo error (0)alqahtani.site3.33.130.190A (IP address)IN (0x0001)false
                • www.authentication-app-69447.bond
                • www.hm23s.top
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.849710185.53.179.91804084C:\Windows\explorer.exe
                TimestampBytes transferredDirectionData
                Aug 8, 2024 07:42:07.066473961 CEST180OUTGET /jd21/?uzud=6Gu9CMF4xxBwNWcJ0Rc7SYqx+yd/BzhFIF9ofXjjgiHpTqtqGAdfmqUQNhv6VtLeomt1&IjBDz2=9rAhxBy0 HTTP/1.1
                Host: www.authentication-app-69447.bond
                Connection: close
                Data Raw: 00 00 00 00 00 00 00
                Data Ascii:


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.849732154.23.184.95806296C:\Windows\explorer.exe
                TimestampBytes transferredDirectionData
                Aug 8, 2024 07:42:53.889275074 CEST158OUTGET /jd21/?FPTX=E8EgvcVhhAQQFir9OK6E+Mqm7tqMiVehFrZTPh8pbZDzIj0aN6RyatkqXtPCo6PBps4o&BlO=O0DXpF3H2 HTTP/1.1
                Host: www.hm23s.top
                Connection: close
                Data Raw: 00 00 00 00 00 00 00
                Data Ascii:


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:41:06
                Start date:08/08/2024
                Path:C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
                Imagebase:0x400000
                File size:1'145'344 bytes
                MD5 hash:6BBFDED2BAA5A18CC97D10516EE91C78
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:2
                Start time:01:41:07
                Start date:08/08/2024
                Path:C:\Users\user\AppData\Local\directory\name.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
                Imagebase:0x620000
                File size:1'145'344 bytes
                MD5 hash:6BBFDED2BAA5A18CC97D10516EE91C78
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.1450894006.0000000001DF0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Antivirus matches:
                • Detection: 100%, Joe Sandbox ML
                Reputation:low
                Has exited:true

                Target ID:3
                Start time:01:41:08
                Start date:08/08/2024
                Path:C:\Windows\SysWOW64\svchost.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe"
                Imagebase:0xfc0000
                File size:46'504 bytes
                MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.1511902893.0000000003A80000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.1511948267.0000000003AB0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000003.00000002.1511237211.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:01:41:09
                Start date:08/08/2024
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\Explorer.EXE
                Imagebase:0x7ff62d7d0000
                File size:5'141'208 bytes
                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:01:41:12
                Start date:08/08/2024
                Path:C:\Windows\SysWOW64\explorer.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\SysWOW64\explorer.exe"
                Imagebase:0x530000
                File size:4'514'184 bytes
                MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.2683430368.0000000003610000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.2683608489.0000000003640000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.2682364766.0000000003200000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:moderate
                Has exited:false

                Target ID:6
                Start time:01:41:16
                Start date:08/08/2024
                Path:C:\Windows\SysWOW64\cmd.exe
                Wow64 process (32bit):true
                Commandline:/c del "C:\Windows\SysWOW64\svchost.exe"
                Imagebase:0xa40000
                File size:236'544 bytes
                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:7
                Start time:01:41:16
                Start date:08/08/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff6ee680000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:8
                Start time:01:41:21
                Start date:08/08/2024
                Path:C:\Windows\System32\wscript.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                Imagebase:0x7ff7f4f40000
                File size:170'496 bytes
                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:9
                Start time:01:41:21
                Start date:08/08/2024
                Path:C:\Users\user\AppData\Local\directory\name.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                Imagebase:0x620000
                File size:1'145'344 bytes
                MD5 hash:6BBFDED2BAA5A18CC97D10516EE91C78
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000009.00000002.1590633261.0000000000B50000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low
                Has exited:true

                Target ID:10
                Start time:01:41:22
                Start date:08/08/2024
                Path:C:\Windows\SysWOW64\svchost.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                Imagebase:0xfc0000
                File size:46'504 bytes
                MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.1626007911.0000000000F20000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.1626065993.0000000000F50000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.1625529448.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:high
                Has exited:true

                Target ID:11
                Start time:01:41:23
                Start date:08/08/2024
                Path:C:\Windows\SysWOW64\mstsc.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\SysWOW64\mstsc.exe"
                Imagebase:0x910000
                File size:1'264'640 bytes
                MD5 hash:EA4A02BE14C405327EEBA8D9AD2BD42C
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000B.00000002.1635324999.0000000002B10000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:moderate
                Has exited:true

                Target ID:20
                Start time:01:42:36
                Start date:08/08/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 4084 -s 7332
                Imagebase:0x7ff743850000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:21
                Start time:01:42:38
                Start date:08/08/2024
                Path:C:\Windows\explorer.exe
                Wow64 process (32bit):false
                Commandline:explorer.exe
                Imagebase:0x7ff62d7d0000
                File size:5'141'208 bytes
                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                Has elevated privileges:false
                Has administrator privileges:false
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Reset < >

                  Execution Graph

                  Execution Coverage:3.1%
                  Dynamic/Decrypted Code Coverage:0.4%
                  Signature Coverage:4.5%
                  Total number of Nodes:2000
                  Total number of Limit Nodes:49
                  execution_graph 95983 438402 95988 4381be 95983->95988 95986 43842a 95993 4381ef try_get_first_available_module 95988->95993 95990 4383ee 96007 4327ec 26 API calls _abort 95990->96007 95992 438343 95992->95986 96000 440984 95992->96000 95996 438338 95993->95996 96003 428e0b 40 API calls 2 library calls 95993->96003 95995 43838c 95995->95996 96004 428e0b 40 API calls 2 library calls 95995->96004 95996->95992 96006 42f2d9 20 API calls _abort 95996->96006 95998 4383ab 95998->95996 96005 428e0b 40 API calls 2 library calls 95998->96005 96008 440081 96000->96008 96002 44099f 96002->95986 96003->95995 96004->95998 96005->95996 96006->95990 96007->95992 96011 44008d __FrameHandler3::FrameUnwindToState 96008->96011 96009 44009b 96066 42f2d9 20 API calls _abort 96009->96066 96011->96009 96013 4400d4 96011->96013 96012 4400a0 96067 4327ec 26 API calls _abort 96012->96067 96019 44065b 96013->96019 96018 4400aa __fread_nolock 96018->96002 96069 44042f 96019->96069 96022 4406a6 96087 435221 96022->96087 96023 44068d 96101 42f2c6 20 API calls _abort 96023->96101 96026 4406ab 96027 4406b4 96026->96027 96028 4406cb 96026->96028 96103 42f2c6 20 API calls _abort 96027->96103 96100 44039a CreateFileW 96028->96100 96029 440692 96102 42f2d9 20 API calls _abort 96029->96102 96033 4406b9 96104 42f2d9 20 API calls _abort 96033->96104 96034 4400f8 96068 440121 LeaveCriticalSection __wsopen_s 96034->96068 96036 440781 GetFileType 96037 4407d3 96036->96037 96038 44078c GetLastError 96036->96038 96109 43516a 21 API calls 2 library calls 96037->96109 96107 42f2a3 20 API calls __dosmaperr 96038->96107 96039 440756 GetLastError 96106 42f2a3 20 API calls __dosmaperr 96039->96106 96041 440704 96041->96036 96041->96039 96105 44039a CreateFileW 96041->96105 96043 44079a CloseHandle 96043->96029 96045 4407c3 96043->96045 96108 42f2d9 20 API calls _abort 96045->96108 96047 440749 96047->96036 96047->96039 96049 4407f4 96051 440840 96049->96051 96110 4405ab 72 API calls 3 library calls 96049->96110 96050 4407c8 96050->96029 96055 44086d 96051->96055 96111 44014d 72 API calls 4 library calls 96051->96111 96054 440866 96054->96055 96056 44087e 96054->96056 96112 4386ae 96055->96112 96056->96034 96058 4408fc CloseHandle 96056->96058 96127 44039a CreateFileW 96058->96127 96060 440927 96061 440931 GetLastError 96060->96061 96062 44095d 96060->96062 96128 42f2a3 20 API calls __dosmaperr 96061->96128 96062->96034 96064 44093d 96129 435333 21 API calls 2 library calls 96064->96129 96066->96012 96067->96018 96068->96018 96070 44046a 96069->96070 96071 440450 96069->96071 96130 4403bf 96070->96130 96071->96070 96137 42f2d9 20 API calls _abort 96071->96137 96074 44045f 96138 4327ec 26 API calls _abort 96074->96138 96076 4404a2 96077 4404d1 96076->96077 96139 42f2d9 20 API calls _abort 96076->96139 96080 440524 96077->96080 96141 42d70d 26 API calls 2 library calls 96077->96141 96080->96022 96080->96023 96081 44051f 96081->96080 96084 44059e 96081->96084 96082 4404c6 96140 4327ec 26 API calls _abort 96082->96140 96142 4327fc 11 API calls _abort 96084->96142 96086 4405aa 96088 43522d __FrameHandler3::FrameUnwindToState 96087->96088 96145 432f5e EnterCriticalSection 96088->96145 96090 435234 96092 435259 96090->96092 96096 4352c7 EnterCriticalSection 96090->96096 96097 43527b 96090->96097 96149 435000 96092->96149 96093 4352a4 __fread_nolock 96093->96026 96096->96097 96098 4352d4 LeaveCriticalSection 96096->96098 96146 43532a 96097->96146 96098->96090 96100->96041 96101->96029 96102->96034 96103->96033 96104->96029 96105->96047 96106->96029 96107->96043 96108->96050 96109->96049 96110->96051 96111->96054 96175 4353c4 96112->96175 96114 4386c4 96188 435333 21 API calls 2 library calls 96114->96188 96116 4386be 96116->96114 96117 4386f6 96116->96117 96120 4353c4 __wsopen_s 26 API calls 96116->96120 96117->96114 96118 4353c4 __wsopen_s 26 API calls 96117->96118 96121 438702 FindCloseChangeNotification 96118->96121 96119 43871c 96122 43873e 96119->96122 96189 42f2a3 20 API calls __dosmaperr 96119->96189 96123 4386ed 96120->96123 96121->96114 96124 43870e GetLastError 96121->96124 96122->96034 96126 4353c4 __wsopen_s 26 API calls 96123->96126 96124->96114 96126->96117 96127->96060 96128->96064 96129->96062 96131 4403d7 96130->96131 96132 4403f2 96131->96132 96143 42f2d9 20 API calls _abort 96131->96143 96132->96076 96134 440416 96144 4327ec 26 API calls _abort 96134->96144 96136 440421 96136->96076 96137->96074 96138->96070 96139->96082 96140->96077 96141->96081 96142->96086 96143->96134 96144->96136 96145->96090 96157 432fa6 LeaveCriticalSection 96146->96157 96148 435331 96148->96093 96158 434c7d 96149->96158 96151 435012 96155 43501f 96151->96155 96165 433405 11 API calls 2 library calls 96151->96165 96154 435071 96154->96097 96156 435147 EnterCriticalSection 96154->96156 96166 4329c8 96155->96166 96156->96097 96157->96148 96163 434c8a _abort 96158->96163 96159 434cca 96173 42f2d9 20 API calls _abort 96159->96173 96160 434cb5 RtlAllocateHeap 96162 434cc8 96160->96162 96160->96163 96162->96151 96163->96159 96163->96160 96172 424ead 7 API calls 2 library calls 96163->96172 96165->96151 96167 4329d3 RtlFreeHeap 96166->96167 96168 4329fc __dosmaperr 96166->96168 96167->96168 96169 4329e8 96167->96169 96168->96154 96174 42f2d9 20 API calls _abort 96169->96174 96171 4329ee GetLastError 96171->96168 96172->96163 96173->96162 96174->96171 96176 4353d1 96175->96176 96177 4353e6 96175->96177 96190 42f2c6 20 API calls _abort 96176->96190 96181 43540b 96177->96181 96192 42f2c6 20 API calls _abort 96177->96192 96180 4353d6 96191 42f2d9 20 API calls _abort 96180->96191 96181->96116 96182 435416 96193 42f2d9 20 API calls _abort 96182->96193 96185 4353de 96185->96116 96186 43541e 96194 4327ec 26 API calls _abort 96186->96194 96188->96119 96189->96122 96190->96180 96191->96185 96192->96182 96193->96186 96194->96185 96195 442ba5 96196 402b25 96195->96196 96197 442baf 96195->96197 96223 402b83 7 API calls 96196->96223 96238 403a5a 96197->96238 96201 442bb8 96245 409cb3 96201->96245 96204 402b2f 96213 402b44 96204->96213 96227 403837 96204->96227 96205 442bc6 96206 442bf5 96205->96206 96207 442bce 96205->96207 96208 4033c6 22 API calls 96206->96208 96251 4033c6 96207->96251 96222 442bf1 GetForegroundWindow ShellExecuteW 96208->96222 96217 402b5f 96213->96217 96237 4030f2 Shell_NotifyIconW ___scrt_fastfail 96213->96237 96215 442c26 96215->96217 96219 402b66 SetCurrentDirectoryW 96217->96219 96221 402b7a 96219->96221 96220 4033c6 22 API calls 96220->96222 96222->96215 96269 402cd4 7 API calls 96223->96269 96225 402b2a 96226 402c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96225->96226 96226->96204 96228 403862 ___scrt_fastfail 96227->96228 96270 404212 96228->96270 96232 443386 Shell_NotifyIconW 96233 403906 Shell_NotifyIconW 96274 403923 96233->96274 96235 4038e8 96235->96232 96235->96233 96236 40391c 96236->96213 96237->96217 96364 441f50 96238->96364 96241 409cb3 22 API calls 96242 403a8d 96241->96242 96366 403aa2 96242->96366 96244 403a97 96244->96201 96246 409cc2 _wcslen 96245->96246 96247 41fe0b 22 API calls 96246->96247 96248 409cea __fread_nolock 96247->96248 96249 41fddb 22 API calls 96248->96249 96250 409d00 96249->96250 96250->96205 96252 4033dd 96251->96252 96253 4430bb 96251->96253 96386 4033ee 96252->96386 96255 41fddb 22 API calls 96253->96255 96257 4430c5 _wcslen 96255->96257 96256 4033e8 96260 406350 96256->96260 96258 41fe0b 22 API calls 96257->96258 96259 4430fe __fread_nolock 96258->96259 96261 406362 96260->96261 96262 444a51 96260->96262 96401 406373 96261->96401 96411 404a88 22 API calls __fread_nolock 96262->96411 96265 444a5b 96267 444a67 96265->96267 96268 40a8c7 22 API calls 96265->96268 96266 40636e 96266->96220 96268->96267 96269->96225 96271 4435a4 96270->96271 96272 4038b7 96270->96272 96271->96272 96273 4435ad DestroyIcon 96271->96273 96272->96235 96296 46c874 42 API calls _strftime 96272->96296 96273->96272 96275 40393f 96274->96275 96294 403a13 96274->96294 96297 406270 96275->96297 96278 443393 LoadStringW 96281 4433ad 96278->96281 96279 40395a 96302 406b57 96279->96302 96290 403994 ___scrt_fastfail 96281->96290 96314 40a8c7 96281->96314 96282 40396f 96283 40397c 96282->96283 96284 4433c9 96282->96284 96283->96281 96286 403986 96283->96286 96287 406350 22 API calls 96284->96287 96288 406350 22 API calls 96286->96288 96289 4433d7 96287->96289 96288->96290 96289->96290 96291 4033c6 22 API calls 96289->96291 96292 4039f9 Shell_NotifyIconW 96290->96292 96293 4433f9 96291->96293 96292->96294 96295 4033c6 22 API calls 96293->96295 96294->96236 96295->96290 96296->96235 96318 41fe0b 96297->96318 96299 406295 96328 41fddb 96299->96328 96301 40394d 96301->96278 96301->96279 96303 444ba1 96302->96303 96304 406b67 _wcslen 96302->96304 96354 4093b2 96303->96354 96307 406ba2 96304->96307 96308 406b7d 96304->96308 96306 444baa 96306->96306 96310 41fddb 22 API calls 96307->96310 96353 406f34 22 API calls 96308->96353 96312 406bae 96310->96312 96311 406b85 __fread_nolock 96311->96282 96313 41fe0b 22 API calls 96312->96313 96313->96311 96315 40a8ea __fread_nolock 96314->96315 96316 40a8db 96314->96316 96315->96290 96316->96315 96317 41fe0b 22 API calls 96316->96317 96317->96315 96320 41fddb 96318->96320 96321 41fdfa 96320->96321 96324 41fdfc 96320->96324 96338 42ea0c 96320->96338 96345 424ead 7 API calls 2 library calls 96320->96345 96321->96299 96323 42066d 96347 4232a4 RaiseException 96323->96347 96324->96323 96346 4232a4 RaiseException 96324->96346 96327 42068a 96327->96299 96330 41fde0 96328->96330 96329 42ea0c ___std_exception_copy 21 API calls 96329->96330 96330->96329 96331 41fdfa 96330->96331 96334 41fdfc 96330->96334 96350 424ead 7 API calls 2 library calls 96330->96350 96331->96301 96333 42066d 96352 4232a4 RaiseException 96333->96352 96334->96333 96351 4232a4 RaiseException 96334->96351 96337 42068a 96337->96301 96343 433820 _abort 96338->96343 96339 43385e 96349 42f2d9 20 API calls _abort 96339->96349 96341 433849 RtlAllocateHeap 96342 43385c 96341->96342 96341->96343 96342->96320 96343->96339 96343->96341 96348 424ead 7 API calls 2 library calls 96343->96348 96345->96320 96346->96323 96347->96327 96348->96343 96349->96342 96350->96330 96351->96333 96352->96337 96353->96311 96355 4093c9 __fread_nolock 96354->96355 96356 4093c0 96354->96356 96355->96306 96356->96355 96358 40aec9 96356->96358 96359 40aed9 __fread_nolock 96358->96359 96360 40aedc 96358->96360 96359->96355 96361 41fddb 22 API calls 96360->96361 96362 40aee7 96361->96362 96363 41fe0b 22 API calls 96362->96363 96363->96359 96365 403a67 GetModuleFileNameW 96364->96365 96365->96241 96367 441f50 __wsopen_s 96366->96367 96368 403aaf GetFullPathNameW 96367->96368 96369 403ae9 96368->96369 96370 403ace 96368->96370 96380 40a6c3 96369->96380 96372 406b57 22 API calls 96370->96372 96373 403ada 96372->96373 96376 4037a0 96373->96376 96377 4037ae 96376->96377 96378 4093b2 22 API calls 96377->96378 96379 4037c2 96378->96379 96379->96244 96381 40a6d0 96380->96381 96382 40a6dd 96380->96382 96381->96373 96383 41fddb 22 API calls 96382->96383 96384 40a6e7 96383->96384 96385 41fe0b 22 API calls 96384->96385 96385->96381 96387 4033fe _wcslen 96386->96387 96388 403411 96387->96388 96389 44311d 96387->96389 96396 40a587 96388->96396 96391 41fddb 22 API calls 96389->96391 96393 443127 96391->96393 96392 40341e __fread_nolock 96392->96256 96394 41fe0b 22 API calls 96393->96394 96395 443157 __fread_nolock 96394->96395 96397 40a59d 96396->96397 96400 40a598 __fread_nolock 96396->96400 96398 41fe0b 22 API calls 96397->96398 96399 44f80f 96397->96399 96398->96400 96399->96399 96400->96392 96402 4063b6 __fread_nolock 96401->96402 96403 406382 96401->96403 96402->96266 96403->96402 96404 444a82 96403->96404 96405 4063a9 96403->96405 96407 41fddb 22 API calls 96404->96407 96406 40a587 22 API calls 96405->96406 96406->96402 96408 444a91 96407->96408 96409 41fe0b 22 API calls 96408->96409 96410 444ac5 __fread_nolock 96409->96410 96411->96265 96412 402de3 96413 402df0 __wsopen_s 96412->96413 96414 402e09 96413->96414 96415 442c2b ___scrt_fastfail 96413->96415 96416 403aa2 23 API calls 96414->96416 96417 442c47 GetOpenFileNameW 96415->96417 96418 402e12 96416->96418 96419 442c96 96417->96419 96428 402da5 96418->96428 96422 406b57 22 API calls 96419->96422 96424 442cab 96422->96424 96424->96424 96425 402e27 96446 4044a8 96425->96446 96429 441f50 __wsopen_s 96428->96429 96430 402db2 GetLongPathNameW 96429->96430 96431 406b57 22 API calls 96430->96431 96432 402dda 96431->96432 96433 403598 96432->96433 96475 40a961 96433->96475 96436 403aa2 23 API calls 96437 4035b5 96436->96437 96438 4035c0 96437->96438 96439 4432eb 96437->96439 96480 40515f 96438->96480 96443 44330d 96439->96443 96492 41ce60 41 API calls 96439->96492 96445 4035df 96445->96425 96493 404ecb 96446->96493 96449 443833 96515 472cf9 96449->96515 96450 404ecb 94 API calls 96452 4044e1 96450->96452 96452->96449 96454 4044e9 96452->96454 96453 443848 96455 44384c 96453->96455 96456 443869 96453->96456 96458 443854 96454->96458 96459 4044f5 96454->96459 96565 404f39 96455->96565 96457 41fe0b 22 API calls 96456->96457 96474 4438ae 96457->96474 96571 46da5a 82 API calls 96458->96571 96564 40940c 136 API calls 2 library calls 96459->96564 96463 443862 96463->96456 96464 402e31 96465 404f39 68 API calls 96468 443a5f 96465->96468 96468->96465 96573 46989b 82 API calls __wsopen_s 96468->96573 96471 409cb3 22 API calls 96471->96474 96474->96468 96474->96471 96541 46967e 96474->96541 96544 470b5a 96474->96544 96550 40a4a1 96474->96550 96558 403ff7 96474->96558 96572 4695ad 42 API calls _wcslen 96474->96572 96476 41fe0b 22 API calls 96475->96476 96477 40a976 96476->96477 96478 41fddb 22 API calls 96477->96478 96479 4035aa 96478->96479 96479->96436 96481 40518f __fread_nolock 96480->96481 96482 40516e 96480->96482 96483 41fddb 22 API calls 96481->96483 96484 41fe0b 22 API calls 96482->96484 96485 4035cc 96483->96485 96484->96481 96486 4035f3 96485->96486 96487 403605 96486->96487 96491 403624 __fread_nolock 96486->96491 96489 41fe0b 22 API calls 96487->96489 96488 41fddb 22 API calls 96490 40363b 96488->96490 96489->96491 96490->96445 96491->96488 96492->96439 96574 404e90 LoadLibraryA 96493->96574 96498 404ef6 LoadLibraryExW 96582 404e59 LoadLibraryA 96498->96582 96499 443ccf 96501 404f39 68 API calls 96499->96501 96503 443cd6 96501->96503 96505 404e59 3 API calls 96503->96505 96507 443cde 96505->96507 96506 404f20 96506->96507 96508 404f2c 96506->96508 96604 4050f5 96507->96604 96510 404f39 68 API calls 96508->96510 96512 4044cd 96510->96512 96512->96449 96512->96450 96514 443d05 96516 472d15 96515->96516 96517 40511f 64 API calls 96516->96517 96518 472d29 96517->96518 96859 472e66 96518->96859 96521 4050f5 40 API calls 96522 472d56 96521->96522 96523 4050f5 40 API calls 96522->96523 96524 472d66 96523->96524 96525 4050f5 40 API calls 96524->96525 96526 472d81 96525->96526 96527 4050f5 40 API calls 96526->96527 96528 472d9c 96527->96528 96529 40511f 64 API calls 96528->96529 96530 472db3 96529->96530 96531 42ea0c ___std_exception_copy 21 API calls 96530->96531 96532 472dba 96531->96532 96533 42ea0c ___std_exception_copy 21 API calls 96532->96533 96534 472dc4 96533->96534 96535 4050f5 40 API calls 96534->96535 96536 472dd8 96535->96536 96537 4728fe 27 API calls 96536->96537 96538 472dee 96537->96538 96539 472d3f 96538->96539 96865 4722ce 96538->96865 96539->96453 96542 41fe0b 22 API calls 96541->96542 96543 4696ae __fread_nolock 96542->96543 96543->96474 96543->96543 96545 470b65 96544->96545 96546 41fddb 22 API calls 96545->96546 96547 470b7c 96546->96547 96548 409cb3 22 API calls 96547->96548 96549 470b87 96548->96549 96549->96474 96551 40a52b 96550->96551 96557 40a4b1 __fread_nolock 96550->96557 96553 41fe0b 22 API calls 96551->96553 96552 41fddb 22 API calls 96554 40a4b8 96552->96554 96553->96557 96555 41fddb 22 API calls 96554->96555 96556 40a4d6 96554->96556 96555->96556 96556->96474 96557->96552 96559 40400a 96558->96559 96563 4040ae 96558->96563 96561 41fe0b 22 API calls 96559->96561 96562 40403c 96559->96562 96560 41fddb 22 API calls 96560->96562 96561->96562 96562->96560 96562->96563 96563->96474 96564->96464 96566 404f43 96565->96566 96567 404f4a 96565->96567 96568 42e678 67 API calls 96566->96568 96569 404f59 96567->96569 96570 404f6a FreeLibrary 96567->96570 96568->96567 96569->96458 96570->96569 96571->96463 96572->96474 96573->96468 96575 404ec6 96574->96575 96576 404ea8 GetProcAddress 96574->96576 96579 42e5eb 96575->96579 96577 404eb8 96576->96577 96577->96575 96578 404ebf FreeLibrary 96577->96578 96578->96575 96612 42e52a 96579->96612 96581 404eea 96581->96498 96581->96499 96583 404e8d 96582->96583 96584 404e6e GetProcAddress 96582->96584 96587 404f80 96583->96587 96585 404e7e 96584->96585 96585->96583 96586 404e86 FreeLibrary 96585->96586 96586->96583 96588 41fe0b 22 API calls 96587->96588 96589 404f95 96588->96589 96664 405722 96589->96664 96591 404fa1 __fread_nolock 96592 4050a5 96591->96592 96593 443d1d 96591->96593 96602 404fdc 96591->96602 96667 4042a2 CreateStreamOnHGlobal 96592->96667 96678 47304d 74 API calls 96593->96678 96596 443d22 96598 40511f 64 API calls 96596->96598 96597 4050f5 40 API calls 96597->96602 96599 443d45 96598->96599 96600 4050f5 40 API calls 96599->96600 96603 40506e ISource 96600->96603 96602->96596 96602->96597 96602->96603 96673 40511f 96602->96673 96603->96506 96605 443d70 96604->96605 96606 405107 96604->96606 96700 42e8c4 96606->96700 96609 4728fe 96842 47274e 96609->96842 96611 472919 96611->96514 96614 42e536 __FrameHandler3::FrameUnwindToState 96612->96614 96613 42e544 96637 42f2d9 20 API calls _abort 96613->96637 96614->96613 96617 42e574 96614->96617 96616 42e549 96638 4327ec 26 API calls _abort 96616->96638 96619 42e586 96617->96619 96620 42e579 96617->96620 96629 438061 96619->96629 96639 42f2d9 20 API calls _abort 96620->96639 96623 42e58f 96624 42e5a2 96623->96624 96625 42e595 96623->96625 96641 42e5d4 LeaveCriticalSection __fread_nolock 96624->96641 96640 42f2d9 20 API calls _abort 96625->96640 96626 42e554 __fread_nolock 96626->96581 96630 43806d __FrameHandler3::FrameUnwindToState 96629->96630 96642 432f5e EnterCriticalSection 96630->96642 96632 43807b 96643 4380fb 96632->96643 96636 4380ac __fread_nolock 96636->96623 96637->96616 96638->96626 96639->96626 96640->96626 96641->96626 96642->96632 96650 43811e 96643->96650 96644 438177 96645 434c7d _abort 20 API calls 96644->96645 96646 438180 96645->96646 96648 4329c8 _free 20 API calls 96646->96648 96649 438189 96648->96649 96655 438088 96649->96655 96661 433405 11 API calls 2 library calls 96649->96661 96650->96644 96650->96650 96650->96655 96659 42918d EnterCriticalSection 96650->96659 96660 4291a1 LeaveCriticalSection 96650->96660 96652 4381a8 96662 42918d EnterCriticalSection 96652->96662 96656 4380b7 96655->96656 96663 432fa6 LeaveCriticalSection 96656->96663 96658 4380be 96658->96636 96659->96650 96660->96650 96661->96652 96662->96655 96663->96658 96665 41fddb 22 API calls 96664->96665 96666 405734 96665->96666 96666->96591 96668 4042d9 96667->96668 96669 4042bc FindResourceExW 96667->96669 96668->96602 96669->96668 96670 4435ba LoadResource 96669->96670 96670->96668 96671 4435cf SizeofResource 96670->96671 96671->96668 96672 4435e3 LockResource 96671->96672 96672->96668 96674 443d90 96673->96674 96675 40512e 96673->96675 96679 42ece3 96675->96679 96678->96596 96682 42eaaa 96679->96682 96681 40513c 96681->96602 96686 42eab6 __FrameHandler3::FrameUnwindToState 96682->96686 96683 42eac2 96695 42f2d9 20 API calls _abort 96683->96695 96685 42eae8 96697 42918d EnterCriticalSection 96685->96697 96686->96683 96686->96685 96687 42eac7 96696 4327ec 26 API calls _abort 96687->96696 96690 42eaf4 96698 42ec0a 62 API calls 2 library calls 96690->96698 96692 42eb08 96699 42eb27 LeaveCriticalSection __fread_nolock 96692->96699 96694 42ead2 __fread_nolock 96694->96681 96695->96687 96696->96694 96697->96690 96698->96692 96699->96694 96703 42e8e1 96700->96703 96702 405118 96702->96609 96704 42e8ed __FrameHandler3::FrameUnwindToState 96703->96704 96705 42e900 ___scrt_fastfail 96704->96705 96706 42e92d 96704->96706 96707 42e925 __fread_nolock 96704->96707 96730 42f2d9 20 API calls _abort 96705->96730 96716 42918d EnterCriticalSection 96706->96716 96707->96702 96710 42e937 96717 42e6f8 96710->96717 96711 42e91a 96731 4327ec 26 API calls _abort 96711->96731 96716->96710 96719 42e70a ___scrt_fastfail 96717->96719 96723 42e727 96717->96723 96718 42e717 96805 42f2d9 20 API calls _abort 96718->96805 96719->96718 96719->96723 96726 42e76a __fread_nolock 96719->96726 96721 42e71c 96806 4327ec 26 API calls _abort 96721->96806 96732 42e96c LeaveCriticalSection __fread_nolock 96723->96732 96724 42e886 ___scrt_fastfail 96808 42f2d9 20 API calls _abort 96724->96808 96726->96723 96726->96724 96733 42d955 96726->96733 96740 438d45 96726->96740 96807 42cf78 26 API calls 4 library calls 96726->96807 96730->96711 96731->96707 96732->96707 96734 42d961 96733->96734 96735 42d976 96733->96735 96809 42f2d9 20 API calls _abort 96734->96809 96735->96726 96737 42d966 96810 4327ec 26 API calls _abort 96737->96810 96739 42d971 96739->96726 96741 438d57 96740->96741 96742 438d6f 96740->96742 96820 42f2c6 20 API calls _abort 96741->96820 96743 4390d9 96742->96743 96749 438db4 96742->96749 96836 42f2c6 20 API calls _abort 96743->96836 96745 438d5c 96821 42f2d9 20 API calls _abort 96745->96821 96748 4390de 96837 42f2d9 20 API calls _abort 96748->96837 96751 438dbf 96749->96751 96754 438d64 96749->96754 96758 438def 96749->96758 96822 42f2c6 20 API calls _abort 96751->96822 96752 438dcc 96838 4327ec 26 API calls _abort 96752->96838 96754->96726 96755 438dc4 96823 42f2d9 20 API calls _abort 96755->96823 96759 438e08 96758->96759 96760 438e4a 96758->96760 96761 438e2e 96758->96761 96759->96761 96767 438e15 96759->96767 96827 433820 21 API calls 2 library calls 96760->96827 96824 42f2c6 20 API calls _abort 96761->96824 96763 438e33 96825 42f2d9 20 API calls _abort 96763->96825 96811 43f89b 96767->96811 96768 438e61 96769 4329c8 _free 20 API calls 96768->96769 96772 438e6a 96769->96772 96770 438e3a 96826 4327ec 26 API calls _abort 96770->96826 96771 438fb3 96774 439029 96771->96774 96777 438fcc GetConsoleMode 96771->96777 96775 4329c8 _free 20 API calls 96772->96775 96776 43902d ReadFile 96774->96776 96778 438e71 96775->96778 96779 4390a1 GetLastError 96776->96779 96780 439047 96776->96780 96777->96774 96781 438fdd 96777->96781 96782 438e96 96778->96782 96783 438e7b 96778->96783 96784 439005 96779->96784 96785 4390ae 96779->96785 96780->96779 96795 43901e 96780->96795 96781->96776 96786 438fe3 ReadConsoleW 96781->96786 96830 439424 28 API calls __fread_nolock 96782->96830 96828 42f2d9 20 API calls _abort 96783->96828 96792 438e45 __fread_nolock 96784->96792 96831 42f2a3 20 API calls __dosmaperr 96784->96831 96834 42f2d9 20 API calls _abort 96785->96834 96791 438fff GetLastError 96786->96791 96786->96795 96787 4329c8 _free 20 API calls 96787->96754 96791->96784 96792->96787 96793 438e80 96829 42f2c6 20 API calls _abort 96793->96829 96794 4390b3 96835 42f2c6 20 API calls _abort 96794->96835 96795->96792 96799 439083 96795->96799 96800 43906c 96795->96800 96799->96792 96801 43909a 96799->96801 96832 438a61 31 API calls 2 library calls 96800->96832 96833 4388a1 29 API calls __fread_nolock 96801->96833 96804 43909f 96804->96792 96805->96721 96806->96723 96807->96726 96808->96721 96809->96737 96810->96739 96812 43f8b5 96811->96812 96813 43f8a8 96811->96813 96816 43f8c1 96812->96816 96840 42f2d9 20 API calls _abort 96812->96840 96839 42f2d9 20 API calls _abort 96813->96839 96815 43f8ad 96815->96771 96816->96771 96818 43f8e2 96841 4327ec 26 API calls _abort 96818->96841 96820->96745 96821->96754 96822->96755 96823->96752 96824->96763 96825->96770 96826->96792 96827->96768 96828->96793 96829->96792 96830->96767 96831->96792 96832->96792 96833->96804 96834->96794 96835->96792 96836->96748 96837->96752 96838->96754 96839->96815 96840->96818 96841->96815 96845 42e4e8 96842->96845 96844 47275d 96844->96611 96848 42e469 96845->96848 96847 42e505 96847->96844 96849 42e478 96848->96849 96850 42e48c 96848->96850 96856 42f2d9 20 API calls _abort 96849->96856 96855 42e488 __alldvrm 96850->96855 96858 43333f 11 API calls 2 library calls 96850->96858 96852 42e47d 96857 4327ec 26 API calls _abort 96852->96857 96855->96847 96856->96852 96857->96855 96858->96855 96860 472e7a 96859->96860 96861 4050f5 40 API calls 96860->96861 96862 4728fe 27 API calls 96860->96862 96863 472d3b 96860->96863 96864 40511f 64 API calls 96860->96864 96861->96860 96862->96860 96863->96521 96863->96539 96864->96860 96866 4722d9 96865->96866 96868 4722e7 96865->96868 96867 42e5eb 29 API calls 96866->96867 96867->96868 96869 47232c 96868->96869 96870 42e5eb 29 API calls 96868->96870 96893 4722f0 96868->96893 96894 472557 96869->96894 96871 472311 96870->96871 96871->96869 96873 47231a 96871->96873 96877 42e678 67 API calls 96873->96877 96873->96893 96874 472370 96875 472395 96874->96875 96876 472374 96874->96876 96898 472171 96875->96898 96879 472381 96876->96879 96881 42e678 67 API calls 96876->96881 96877->96893 96882 42e678 67 API calls 96879->96882 96879->96893 96880 47239d 96883 4723c3 96880->96883 96884 4723a3 96880->96884 96881->96879 96882->96893 96905 4723f3 96883->96905 96886 4723b0 96884->96886 96887 42e678 67 API calls 96884->96887 96888 42e678 67 API calls 96886->96888 96886->96893 96887->96886 96888->96893 96889 4723ca 96890 4723de 96889->96890 96913 42e678 96889->96913 96892 42e678 67 API calls 96890->96892 96890->96893 96892->96893 96893->96539 96895 472565 __fread_nolock 96894->96895 96896 47257c 96894->96896 96895->96874 96897 42e8c4 __fread_nolock 40 API calls 96896->96897 96897->96895 96899 42ea0c ___std_exception_copy 21 API calls 96898->96899 96900 47217f 96899->96900 96901 42ea0c ___std_exception_copy 21 API calls 96900->96901 96902 472190 96901->96902 96903 42ea0c ___std_exception_copy 21 API calls 96902->96903 96904 47219c 96903->96904 96904->96880 96912 472408 96905->96912 96906 4724c0 96930 472724 96906->96930 96907 4721cc 40 API calls 96907->96912 96909 4724c7 96909->96889 96912->96906 96912->96907 96912->96909 96926 472606 96912->96926 96934 472269 40 API calls 96912->96934 96914 42e684 __FrameHandler3::FrameUnwindToState 96913->96914 96915 42e695 96914->96915 96916 42e6aa 96914->96916 96987 42f2d9 20 API calls _abort 96915->96987 96925 42e6a5 __fread_nolock 96916->96925 96970 42918d EnterCriticalSection 96916->96970 96918 42e69a 96988 4327ec 26 API calls _abort 96918->96988 96921 42e6c6 96971 42e602 96921->96971 96923 42e6d1 96989 42e6ee LeaveCriticalSection __fread_nolock 96923->96989 96925->96890 96927 472617 96926->96927 96928 47261d 96926->96928 96927->96928 96935 4726d7 96927->96935 96928->96912 96931 472731 96930->96931 96932 472742 96930->96932 96933 42dbb3 65 API calls 96931->96933 96932->96909 96933->96932 96934->96912 96936 472703 96935->96936 96938 472714 96935->96938 96939 42dbb3 96936->96939 96938->96927 96940 42dbc1 96939->96940 96941 42dbdd 96939->96941 96940->96941 96942 42dbe3 96940->96942 96943 42dbcd 96940->96943 96941->96938 96948 42d9cc 96942->96948 96951 42f2d9 20 API calls _abort 96943->96951 96946 42dbd2 96952 4327ec 26 API calls _abort 96946->96952 96953 42d97b 96948->96953 96951->96946 96952->96941 96954 42d987 __FrameHandler3::FrameUnwindToState 96953->96954 96961 42918d EnterCriticalSection 96954->96961 96956 42d995 96962 42d9f4 96956->96962 96961->96956 96963 4349a1 27 API calls 96962->96963 96964 42da09 96963->96964 96965 42da3a 62 API calls 96964->96965 96966 42da24 96965->96966 96967 434a56 62 API calls 96966->96967 96968 42d9a2 96967->96968 96970->96921 96972 42e60f 96971->96972 96974 42e624 96971->96974 97015 42f2d9 20 API calls _abort 96972->97015 96979 42e61f 96974->96979 96990 42dc0b 96974->96990 96975 42e614 97016 4327ec 26 API calls _abort 96975->97016 96979->96923 96982 42d955 __fread_nolock 26 API calls 96983 42e646 96982->96983 97000 43862f 96983->97000 96987->96918 96988->96925 96989->96925 96991 42dc23 96990->96991 96995 42dc1f 96990->96995 96992 42d955 __fread_nolock 26 API calls 96991->96992 96991->96995 96993 42dc43 96992->96993 97017 4359be 96993->97017 96996 434d7a 96995->96996 96997 434d90 96996->96997 96998 42e640 96996->96998 96997->96998 96999 4329c8 _free 20 API calls 96997->96999 96998->96982 96999->96998 97001 438653 97000->97001 97002 43863e 97000->97002 97004 43868e 97001->97004 97009 43867a 97001->97009 97140 42f2c6 20 API calls _abort 97002->97140 97142 42f2c6 20 API calls _abort 97004->97142 97006 438643 97137 438607 97009->97137 97015->96975 97016->96979 97018 4359ca __FrameHandler3::FrameUnwindToState 97017->97018 97019 4359d2 97018->97019 97020 4359ea 97018->97020 97096 42f2c6 20 API calls _abort 97019->97096 97022 435a88 97020->97022 97026 435a1f 97020->97026 97101 42f2c6 20 API calls _abort 97022->97101 97023 4359d7 97097 42f2d9 20 API calls _abort 97023->97097 97042 435147 EnterCriticalSection 97026->97042 97027 435a8d 97030 435a25 97042->97030 97096->97023 97101->97027 97145 438585 97137->97145 97140->97006 97159 401044 97164 4010f3 97159->97164 97161 40104a 97200 4200a3 29 API calls __onexit 97161->97200 97163 401054 97201 401398 97164->97201 97168 40116a 97169 40a961 22 API calls 97168->97169 97170 401174 97169->97170 97171 40a961 22 API calls 97170->97171 97172 40117e 97171->97172 97173 40a961 22 API calls 97172->97173 97174 401188 97173->97174 97175 40a961 22 API calls 97174->97175 97176 4011c6 97175->97176 97177 40a961 22 API calls 97176->97177 97178 401292 97177->97178 97211 40171c 97178->97211 97182 4012c4 97183 40a961 22 API calls 97182->97183 97184 4012ce 97183->97184 97232 411940 97184->97232 97186 4012f9 97242 401aab 97186->97242 97188 401315 97189 401325 GetStdHandle 97188->97189 97190 442485 97189->97190 97191 40137a 97189->97191 97190->97191 97192 44248e 97190->97192 97194 401387 OleInitialize 97191->97194 97193 41fddb 22 API calls 97192->97193 97195 442495 97193->97195 97194->97161 97249 47011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97195->97249 97197 44249e 97250 470944 CreateThread 97197->97250 97199 4424aa CloseHandle 97199->97191 97200->97163 97251 4013f1 97201->97251 97204 4013f1 22 API calls 97205 4013d0 97204->97205 97206 40a961 22 API calls 97205->97206 97207 4013dc 97206->97207 97208 406b57 22 API calls 97207->97208 97209 401129 97208->97209 97210 401bc3 6 API calls 97209->97210 97210->97168 97212 40a961 22 API calls 97211->97212 97213 40172c 97212->97213 97214 40a961 22 API calls 97213->97214 97215 401734 97214->97215 97216 40a961 22 API calls 97215->97216 97217 40174f 97216->97217 97218 41fddb 22 API calls 97217->97218 97219 40129c 97218->97219 97220 401b4a 97219->97220 97221 401b58 97220->97221 97222 40a961 22 API calls 97221->97222 97223 401b63 97222->97223 97224 40a961 22 API calls 97223->97224 97225 401b6e 97224->97225 97226 40a961 22 API calls 97225->97226 97227 401b79 97226->97227 97228 40a961 22 API calls 97227->97228 97229 401b84 97228->97229 97230 41fddb 22 API calls 97229->97230 97231 401b96 RegisterWindowMessageW 97230->97231 97231->97182 97233 411981 97232->97233 97237 41195d 97232->97237 97258 420242 5 API calls __Init_thread_wait 97233->97258 97236 41198b 97236->97237 97259 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97236->97259 97241 41196e 97237->97241 97260 420242 5 API calls __Init_thread_wait 97237->97260 97238 418727 97238->97241 97261 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97238->97261 97241->97186 97243 44272d 97242->97243 97244 401abb 97242->97244 97262 473209 23 API calls 97243->97262 97245 41fddb 22 API calls 97244->97245 97248 401ac3 97245->97248 97247 442738 97248->97188 97249->97197 97250->97199 97263 47092a 28 API calls 97250->97263 97252 40a961 22 API calls 97251->97252 97253 4013fc 97252->97253 97254 40a961 22 API calls 97253->97254 97255 401404 97254->97255 97256 40a961 22 API calls 97255->97256 97257 4013c6 97256->97257 97257->97204 97258->97236 97259->97237 97260->97238 97261->97241 97262->97247 97264 452a00 97279 40d7b0 ISource 97264->97279 97265 40db11 PeekMessageW 97265->97279 97266 40d807 GetInputState 97266->97265 97266->97279 97267 451cbe TranslateAcceleratorW 97267->97279 97269 40db8f PeekMessageW 97269->97279 97270 40da04 timeGetTime 97270->97279 97271 40db73 TranslateMessage DispatchMessageW 97271->97269 97272 40dbaf Sleep 97286 40dbc0 97272->97286 97273 452b74 Sleep 97273->97286 97274 41e551 timeGetTime 97274->97286 97275 451dda timeGetTime 97442 41e300 23 API calls 97275->97442 97278 452c0b GetExitCodeProcess 97280 452c37 CloseHandle 97278->97280 97281 452c21 WaitForSingleObject 97278->97281 97279->97265 97279->97266 97279->97267 97279->97269 97279->97270 97279->97271 97279->97272 97279->97273 97279->97275 97283 40d9d5 97279->97283 97296 40dd50 97279->97296 97303 40dfd0 97279->97303 97326 411310 97279->97326 97383 40bf40 97279->97383 97441 41edf6 IsDialogMessageW GetClassLongW 97279->97441 97443 473a2a 23 API calls 97279->97443 97444 40ec40 97279->97444 97468 47359c 82 API calls __wsopen_s 97279->97468 97280->97286 97281->97279 97281->97280 97282 452a31 97282->97283 97284 4929bf GetForegroundWindow 97284->97286 97286->97274 97286->97278 97286->97279 97286->97282 97286->97283 97286->97284 97287 452ca9 Sleep 97286->97287 97469 485658 23 API calls 97286->97469 97470 46e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97286->97470 97471 46d4dc 47 API calls 97286->97471 97287->97279 97297 40dd83 97296->97297 97298 40dd6f 97296->97298 97473 47359c 82 API calls __wsopen_s 97297->97473 97472 40d260 235 API calls 2 library calls 97298->97472 97300 40dd7a 97300->97279 97302 452f75 97302->97302 97305 40e010 97303->97305 97304 40ec40 235 API calls 97323 40e0dc ISource 97304->97323 97305->97323 97476 420242 5 API calls __Init_thread_wait 97305->97476 97308 452fca 97311 40a961 22 API calls 97308->97311 97308->97323 97309 40a961 22 API calls 97309->97323 97310 47359c 82 API calls 97310->97323 97312 452fe4 97311->97312 97477 4200a3 29 API calls __onexit 97312->97477 97316 452fee 97478 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97316->97478 97320 40a8c7 22 API calls 97320->97323 97321 40e3e1 97321->97279 97322 4104f0 22 API calls 97322->97323 97323->97304 97323->97309 97323->97310 97323->97320 97323->97321 97323->97322 97474 40a81b 41 API calls 97323->97474 97475 41a308 235 API calls 97323->97475 97479 420242 5 API calls __Init_thread_wait 97323->97479 97480 4200a3 29 API calls __onexit 97323->97480 97481 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97323->97481 97482 4847d4 235 API calls 97323->97482 97483 4868c1 235 API calls 97323->97483 97327 4117b0 97326->97327 97328 411376 97326->97328 97582 420242 5 API calls __Init_thread_wait 97327->97582 97330 411390 97328->97330 97331 456331 97328->97331 97334 411940 9 API calls 97330->97334 97587 48709c 235 API calls 97331->97587 97333 4117ba 97337 409cb3 22 API calls 97333->97337 97341 4117fb 97333->97341 97336 4113a0 97334->97336 97335 45633d 97335->97279 97338 411940 9 API calls 97336->97338 97346 4117d4 97337->97346 97339 4113b6 97338->97339 97339->97341 97342 4113ec 97339->97342 97340 456346 97588 47359c 82 API calls __wsopen_s 97340->97588 97341->97340 97343 41182c 97341->97343 97342->97340 97366 411408 __fread_nolock 97342->97366 97584 40aceb 23 API calls ISource 97343->97584 97583 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97346->97583 97347 411839 97585 41d217 235 API calls 97347->97585 97350 45636e 97589 47359c 82 API calls __wsopen_s 97350->97589 97351 41152f 97353 4563d1 97351->97353 97354 41153c 97351->97354 97591 485745 54 API calls _wcslen 97353->97591 97356 411940 9 API calls 97354->97356 97358 411549 97356->97358 97357 41fddb 22 API calls 97357->97366 97361 4564fa 97358->97361 97363 411940 9 API calls 97358->97363 97359 411872 97586 41faeb 23 API calls 97359->97586 97360 41fe0b 22 API calls 97360->97366 97370 456369 97361->97370 97592 47359c 82 API calls __wsopen_s 97361->97592 97368 411563 97363->97368 97365 40ec40 235 API calls 97365->97366 97366->97347 97366->97350 97366->97351 97366->97357 97366->97360 97366->97365 97367 4563b2 97366->97367 97366->97370 97590 47359c 82 API calls __wsopen_s 97367->97590 97368->97361 97371 40a8c7 22 API calls 97368->97371 97373 4115c7 ISource 97368->97373 97370->97279 97371->97373 97372 411940 9 API calls 97372->97373 97373->97359 97373->97361 97373->97370 97373->97372 97376 41167b ISource 97373->97376 97382 404f39 68 API calls 97373->97382 97484 48958b 97373->97484 97487 476ef1 97373->97487 97567 489c4d 97373->97567 97575 46d4ce 97373->97575 97578 48959f 97373->97578 97374 41171d 97374->97279 97376->97374 97581 41ce17 22 API calls ISource 97376->97581 97382->97373 98035 40adf0 97383->98035 97385 40bf9d 97386 4504b6 97385->97386 97387 40bfa9 97385->97387 98054 47359c 82 API calls __wsopen_s 97386->98054 97388 4504c6 97387->97388 97389 40c01e 97387->97389 98055 47359c 82 API calls __wsopen_s 97388->98055 98040 40ac91 97389->98040 97393 467120 22 API calls 97426 40c039 ISource __fread_nolock 97393->97426 97394 40c7da 97398 41fe0b 22 API calls 97394->97398 97403 40c808 __fread_nolock 97398->97403 97400 4504f5 97404 45055a 97400->97404 98056 41d217 235 API calls 97400->98056 97408 41fe0b 22 API calls 97403->97408 97440 40c603 97404->97440 98057 47359c 82 API calls __wsopen_s 97404->98057 97405 40ec40 235 API calls 97405->97426 97406 40af8a 22 API calls 97406->97426 97407 45091a 98067 473209 23 API calls 97407->98067 97434 40c350 ISource __fread_nolock 97408->97434 97411 4508a5 97412 40ec40 235 API calls 97411->97412 97414 4508cf 97412->97414 97414->97440 98065 40a81b 41 API calls 97414->98065 97415 450591 98058 47359c 82 API calls __wsopen_s 97415->98058 97416 4508f6 98066 47359c 82 API calls __wsopen_s 97416->98066 97421 40c3ac 97421->97279 97423 40c237 97425 40c253 97423->97425 97427 40a8c7 22 API calls 97423->97427 97424 41fddb 22 API calls 97424->97426 97429 40c297 ISource 97425->97429 97430 450976 97425->97430 97426->97393 97426->97394 97426->97400 97426->97403 97426->97404 97426->97405 97426->97406 97426->97407 97426->97411 97426->97415 97426->97416 97426->97423 97426->97424 97428 41fe0b 22 API calls 97426->97428 97431 4509bf 97426->97431 97437 40bbe0 40 API calls 97426->97437 97426->97440 98044 40ad81 97426->98044 98059 467099 22 API calls __fread_nolock 97426->98059 98060 485745 54 API calls _wcslen 97426->98060 98061 41aa42 22 API calls ISource 97426->98061 98062 46f05c 40 API calls 97426->98062 98063 40a993 41 API calls 97426->98063 98064 40aceb 23 API calls ISource 97426->98064 97427->97425 97428->97426 97429->97431 98051 40aceb 23 API calls ISource 97429->98051 98068 40aceb 23 API calls ISource 97430->98068 97431->97440 98069 47359c 82 API calls __wsopen_s 97431->98069 97434->97421 98053 41ce17 22 API calls ISource 97434->98053 97436 40c335 97436->97431 97438 40c342 97436->97438 97437->97426 98052 40a704 22 API calls ISource 97438->98052 97440->97279 97441->97279 97442->97279 97443->97279 97462 40ec76 ISource 97444->97462 97445 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97445->97462 97447 40fef7 97453 40a8c7 22 API calls 97447->97453 97461 40ed9d ISource 97447->97461 97449 41fddb 22 API calls 97449->97462 97450 454600 97457 40a8c7 22 API calls 97450->97457 97450->97461 97451 454b0b 98094 47359c 82 API calls __wsopen_s 97451->98094 97453->97461 97455 420242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97455->97462 97456 40a8c7 22 API calls 97456->97462 97457->97461 97459 40fbe3 97459->97461 97463 454bdc 97459->97463 97467 40f3ae ISource 97459->97467 97460 40a961 22 API calls 97460->97462 97461->97279 97462->97445 97462->97447 97462->97449 97462->97450 97462->97451 97462->97455 97462->97456 97462->97459 97462->97460 97462->97461 97464 4200a3 29 API calls pre_c_initialization 97462->97464 97466 454beb 97462->97466 97462->97467 98078 4106a0 97462->98078 98092 4101e0 235 API calls 2 library calls 97462->98092 98095 47359c 82 API calls __wsopen_s 97463->98095 97464->97462 98096 47359c 82 API calls __wsopen_s 97466->98096 97467->97461 98093 47359c 82 API calls __wsopen_s 97467->98093 97468->97279 97469->97286 97470->97286 97471->97286 97472->97300 97473->97302 97474->97323 97475->97323 97476->97308 97477->97316 97478->97323 97479->97323 97480->97323 97481->97323 97482->97323 97483->97323 97593 487f59 97484->97593 97486 48959b 97486->97373 97488 40a961 22 API calls 97487->97488 97489 476f1d 97488->97489 97490 40a961 22 API calls 97489->97490 97491 476f26 97490->97491 97492 476f3a 97491->97492 97880 40b567 39 API calls 97491->97880 97494 407510 53 API calls 97492->97494 97495 476f57 _wcslen 97494->97495 97496 4770bf 97495->97496 97497 476fbc 97495->97497 97566 4770e9 97495->97566 97499 404ecb 94 API calls 97496->97499 97498 407510 53 API calls 97497->97498 97500 476fc8 97498->97500 97501 4770d0 97499->97501 97504 40a8c7 22 API calls 97500->97504 97509 476fdb 97500->97509 97502 4770e5 97501->97502 97505 404ecb 94 API calls 97501->97505 97503 40a961 22 API calls 97502->97503 97502->97566 97506 47711a 97503->97506 97504->97509 97505->97502 97507 40a961 22 API calls 97506->97507 97511 477126 97507->97511 97508 477027 97510 407510 53 API calls 97508->97510 97509->97508 97512 477005 97509->97512 97515 40a8c7 22 API calls 97509->97515 97513 477034 97510->97513 97514 40a961 22 API calls 97511->97514 97516 4033c6 22 API calls 97512->97516 97517 477047 97513->97517 97518 47703d 97513->97518 97519 47712f 97514->97519 97515->97512 97520 47700f 97516->97520 97881 46e199 GetFileAttributesW 97517->97881 97521 40a8c7 22 API calls 97518->97521 97523 40a961 22 API calls 97519->97523 97524 407510 53 API calls 97520->97524 97521->97517 97526 477138 97523->97526 97527 47701b 97524->97527 97525 477050 97528 477063 97525->97528 97532 404c6d 22 API calls 97525->97532 97529 407510 53 API calls 97526->97529 97530 406350 22 API calls 97527->97530 97531 407510 53 API calls 97528->97531 97538 477069 97528->97538 97533 477145 97529->97533 97530->97508 97534 4770a0 97531->97534 97532->97528 97726 40525f 97533->97726 97882 46d076 57 API calls 97534->97882 97537 477166 97768 404c6d 97537->97768 97538->97566 97541 4771a9 97543 40a8c7 22 API calls 97541->97543 97542 404c6d 22 API calls 97544 477186 97542->97544 97545 4771ba 97543->97545 97544->97541 97547 406b57 22 API calls 97544->97547 97546 406350 22 API calls 97545->97546 97548 4771c8 97546->97548 97549 47719b 97547->97549 97550 406350 22 API calls 97548->97550 97551 406b57 22 API calls 97549->97551 97552 4771d6 97550->97552 97551->97541 97553 406350 22 API calls 97552->97553 97554 4771e4 97553->97554 97555 407510 53 API calls 97554->97555 97556 4771f0 97555->97556 97771 46d7bc 97556->97771 97558 477201 97559 46d4ce 4 API calls 97558->97559 97560 47720b 97559->97560 97561 407510 53 API calls 97560->97561 97565 477239 97560->97565 97562 477229 97561->97562 97825 472947 97562->97825 97564 404f39 68 API calls 97564->97566 97565->97564 97566->97373 97568 489ca8 97567->97568 97574 489c68 97567->97574 97569 489cc6 97568->97569 97924 40b567 39 API calls 97568->97924 97572 489d23 97569->97572 97569->97574 97925 40b567 39 API calls 97569->97925 97892 46f9b8 97572->97892 97574->97373 98030 46dbbe lstrlenW 97575->98030 97579 487f59 120 API calls 97578->97579 97580 4895af 97579->97580 97580->97373 97581->97376 97582->97333 97583->97341 97584->97347 97585->97359 97586->97359 97587->97335 97588->97370 97589->97370 97590->97370 97591->97368 97592->97370 97631 407510 97593->97631 97597 488281 97598 48844f 97597->97598 97604 48828f 97597->97604 97695 488ee4 60 API calls 97598->97695 97601 48845e 97603 48846a 97601->97603 97601->97604 97602 407510 53 API calls 97621 488049 97602->97621 97612 487fd5 ISource 97603->97612 97667 487e86 97604->97667 97609 4882c8 97682 41fc70 97609->97682 97612->97486 97613 4882e8 97688 47359c 82 API calls __wsopen_s 97613->97688 97614 488302 97689 4063eb 22 API calls 97614->97689 97617 4882f3 GetCurrentProcess TerminateProcess 97617->97614 97618 488311 97690 406a50 22 API calls 97618->97690 97620 48832a 97629 488352 97620->97629 97691 4104f0 22 API calls 97620->97691 97621->97597 97621->97602 97621->97612 97686 46417d 22 API calls __fread_nolock 97621->97686 97687 48851d 42 API calls _strftime 97621->97687 97622 4884c5 97622->97612 97627 4884d9 FreeLibrary 97622->97627 97624 488341 97692 488b7b 75 API calls 97624->97692 97627->97612 97629->97622 97693 4104f0 22 API calls 97629->97693 97694 40aceb 23 API calls ISource 97629->97694 97696 488b7b 75 API calls 97629->97696 97632 407522 97631->97632 97633 407525 97631->97633 97632->97612 97654 488cd3 97632->97654 97634 40755b 97633->97634 97635 40752d 97633->97635 97636 4450f6 97634->97636 97638 40756d 97634->97638 97646 44500f 97634->97646 97697 4251c6 26 API calls 97635->97697 97700 425183 26 API calls 97636->97700 97698 41fb21 51 API calls 97638->97698 97639 40753d 97644 41fddb 22 API calls 97639->97644 97642 44510e 97642->97642 97647 407547 97644->97647 97645 445088 97699 41fb21 51 API calls 97645->97699 97646->97645 97649 41fe0b 22 API calls 97646->97649 97648 409cb3 22 API calls 97647->97648 97648->97632 97650 445058 97649->97650 97651 41fddb 22 API calls 97650->97651 97652 44507f 97651->97652 97653 409cb3 22 API calls 97652->97653 97653->97645 97655 40aec9 22 API calls 97654->97655 97656 488cee CharLowerBuffW 97655->97656 97701 468e54 97656->97701 97660 40a961 22 API calls 97661 488d2a 97660->97661 97708 406d25 97661->97708 97663 488d3e 97664 4093b2 22 API calls 97663->97664 97666 488d48 _wcslen 97664->97666 97665 488e5e _wcslen 97665->97621 97666->97665 97721 48851d 42 API calls _strftime 97666->97721 97668 487ea1 97667->97668 97672 487eec 97667->97672 97669 41fe0b 22 API calls 97668->97669 97670 487ec3 97669->97670 97671 41fddb 22 API calls 97670->97671 97670->97672 97671->97670 97673 489096 97672->97673 97674 4892ab ISource 97673->97674 97681 4890ba _strcat _wcslen 97673->97681 97674->97609 97675 40b567 39 API calls 97675->97681 97676 40b38f 39 API calls 97676->97681 97677 40b6b5 39 API calls 97677->97681 97678 407510 53 API calls 97678->97681 97679 42ea0c 21 API calls ___std_exception_copy 97679->97681 97681->97674 97681->97675 97681->97676 97681->97677 97681->97678 97681->97679 97725 46efae 24 API calls _wcslen 97681->97725 97683 41fc85 97682->97683 97684 41fd1d VirtualAlloc 97683->97684 97685 41fceb 97683->97685 97684->97685 97685->97613 97685->97614 97686->97621 97687->97621 97688->97617 97689->97618 97690->97620 97691->97624 97692->97629 97693->97629 97694->97629 97695->97601 97696->97629 97697->97639 97698->97639 97699->97636 97700->97642 97703 468e74 _wcslen 97701->97703 97702 468f63 97702->97660 97702->97666 97703->97702 97704 468f68 97703->97704 97705 468ea9 97703->97705 97704->97702 97723 41ce60 41 API calls 97704->97723 97705->97702 97722 41ce60 41 API calls 97705->97722 97709 406d91 97708->97709 97710 406d34 97708->97710 97711 4093b2 22 API calls 97709->97711 97710->97709 97712 406d3f 97710->97712 97717 406d62 __fread_nolock 97711->97717 97713 444c9d 97712->97713 97714 406d5a 97712->97714 97716 41fddb 22 API calls 97713->97716 97724 406f34 22 API calls 97714->97724 97718 444ca7 97716->97718 97717->97663 97719 41fe0b 22 API calls 97718->97719 97720 444cda 97719->97720 97721->97665 97722->97705 97723->97704 97724->97717 97725->97681 97727 40a961 22 API calls 97726->97727 97728 405275 97727->97728 97729 40a961 22 API calls 97728->97729 97730 40527d 97729->97730 97731 40a961 22 API calls 97730->97731 97732 405285 97731->97732 97733 40a961 22 API calls 97732->97733 97734 40528d 97733->97734 97735 443df5 97734->97735 97736 4052c1 97734->97736 97738 40a8c7 22 API calls 97735->97738 97737 406d25 22 API calls 97736->97737 97739 4052cf 97737->97739 97740 443dfe 97738->97740 97741 4093b2 22 API calls 97739->97741 97742 40a6c3 22 API calls 97740->97742 97743 4052d9 97741->97743 97744 405304 97742->97744 97743->97744 97745 406d25 22 API calls 97743->97745 97746 405349 97744->97746 97747 405325 97744->97747 97764 443e20 97744->97764 97749 4052fa 97745->97749 97748 406d25 22 API calls 97746->97748 97747->97746 97752 404c6d 22 API calls 97747->97752 97750 40535a 97748->97750 97751 4093b2 22 API calls 97749->97751 97753 405370 97750->97753 97758 40a8c7 22 API calls 97750->97758 97751->97744 97754 405332 97752->97754 97756 405384 97753->97756 97760 40a8c7 22 API calls 97753->97760 97754->97746 97759 406d25 22 API calls 97754->97759 97755 406b57 22 API calls 97765 443ee0 97755->97765 97757 40538f 97756->97757 97761 40a8c7 22 API calls 97756->97761 97762 40a8c7 22 API calls 97757->97762 97766 40539a 97757->97766 97758->97753 97759->97746 97760->97756 97761->97757 97762->97766 97763 404c6d 22 API calls 97763->97765 97764->97755 97765->97746 97765->97763 97883 4049bd 22 API calls __fread_nolock 97765->97883 97766->97537 97769 40aec9 22 API calls 97768->97769 97770 404c78 97769->97770 97770->97541 97770->97542 97772 46d7d8 97771->97772 97773 46d7f3 97772->97773 97774 46d7dd 97772->97774 97775 40a961 22 API calls 97773->97775 97776 40a8c7 22 API calls 97774->97776 97824 46d7ee 97774->97824 97777 46d7fb 97775->97777 97776->97824 97778 40a961 22 API calls 97777->97778 97779 46d803 97778->97779 97780 40a961 22 API calls 97779->97780 97781 46d80e 97780->97781 97782 40a961 22 API calls 97781->97782 97783 46d816 97782->97783 97784 40a961 22 API calls 97783->97784 97785 46d81e 97784->97785 97786 40a961 22 API calls 97785->97786 97787 46d826 97786->97787 97788 40a961 22 API calls 97787->97788 97789 46d82e 97788->97789 97790 40a961 22 API calls 97789->97790 97791 46d836 97790->97791 97792 40525f 22 API calls 97791->97792 97793 46d84d 97792->97793 97794 40525f 22 API calls 97793->97794 97795 46d866 97794->97795 97796 404c6d 22 API calls 97795->97796 97797 46d872 97796->97797 97798 46d885 97797->97798 97799 4093b2 22 API calls 97797->97799 97800 404c6d 22 API calls 97798->97800 97799->97798 97801 46d88e 97800->97801 97802 46d89e 97801->97802 97803 4093b2 22 API calls 97801->97803 97804 46d8b0 97802->97804 97805 40a8c7 22 API calls 97802->97805 97803->97802 97806 406350 22 API calls 97804->97806 97805->97804 97807 46d8bb 97806->97807 97884 46d978 22 API calls 97807->97884 97809 46d8ca 97885 46d978 22 API calls 97809->97885 97811 46d8dd 97812 404c6d 22 API calls 97811->97812 97813 46d8e7 97812->97813 97814 46d8fe 97813->97814 97815 46d8ec 97813->97815 97817 404c6d 22 API calls 97814->97817 97816 4033c6 22 API calls 97815->97816 97818 46d8f9 97816->97818 97819 46d907 97817->97819 97823 406350 22 API calls 97818->97823 97820 46d925 97819->97820 97822 4033c6 22 API calls 97819->97822 97821 406350 22 API calls 97820->97821 97821->97824 97822->97818 97823->97820 97824->97558 97826 472954 __wsopen_s 97825->97826 97827 41fe0b 22 API calls 97826->97827 97828 472971 97827->97828 97829 405722 22 API calls 97828->97829 97830 47297b 97829->97830 97831 47274e 27 API calls 97830->97831 97832 472986 97831->97832 97833 40511f 64 API calls 97832->97833 97834 47299b 97833->97834 97835 4729bf 97834->97835 97836 472a6c 97834->97836 97837 472e66 75 API calls 97835->97837 97838 472e66 75 API calls 97836->97838 97839 4729c4 97837->97839 97853 472a38 97838->97853 97843 472a75 ISource 97839->97843 97890 42d583 26 API calls 97839->97890 97841 4050f5 40 API calls 97842 472a91 97841->97842 97844 4050f5 40 API calls 97842->97844 97843->97565 97845 472aa1 97844->97845 97847 4050f5 40 API calls 97845->97847 97846 4729ed 97891 42d583 26 API calls 97846->97891 97849 472abc 97847->97849 97850 4050f5 40 API calls 97849->97850 97851 472acc 97850->97851 97852 4050f5 40 API calls 97851->97852 97854 472ae7 97852->97854 97853->97841 97853->97843 97855 4050f5 40 API calls 97854->97855 97856 472af7 97855->97856 97857 4050f5 40 API calls 97856->97857 97858 472b07 97857->97858 97859 4050f5 40 API calls 97858->97859 97860 472b17 97859->97860 97886 473017 GetTempPathW GetTempFileNameW 97860->97886 97862 472b22 97863 42e5eb 29 API calls 97862->97863 97873 472b33 97863->97873 97864 42e678 67 API calls 97865 472bf8 97864->97865 97867 472c12 97865->97867 97868 472bfe DeleteFileW 97865->97868 97866 4050f5 40 API calls 97866->97873 97869 472c91 CopyFileW 97867->97869 97875 472c18 97867->97875 97868->97843 97873->97843 97873->97866 97874 42dbb3 65 API calls 97873->97874 97876 472bed 97873->97876 97874->97873 97876->97864 97880->97492 97881->97525 97882->97538 97883->97765 97884->97809 97885->97811 97886->97862 97890->97846 97891->97853 97926 46f8f0 97892->97926 97895 46fa51 97898 46fab7 97895->97898 97901 46fa61 97895->97901 97896 46fa39 97933 46fc2f 97896->97933 97899 46fae7 97898->97899 97900 46fb4d 97898->97900 97915 46f9df __fread_nolock 97898->97915 97902 46fb17 97899->97902 97903 46faec 97899->97903 97904 46fbf6 97900->97904 97905 46fb56 97900->97905 97923 46fa99 97901->97923 97989 471e96 24 API calls 97901->97989 97902->97915 97994 40b6b5 39 API calls 97902->97994 97903->97915 97993 40b6b5 39 API calls 97903->97993 97904->97915 97998 40b38f 39 API calls 97904->97998 97906 46fbd3 97905->97906 97907 46fb5b 97905->97907 97906->97915 97997 40b38f 39 API calls 97906->97997 97912 46fb9a 97907->97912 97918 46fb61 97907->97918 97912->97915 97996 40b38f 39 API calls 97912->97996 97915->97574 97917 46fa6d 97990 471e96 24 API calls 97917->97990 97918->97915 97995 40b38f 39 API calls 97918->97995 97921 46fa84 __fread_nolock 97991 471e96 24 API calls 97921->97991 97992 470e85 22 API calls ___scrt_fastfail 97923->97992 97924->97569 97925->97572 97927 46f93d 97926->97927 97932 46f901 97926->97932 98000 40b567 39 API calls 97927->98000 97929 407510 53 API calls 97929->97932 97930 46f93b 97930->97895 97930->97896 97930->97915 97932->97929 97932->97930 97999 424a28 40 API calls 3 library calls 97932->97999 97934 46fda3 97933->97934 97935 46fc43 97933->97935 97937 40a961 22 API calls 97934->97937 97935->97934 97936 46fc4d 97935->97936 97938 46fc63 97936->97938 97939 46fd1a 97936->97939 97940 46fdab 97937->97940 97941 40a961 22 API calls 97938->97941 97942 46fd1e 97939->97942 97943 46fd5d 97939->97943 97944 46fdb1 97940->97944 97952 46fe20 __fread_nolock 97940->97952 97946 46fc6b 97941->97946 97947 41fe0b 22 API calls 97942->97947 97945 41fe0b 22 API calls 97943->97945 97953 46fdbf 97944->97953 97954 46fdc9 97944->97954 97948 46fd76 __fread_nolock 97945->97948 97949 407510 53 API calls 97946->97949 97950 46fd27 __fread_nolock 97947->97950 97958 409c6e 22 API calls 97948->97958 97951 46fc75 97949->97951 98001 46ebd1 97950->98001 97959 46fc81 97951->97959 97961 46fcd9 97951->97961 98028 46f24a 22 API calls 97952->98028 98025 40b567 39 API calls 97953->98025 97956 407510 53 API calls 97954->97956 97957 46fdc4 97956->97957 98026 46f24a 22 API calls 97957->98026 97987 46fcbf __fread_nolock 97958->97987 97960 46fc8c 97959->97960 97965 407510 53 API calls 97959->97965 97968 407510 53 API calls 97960->97968 97962 46fce6 97961->97962 97966 407510 53 API calls 97961->97966 97970 407510 53 API calls 97962->97970 97965->97960 97966->97962 97973 46fc9a 97968->97973 97969 46fe5e 98029 4062b5 22 API calls 97969->98029 97975 46fcf4 97970->97975 97977 406d25 22 API calls 97973->97977 97978 406d25 22 API calls 97975->97978 97976 46fddf 98027 4062b5 22 API calls 97976->98027 97980 46fca8 97977->97980 97981 46fd02 97978->97981 98022 4062b5 22 API calls 97980->98022 98024 4062b5 22 API calls 97981->98024 97983 46fdeb 97986 404c6d 22 API calls 97983->97986 97985 46fcb4 98023 46efae 24 API calls _wcslen 97985->98023 97986->97987 97987->97915 97989->97917 97990->97921 97991->97923 97992->97915 97993->97915 97994->97915 97995->97915 97996->97915 97997->97915 97998->97915 97999->97932 98000->97930 98002 46ec37 98001->98002 98004 46ebe0 _strlen 98001->98004 98008 409c6e 98002->98008 98003 46ebef MultiByteToWideChar 98003->98002 98005 46ec04 98003->98005 98004->98003 98006 41fe0b 22 API calls 98005->98006 98007 46ec20 MultiByteToWideChar 98006->98007 98007->98002 98009 409c7e 98008->98009 98010 44f545 98008->98010 98015 41fddb 22 API calls 98009->98015 98011 44f556 98010->98011 98012 406b57 22 API calls 98010->98012 98013 40a6c3 22 API calls 98011->98013 98012->98011 98014 44f560 98013->98014 98014->98014 98016 409c91 98015->98016 98017 409c9a 98016->98017 98018 409cac 98016->98018 98019 409cb3 22 API calls 98017->98019 98020 40a961 22 API calls 98018->98020 98021 409ca2 98019->98021 98020->98021 98021->97987 98022->97985 98023->97987 98024->97987 98025->97957 98026->97976 98027->97983 98028->97969 98029->97987 98031 46dbdc GetFileAttributesW 98030->98031 98032 46d4d5 98030->98032 98031->98032 98033 46dbe8 FindFirstFileW 98031->98033 98032->97373 98033->98032 98034 46dbf9 FindClose 98033->98034 98034->98032 98036 40ae01 98035->98036 98039 40ae1c ISource 98035->98039 98037 40aec9 22 API calls 98036->98037 98038 40ae09 CharUpperBuffW 98037->98038 98038->98039 98039->97385 98041 40acae 98040->98041 98042 40acd1 98041->98042 98070 47359c 82 API calls __wsopen_s 98041->98070 98042->97426 98045 40ad92 98044->98045 98046 44fadb 98044->98046 98047 41fddb 22 API calls 98045->98047 98048 40ad99 98047->98048 98071 40adcd 98048->98071 98051->97436 98052->97434 98053->97434 98054->97388 98055->97440 98056->97404 98057->97440 98058->97440 98059->97426 98060->97426 98061->97426 98062->97426 98063->97426 98064->97426 98065->97416 98066->97440 98067->97423 98068->97431 98069->97440 98070->98042 98075 40addd 98071->98075 98072 40adb6 98072->97426 98073 41fddb 22 API calls 98073->98075 98074 40a961 22 API calls 98074->98075 98075->98072 98075->98073 98075->98074 98076 40a8c7 22 API calls 98075->98076 98077 40adcd 22 API calls 98075->98077 98076->98075 98077->98075 98082 410863 ISource 98078->98082 98085 4106bd 98078->98085 98079 410d36 98083 410847 ISource 98079->98083 98100 41acd5 39 API calls 98079->98100 98081 41082a ISource 98081->98083 98086 455ffd 98081->98086 98098 41ce17 22 API calls ISource 98081->98098 98082->98079 98082->98081 98082->98083 98082->98086 98083->97462 98085->98079 98085->98081 98085->98082 98085->98083 98088 41081e 98085->98088 98089 45600f 98086->98089 98099 42cf65 39 API calls 98086->98099 98088->98081 98091 455e15 98088->98091 98089->97462 98097 42cf65 39 API calls 98091->98097 98092->97462 98093->97461 98094->97461 98095->97466 98096->97461 98097->98091 98098->98081 98099->98089 98100->98083 98101 19a23b0 98115 19a0000 98101->98115 98103 19a248b 98118 19a22a0 98103->98118 98121 19a34d0 GetPEB 98115->98121 98117 19a068b 98117->98103 98119 19a22a9 Sleep 98118->98119 98120 19a22b7 98119->98120 98122 19a34fa 98121->98122 98122->98117 98123 401cad SystemParametersInfoW 98124 453f75 98135 41ceb1 98124->98135 98126 453f8b 98134 454006 98126->98134 98144 41e300 23 API calls 98126->98144 98128 40bf40 235 API calls 98130 454052 98128->98130 98132 454a88 98130->98132 98146 47359c 82 API calls __wsopen_s 98130->98146 98131 453fe6 98131->98130 98145 471abf 22 API calls 98131->98145 98134->98128 98136 41ced2 98135->98136 98137 41cebf 98135->98137 98139 41cf05 98136->98139 98140 41ced7 98136->98140 98147 40aceb 23 API calls ISource 98137->98147 98148 40aceb 23 API calls ISource 98139->98148 98142 41fddb 22 API calls 98140->98142 98143 41cec9 98142->98143 98143->98126 98144->98131 98145->98134 98146->98132 98147->98143 98148->98143 98149 401033 98154 404c91 98149->98154 98153 401042 98155 40a961 22 API calls 98154->98155 98156 404cff 98155->98156 98162 403af0 98156->98162 98159 404d9c 98160 401038 98159->98160 98165 4051f7 22 API calls __fread_nolock 98159->98165 98161 4200a3 29 API calls __onexit 98160->98161 98161->98153 98166 403b1c 98162->98166 98165->98159 98167 403b0f 98166->98167 98168 403b29 98166->98168 98167->98159 98168->98167 98169 403b30 RegOpenKeyExW 98168->98169 98169->98167 98170 403b4a RegQueryValueExW 98169->98170 98171 403b80 RegCloseKey 98170->98171 98172 403b6b 98170->98172 98171->98167 98172->98171 98173 403156 98176 403170 98173->98176 98177 403187 98176->98177 98178 4031eb 98177->98178 98179 40318c 98177->98179 98215 4031e9 98177->98215 98181 4031f1 98178->98181 98182 442dfb 98178->98182 98183 403265 PostQuitMessage 98179->98183 98184 403199 98179->98184 98180 4031d0 DefWindowProcW 98217 40316a 98180->98217 98185 4031f8 98181->98185 98186 40321d SetTimer RegisterWindowMessageW 98181->98186 98225 4018e2 10 API calls 98182->98225 98183->98217 98188 4031a4 98184->98188 98189 442e7c 98184->98189 98190 403201 KillTimer 98185->98190 98191 442d9c 98185->98191 98193 403246 CreatePopupMenu 98186->98193 98186->98217 98194 442e68 98188->98194 98195 4031ae 98188->98195 98230 46bf30 34 API calls ___scrt_fastfail 98189->98230 98221 4030f2 Shell_NotifyIconW ___scrt_fastfail 98190->98221 98197 442dd7 MoveWindow 98191->98197 98198 442da1 98191->98198 98192 442e1c 98226 41e499 42 API calls 98192->98226 98193->98217 98229 46c161 27 API calls ___scrt_fastfail 98194->98229 98202 442e4d 98195->98202 98203 4031b9 98195->98203 98197->98217 98205 442dc6 SetFocus 98198->98205 98206 442da7 98198->98206 98202->98180 98228 460ad7 22 API calls 98202->98228 98208 403253 98203->98208 98213 4031c4 98203->98213 98204 442e8e 98204->98180 98204->98217 98205->98217 98209 442db0 98206->98209 98206->98213 98207 403214 98222 403c50 DeleteObject DestroyWindow 98207->98222 98223 40326f 44 API calls ___scrt_fastfail 98208->98223 98224 4018e2 10 API calls 98209->98224 98213->98180 98227 4030f2 Shell_NotifyIconW ___scrt_fastfail 98213->98227 98215->98180 98216 403263 98216->98217 98219 442e41 98220 403837 49 API calls 98219->98220 98220->98215 98221->98207 98222->98217 98223->98216 98224->98217 98225->98192 98226->98213 98227->98219 98228->98215 98229->98216 98230->98204 98231 402e37 98232 40a961 22 API calls 98231->98232 98233 402e4d 98232->98233 98310 404ae3 98233->98310 98235 402e6b 98236 403a5a 24 API calls 98235->98236 98237 402e7f 98236->98237 98238 409cb3 22 API calls 98237->98238 98239 402e8c 98238->98239 98240 404ecb 94 API calls 98239->98240 98241 402ea5 98240->98241 98242 442cb0 98241->98242 98243 402ead 98241->98243 98244 472cf9 80 API calls 98242->98244 98246 40a8c7 22 API calls 98243->98246 98245 442cc3 98244->98245 98247 442ccf 98245->98247 98249 404f39 68 API calls 98245->98249 98248 402ec3 98246->98248 98251 404f39 68 API calls 98247->98251 98324 406f88 22 API calls 98248->98324 98249->98247 98253 442ce5 98251->98253 98252 402ecf 98254 409cb3 22 API calls 98252->98254 98340 403084 22 API calls 98253->98340 98255 402edc 98254->98255 98325 40a81b 41 API calls 98255->98325 98258 402eec 98260 409cb3 22 API calls 98258->98260 98259 442d02 98341 403084 22 API calls 98259->98341 98261 402f12 98260->98261 98326 40a81b 41 API calls 98261->98326 98264 442d1e 98265 403a5a 24 API calls 98264->98265 98266 442d44 98265->98266 98342 403084 22 API calls 98266->98342 98267 402f21 98270 40a961 22 API calls 98267->98270 98269 442d50 98271 40a8c7 22 API calls 98269->98271 98272 402f3f 98270->98272 98273 442d5e 98271->98273 98327 403084 22 API calls 98272->98327 98343 403084 22 API calls 98273->98343 98276 402f4b 98328 424a28 40 API calls 3 library calls 98276->98328 98277 442d6d 98281 40a8c7 22 API calls 98277->98281 98279 402f59 98279->98253 98280 402f63 98279->98280 98329 424a28 40 API calls 3 library calls 98280->98329 98284 442d83 98281->98284 98283 402f6e 98283->98259 98285 402f78 98283->98285 98344 403084 22 API calls 98284->98344 98330 424a28 40 API calls 3 library calls 98285->98330 98288 442d90 98289 402f83 98289->98264 98290 402f8d 98289->98290 98331 424a28 40 API calls 3 library calls 98290->98331 98292 402f98 98293 402fdc 98292->98293 98332 403084 22 API calls 98292->98332 98293->98277 98294 402fe8 98293->98294 98294->98288 98334 4063eb 22 API calls 98294->98334 98297 402fbf 98299 40a8c7 22 API calls 98297->98299 98298 402ff8 98335 406a50 22 API calls 98298->98335 98301 402fcd 98299->98301 98333 403084 22 API calls 98301->98333 98302 403006 98336 4070b0 23 API calls 98302->98336 98305 403021 98308 403065 98305->98308 98337 406f88 22 API calls 98305->98337 98338 4070b0 23 API calls 98305->98338 98339 403084 22 API calls 98305->98339 98311 404af0 __wsopen_s 98310->98311 98312 406b57 22 API calls 98311->98312 98313 404b22 98311->98313 98312->98313 98314 404c6d 22 API calls 98313->98314 98315 404b58 98313->98315 98314->98313 98317 404c29 98315->98317 98319 409cb3 22 API calls 98315->98319 98321 404c6d 22 API calls 98315->98321 98323 40515f 22 API calls 98315->98323 98316 409cb3 22 API calls 98320 404c52 98316->98320 98317->98316 98318 404c5e 98317->98318 98318->98235 98319->98315 98322 40515f 22 API calls 98320->98322 98321->98315 98322->98318 98323->98315 98324->98252 98325->98258 98326->98267 98327->98276 98328->98279 98329->98283 98330->98289 98331->98292 98332->98297 98333->98293 98334->98298 98335->98302 98336->98305 98337->98305 98338->98305 98339->98305 98340->98259 98341->98264 98342->98269 98343->98277 98344->98288 98345 401098 98350 4042de 98345->98350 98349 4010a7 98351 40a961 22 API calls 98350->98351 98352 4042f5 GetVersionExW 98351->98352 98353 406b57 22 API calls 98352->98353 98354 404342 98353->98354 98355 4093b2 22 API calls 98354->98355 98367 404378 98354->98367 98356 40436c 98355->98356 98358 4037a0 22 API calls 98356->98358 98357 40441b GetCurrentProcess IsWow64Process 98359 404437 98357->98359 98358->98367 98360 443824 GetSystemInfo 98359->98360 98361 40444f LoadLibraryA 98359->98361 98362 404460 GetProcAddress 98361->98362 98363 40449c GetSystemInfo 98361->98363 98362->98363 98366 404470 GetNativeSystemInfo 98362->98366 98364 404476 98363->98364 98368 40109d 98364->98368 98369 40447a FreeLibrary 98364->98369 98365 4437df 98366->98364 98367->98357 98367->98365 98370 4200a3 29 API calls __onexit 98368->98370 98369->98368 98370->98349 98371 4390fa 98372 439107 98371->98372 98376 43911f 98371->98376 98421 42f2d9 20 API calls _abort 98372->98421 98374 43910c 98422 4327ec 26 API calls _abort 98374->98422 98377 43917a 98376->98377 98385 439117 98376->98385 98423 43fdc4 21 API calls 2 library calls 98376->98423 98378 42d955 __fread_nolock 26 API calls 98377->98378 98380 439192 98378->98380 98391 438c32 98380->98391 98382 439199 98383 42d955 __fread_nolock 26 API calls 98382->98383 98382->98385 98384 4391c5 98383->98384 98384->98385 98386 42d955 __fread_nolock 26 API calls 98384->98386 98387 4391d3 98386->98387 98387->98385 98388 42d955 __fread_nolock 26 API calls 98387->98388 98389 4391e3 98388->98389 98390 42d955 __fread_nolock 26 API calls 98389->98390 98390->98385 98392 438c3e __FrameHandler3::FrameUnwindToState 98391->98392 98393 438c46 98392->98393 98394 438c5e 98392->98394 98425 42f2c6 20 API calls _abort 98393->98425 98396 438d24 98394->98396 98400 438c97 98394->98400 98432 42f2c6 20 API calls _abort 98396->98432 98397 438c4b 98426 42f2d9 20 API calls _abort 98397->98426 98402 438ca6 98400->98402 98403 438cbb 98400->98403 98401 438d29 98433 42f2d9 20 API calls _abort 98401->98433 98427 42f2c6 20 API calls _abort 98402->98427 98424 435147 EnterCriticalSection 98403->98424 98405 438cb3 98434 4327ec 26 API calls _abort 98405->98434 98408 438cc1 98410 438cf2 98408->98410 98411 438cdd 98408->98411 98409 438cab 98428 42f2d9 20 API calls _abort 98409->98428 98416 438d45 __fread_nolock 38 API calls 98410->98416 98429 42f2d9 20 API calls _abort 98411->98429 98413 438c53 __fread_nolock 98413->98382 98418 438ced 98416->98418 98417 438ce2 98430 42f2c6 20 API calls _abort 98417->98430 98431 438d1c LeaveCriticalSection __wsopen_s 98418->98431 98421->98374 98422->98385 98423->98377 98424->98408 98425->98397 98426->98413 98427->98409 98428->98405 98429->98417 98430->98418 98431->98413 98432->98401 98433->98405 98434->98413 98435 4203fb 98436 420407 __FrameHandler3::FrameUnwindToState 98435->98436 98464 41feb1 98436->98464 98438 42040e 98439 420561 98438->98439 98442 420438 98438->98442 98491 42083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98439->98491 98441 420568 98492 424e52 28 API calls _abort 98441->98492 98451 420477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98442->98451 98475 43247d 98442->98475 98444 42056e 98493 424e04 28 API calls _abort 98444->98493 98448 420576 98449 420457 98455 4204d8 98451->98455 98487 424e1a 38 API calls 2 library calls 98451->98487 98454 4204de 98456 4204f3 98454->98456 98483 420959 98455->98483 98488 420992 GetModuleHandleW 98456->98488 98458 4204fa 98458->98441 98459 4204fe 98458->98459 98460 420507 98459->98460 98489 424df5 28 API calls _abort 98459->98489 98490 420040 13 API calls 2 library calls 98460->98490 98463 42050f 98463->98449 98465 41feba 98464->98465 98494 420698 IsProcessorFeaturePresent 98465->98494 98467 41fec6 98495 422c94 10 API calls 3 library calls 98467->98495 98469 41fecb 98474 41fecf 98469->98474 98496 432317 98469->98496 98471 41fee6 98471->98438 98474->98438 98476 432494 98475->98476 98477 420a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98476->98477 98478 420451 98477->98478 98478->98449 98479 432421 98478->98479 98482 432450 98479->98482 98480 420a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98481 432479 98480->98481 98481->98451 98482->98480 98539 422340 98483->98539 98486 42097f 98486->98454 98487->98455 98488->98458 98489->98460 98490->98463 98491->98441 98492->98444 98493->98448 98494->98467 98495->98469 98500 43d1f6 98496->98500 98499 422cbd 8 API calls 3 library calls 98499->98474 98503 43d213 98500->98503 98504 43d20f 98500->98504 98501 420a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 98502 41fed8 98501->98502 98502->98471 98502->98499 98503->98504 98506 434bfb 98503->98506 98504->98501 98507 434c07 __FrameHandler3::FrameUnwindToState 98506->98507 98518 432f5e EnterCriticalSection 98507->98518 98509 434c0e 98519 4350af 98509->98519 98511 434c1d 98517 434c2c 98511->98517 98532 434a8f 29 API calls 98511->98532 98514 434c27 98533 434b45 GetStdHandle GetFileType 98514->98533 98515 434c3d __fread_nolock 98515->98503 98534 434c48 LeaveCriticalSection _abort 98517->98534 98518->98509 98520 4350bb __FrameHandler3::FrameUnwindToState 98519->98520 98521 4350c8 98520->98521 98522 4350df 98520->98522 98536 42f2d9 20 API calls _abort 98521->98536 98535 432f5e EnterCriticalSection 98522->98535 98525 4350cd 98537 4327ec 26 API calls _abort 98525->98537 98527 435117 98538 43513e LeaveCriticalSection _abort 98527->98538 98528 4350d7 __fread_nolock 98528->98511 98529 4350eb 98529->98527 98531 435000 __wsopen_s 21 API calls 98529->98531 98531->98529 98532->98514 98533->98517 98534->98515 98535->98529 98536->98525 98537->98528 98538->98528 98540 42096c GetStartupInfoW 98539->98540 98540->98486 98541 40105b 98546 40344d 98541->98546 98543 40106a 98577 4200a3 29 API calls __onexit 98543->98577 98545 401074 98547 40345d __wsopen_s 98546->98547 98548 40a961 22 API calls 98547->98548 98549 403513 98548->98549 98550 403a5a 24 API calls 98549->98550 98551 40351c 98550->98551 98578 403357 98551->98578 98554 4033c6 22 API calls 98555 403535 98554->98555 98556 40515f 22 API calls 98555->98556 98557 403544 98556->98557 98558 40a961 22 API calls 98557->98558 98559 40354d 98558->98559 98560 40a6c3 22 API calls 98559->98560 98561 403556 RegOpenKeyExW 98560->98561 98562 443176 RegQueryValueExW 98561->98562 98566 403578 98561->98566 98563 443193 98562->98563 98564 44320c RegCloseKey 98562->98564 98565 41fe0b 22 API calls 98563->98565 98564->98566 98576 44321e _wcslen 98564->98576 98567 4431ac 98565->98567 98566->98543 98569 405722 22 API calls 98567->98569 98568 404c6d 22 API calls 98568->98576 98570 4431b7 RegQueryValueExW 98569->98570 98571 4431d4 98570->98571 98573 4431ee ISource 98570->98573 98572 406b57 22 API calls 98571->98572 98572->98573 98573->98564 98574 409cb3 22 API calls 98574->98576 98575 40515f 22 API calls 98575->98576 98576->98566 98576->98568 98576->98574 98576->98575 98577->98545 98579 441f50 __wsopen_s 98578->98579 98580 403364 GetFullPathNameW 98579->98580 98581 403386 98580->98581 98582 406b57 22 API calls 98581->98582 98583 4033a4 98582->98583 98583->98554 98584 40dddc 98587 40b710 98584->98587 98588 40b72b 98587->98588 98589 450146 98588->98589 98590 4500f8 98588->98590 98614 40b750 98588->98614 98629 4858a2 235 API calls 2 library calls 98589->98629 98593 450102 98590->98593 98596 45010f 98590->98596 98590->98614 98627 485d33 235 API calls 98593->98627 98610 40ba20 98596->98610 98628 4861d0 235 API calls 2 library calls 98596->98628 98600 40bbe0 40 API calls 98600->98614 98601 4503d9 98601->98601 98602 41d336 40 API calls 98602->98614 98604 40ba4e 98606 450322 98632 485c0c 82 API calls 98606->98632 98610->98604 98633 47359c 82 API calls __wsopen_s 98610->98633 98614->98600 98614->98602 98614->98604 98614->98606 98614->98610 98615 40ec40 235 API calls 98614->98615 98616 40a8c7 22 API calls 98614->98616 98618 40a81b 41 API calls 98614->98618 98619 41d2f0 40 API calls 98614->98619 98620 41a01b 235 API calls 98614->98620 98621 420242 5 API calls __Init_thread_wait 98614->98621 98622 41edcd 22 API calls 98614->98622 98623 4200a3 29 API calls __onexit 98614->98623 98624 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98614->98624 98625 41ee53 82 API calls 98614->98625 98626 41e5ca 235 API calls 98614->98626 98630 40aceb 23 API calls ISource 98614->98630 98631 45f6bf 23 API calls 98614->98631 98615->98614 98616->98614 98618->98614 98619->98614 98620->98614 98621->98614 98622->98614 98623->98614 98624->98614 98625->98614 98626->98614 98627->98596 98628->98610 98629->98614 98630->98614 98631->98614 98632->98610 98633->98601 98634 410b9d 98639 410ba6 __fread_nolock 98634->98639 98635 407510 53 API calls 98635->98639 98636 455cb8 98646 404a88 22 API calls __fread_nolock 98636->98646 98638 455cc4 98643 40a8c7 22 API calls 98638->98643 98644 410847 __fread_nolock 98638->98644 98639->98635 98639->98636 98640 410bf7 98639->98640 98641 41fddb 22 API calls 98639->98641 98639->98644 98645 41fe0b 22 API calls 98639->98645 98642 40a587 22 API calls 98640->98642 98641->98639 98642->98644 98643->98644 98645->98639 98646->98638 98647 40f7bf 98648 40f7d3 98647->98648 98649 40fcb6 98647->98649 98651 40fcc2 98648->98651 98652 41fddb 22 API calls 98648->98652 98683 40aceb 23 API calls ISource 98649->98683 98684 40aceb 23 API calls ISource 98651->98684 98654 40f7e5 98652->98654 98654->98651 98655 40fd3d 98654->98655 98656 40f83e 98654->98656 98685 471155 22 API calls 98655->98685 98658 411310 235 API calls 98656->98658 98673 40ed9d ISource 98656->98673 98674 40ec76 ISource 98658->98674 98659 454beb 98689 47359c 82 API calls __wsopen_s 98659->98689 98660 4106a0 41 API calls 98660->98674 98661 40fef7 98667 40a8c7 22 API calls 98661->98667 98661->98673 98663 41fddb 22 API calls 98663->98674 98664 454600 98669 40a8c7 22 API calls 98664->98669 98664->98673 98665 454b0b 98687 47359c 82 API calls __wsopen_s 98665->98687 98667->98673 98669->98673 98671 40a8c7 22 API calls 98671->98674 98672 420242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98672->98674 98674->98659 98674->98660 98674->98661 98674->98663 98674->98664 98674->98665 98674->98671 98674->98672 98674->98673 98675 40fbe3 98674->98675 98676 40a961 22 API calls 98674->98676 98679 4201f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98674->98679 98680 4200a3 29 API calls pre_c_initialization 98674->98680 98681 40f3ae ISource 98674->98681 98682 4101e0 235 API calls 2 library calls 98674->98682 98675->98673 98677 454bdc 98675->98677 98675->98681 98676->98674 98688 47359c 82 API calls __wsopen_s 98677->98688 98679->98674 98680->98674 98681->98673 98686 47359c 82 API calls __wsopen_s 98681->98686 98682->98674 98683->98651 98684->98655 98685->98673 98686->98673 98687->98673 98688->98659 98689->98673

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 234 4042de-40434d call 40a961 GetVersionExW call 406b57 239 443617-44362a 234->239 240 404353 234->240 241 44362b-44362f 239->241 242 404355-404357 240->242 243 443631 241->243 244 443632-44363e 241->244 245 443656 242->245 246 40435d-4043bc call 4093b2 call 4037a0 242->246 243->244 244->241 247 443640-443642 244->247 250 44365d-443660 245->250 260 4043c2-4043c4 246->260 261 4437df-4437e6 246->261 247->242 249 443648-44364f 247->249 249->239 252 443651 249->252 253 443666-4436a8 250->253 254 40441b-404435 GetCurrentProcess IsWow64Process 250->254 252->245 253->254 259 4436ae-4436b1 253->259 257 404494-40449a 254->257 258 404437 254->258 262 40443d-404449 257->262 258->262 263 4436b3-4436bd 259->263 264 4436db-4436e5 259->264 260->250 267 4043ca-4043dd 260->267 268 443806-443809 261->268 269 4437e8 261->269 272 443824-443828 GetSystemInfo 262->272 273 40444f-40445e LoadLibraryA 262->273 265 4436bf-4436c5 263->265 266 4436ca-4436d6 263->266 270 4436e7-4436f3 264->270 271 4436f8-443702 264->271 265->254 266->254 274 443726-44372f 267->274 275 4043e3-4043e5 267->275 279 4437f4-4437fc 268->279 280 44380b-44381a 268->280 276 4437ee 269->276 270->254 277 443704-443710 271->277 278 443715-443721 271->278 281 404460-40446e GetProcAddress 273->281 282 40449c-4044a6 GetSystemInfo 273->282 286 443731-443737 274->286 287 44373c-443748 274->287 284 44374d-443762 275->284 285 4043eb-4043ee 275->285 276->279 277->254 278->254 279->268 280->276 288 44381c-443822 280->288 281->282 289 404470-404474 GetNativeSystemInfo 281->289 283 404476-404478 282->283 294 404481-404493 283->294 295 40447a-40447b FreeLibrary 283->295 292 443764-44376a 284->292 293 44376f-44377b 284->293 290 4043f4-40440f 285->290 291 443791-443794 285->291 286->254 287->254 288->279 289->283 296 443780-44378c 290->296 297 404415 290->297 291->254 298 44379a-4437c1 291->298 292->254 293->254 295->294 296->254 297->254 299 4437c3-4437c9 298->299 300 4437ce-4437da 298->300 299->254 300->254
                  APIs
                  • GetVersionExW.KERNEL32(?), ref: 0040430D
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                  • GetCurrentProcess.KERNEL32(?,0049CB64,00000000,?,?), ref: 00404422
                  • IsWow64Process.KERNEL32(00000000,?,?), ref: 00404429
                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00404454
                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404466
                  • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00404474
                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 0040447B
                  • GetSystemInfo.KERNEL32(?,?,?), ref: 004044A0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                  • String ID: GetNativeSystemInfo$kernel32.dll$|O
                  • API String ID: 3290436268-3101561225
                  • Opcode ID: 4793c8f21a9c9181553e3ecf3aeeacc2caea5ab6ebcc57d422027d341fcf7de5
                  • Instruction ID: f2db94d72f8a0dd2313c2dbe6fb09547a999aedd017194ba44beff19de37ffa5
                  • Opcode Fuzzy Hash: 4793c8f21a9c9181553e3ecf3aeeacc2caea5ab6ebcc57d422027d341fcf7de5
                  • Instruction Fuzzy Hash: 1AA1B6A190B2D0FFF711CB69BC815957FA5AB76700B1844BBDC81A3B72D2384515CB2E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1797 4042a2-4042ba CreateStreamOnHGlobal 1798 4042da-4042dd 1797->1798 1799 4042bc-4042d3 FindResourceExW 1797->1799 1800 4042d9 1799->1800 1801 4435ba-4435c9 LoadResource 1799->1801 1800->1798 1801->1800 1802 4435cf-4435dd SizeofResource 1801->1802 1802->1800 1803 4435e3-4435ee LockResource 1802->1803 1803->1800 1804 4435f4-443612 1803->1804 1804->1800
                  APIs
                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,004050AA,?,?,00000000,00000000), ref: 004042B2
                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,004050AA,?,?,00000000,00000000), ref: 004042C9
                  • LoadResource.KERNEL32(?,00000000,?,?,004050AA,?,?,00000000,00000000,?,?,?,?,?,?,00404F20), ref: 004435BE
                  • SizeofResource.KERNEL32(?,00000000,?,?,004050AA,?,?,00000000,00000000,?,?,?,?,?,?,00404F20), ref: 004435D3
                  • LockResource.KERNEL32(004050AA,?,?,004050AA,?,?,00000000,00000000,?,?,?,?,?,?,00404F20,?), ref: 004435E6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                  • String ID: SCRIPT
                  • API String ID: 3051347437-3967369404
                  • Opcode ID: bd63ab4ad02e2fe76dd7d434f9685d8d36af1090133f144fb2420f10bad9b318
                  • Instruction ID: 7b141b112ae088f56cf646199b51eb6980b8c393c86a64e8297b8a0f16958f52
                  • Opcode Fuzzy Hash: bd63ab4ad02e2fe76dd7d434f9685d8d36af1090133f144fb2420f10bad9b318
                  • Instruction Fuzzy Hash: 96117CB0600700BFEB218B65DC88F277BB9EBD5B91F2041BEF502D6290DB71E8008675

                  Control-flow Graph

                  APIs
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00402B6B
                    • Part of subcall function 00403A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004D1418,?,00402E7F,?,?,?,00000000), ref: 00403A78
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • GetForegroundWindow.USER32(runas,?,?,?,?,?,004C2224), ref: 00442C10
                  • ShellExecuteW.SHELL32(00000000,?,?,004C2224), ref: 00442C17
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                  • String ID: runas
                  • API String ID: 448630720-4000483414
                  • Opcode ID: 8711b03bad58fbf001bbbb1bd4b9a1a7383c7480468d1113a5630f37fe68491f
                  • Instruction ID: f5f6d1560cde91b349b40d05329fa9bcbf1412b573ea30ffcf12cb2e0bd517e4
                  • Opcode Fuzzy Hash: 8711b03bad58fbf001bbbb1bd4b9a1a7383c7480468d1113a5630f37fe68491f
                  • Instruction Fuzzy Hash: 4C1102312082416AC704FF61D996A7E7BA8AB90749F44443FB842221E3CF7C9A49C71E
                  APIs
                  • lstrlenW.KERNEL32(?,00445222), ref: 0046DBCE
                  • GetFileAttributesW.KERNELBASE(?), ref: 0046DBDD
                  • FindFirstFileW.KERNELBASE(?,?), ref: 0046DBEE
                  • FindClose.KERNEL32(00000000), ref: 0046DBFA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FileFind$AttributesCloseFirstlstrlen
                  • String ID:
                  • API String ID: 2695905019-0
                  • Opcode ID: 6fa4ac448b5ec19a81878dd5603f9d89d54fa5849c42d184b22fb049997efb24
                  • Instruction ID: 70a6eeb17e27ba3ac066058be58d8c683c8c8675871e312be0d5d0824ac0dfae
                  • Opcode Fuzzy Hash: 6fa4ac448b5ec19a81878dd5603f9d89d54fa5849c42d184b22fb049997efb24
                  • Instruction Fuzzy Hash: 24F0A030C1091857C220AB78AC4D8AB376C9E01334B544763F836C21E0FBB5599586DE
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: BuffCharUpper
                  • String ID: p#M
                  • API String ID: 3964851224-494205710
                  • Opcode ID: 339de113143bcef8867d4aa9bc588418efb953771b861a93d22c6c8e319bf0b5
                  • Instruction ID: 3e22cf882efccef595a0682dd0d20a6a23e92b948fe06f8badcd25310555a476
                  • Opcode Fuzzy Hash: 339de113143bcef8867d4aa9bc588418efb953771b861a93d22c6c8e319bf0b5
                  • Instruction Fuzzy Hash: 67A26B74608301DFD720DF15C480B6AB7E1BF89304F14896EE89A9B392D779EC45CB9A
                  APIs
                  • GetInputState.USER32 ref: 0040D807
                  • timeGetTime.WINMM ref: 0040DA07
                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0040DB28
                  • TranslateMessage.USER32(?), ref: 0040DB7B
                  • DispatchMessageW.USER32(?), ref: 0040DB89
                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0040DB9F
                  • Sleep.KERNEL32(0000000A), ref: 0040DBB1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                  • String ID:
                  • API String ID: 2189390790-0
                  • Opcode ID: d3befa091f829e130a76d381ef6f034ce7dcc538745c69d4743ef4194e0aa367
                  • Instruction ID: 4c09e840e3574fd92d1257d7f9367f6878cad7d9768aa2736193bcb7d24aef7f
                  • Opcode Fuzzy Hash: d3befa091f829e130a76d381ef6f034ce7dcc538745c69d4743ef4194e0aa367
                  • Instruction Fuzzy Hash: 7342E270A04241AFD725CF64C984BAAB7E0BF46304F14456FE855973E2D7B8E84DCB8A

                  Control-flow Graph

                  APIs
                  • GetSysColorBrush.USER32(0000000F), ref: 00402D07
                  • RegisterClassExW.USER32(00000030), ref: 00402D31
                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00402D42
                  • InitCommonControlsEx.COMCTL32(?), ref: 00402D5F
                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00402D6F
                  • LoadIconW.USER32(000000A9), ref: 00402D85
                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00402D94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                  • API String ID: 2914291525-1005189915
                  • Opcode ID: cd8d14c0ebef9928fdd3d13a22045c689fd9971fe87f714c84563d368b3f35de
                  • Instruction ID: 68500bc772f0f6273025a355d775a2daaef7a78e7c89274bad8ffdcdfee80e8b
                  • Opcode Fuzzy Hash: cd8d14c0ebef9928fdd3d13a22045c689fd9971fe87f714c84563d368b3f35de
                  • Instruction Fuzzy Hash: A021C5B5912219AFEB00DFE4E899BDDBBB4FB08700F10817BF911A62A0D7B54544CF99

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 302 438d45-438d55 303 438d57-438d6a call 42f2c6 call 42f2d9 302->303 304 438d6f-438d71 302->304 318 4390f1 303->318 305 438d77-438d7d 304->305 306 4390d9-4390e6 call 42f2c6 call 42f2d9 304->306 305->306 310 438d83-438dae 305->310 324 4390ec call 4327ec 306->324 310->306 313 438db4-438dbd 310->313 316 438dd7-438dd9 313->316 317 438dbf-438dd2 call 42f2c6 call 42f2d9 313->317 321 4390d5-4390d7 316->321 322 438ddf-438de3 316->322 317->324 323 4390f4-4390f9 318->323 321->323 322->321 326 438de9-438ded 322->326 324->318 326->317 329 438def-438e06 326->329 330 438e23-438e2c 329->330 331 438e08-438e0b 329->331 335 438e4a-438e54 330->335 336 438e2e-438e45 call 42f2c6 call 42f2d9 call 4327ec 330->336 333 438e15-438e1e 331->333 334 438e0d-438e13 331->334 337 438ebf-438ed9 333->337 334->333 334->336 339 438e56-438e58 335->339 340 438e5b-438e79 call 433820 call 4329c8 * 2 335->340 367 43900c 336->367 342 438edf-438eef 337->342 343 438fad-438fb6 call 43f89b 337->343 339->340 371 438e96-438ebc call 439424 340->371 372 438e7b-438e91 call 42f2d9 call 42f2c6 340->372 342->343 347 438ef5-438ef7 342->347 356 439029 343->356 357 438fb8-438fca 343->357 347->343 352 438efd-438f23 347->352 352->343 353 438f29-438f3c 352->353 353->343 358 438f3e-438f40 353->358 360 43902d-439045 ReadFile 356->360 357->356 362 438fcc-438fdb GetConsoleMode 357->362 358->343 363 438f42-438f6d 358->363 365 4390a1-4390ac GetLastError 360->365 366 439047-43904d 360->366 362->356 368 438fdd-438fe1 362->368 363->343 370 438f6f-438f82 363->370 373 4390c5-4390c8 365->373 374 4390ae-4390c0 call 42f2d9 call 42f2c6 365->374 366->365 375 43904f 366->375 369 43900f-439019 call 4329c8 367->369 368->360 376 438fe3-438ffd ReadConsoleW 368->376 369->323 370->343 378 438f84-438f86 370->378 371->337 372->367 385 439005-43900b call 42f2a3 373->385 386 4390ce-4390d0 373->386 374->367 382 439052-439064 375->382 383 438fff GetLastError 376->383 384 43901e-439027 376->384 378->343 388 438f88-438fa8 378->388 382->369 392 439066-43906a 382->392 383->385 384->382 385->367 386->369 388->343 397 439083-43908e 392->397 398 43906c-43907c call 438a61 392->398 399 439090 call 438bb1 397->399 400 43909a-43909f call 4388a1 397->400 409 43907f-439081 398->409 407 439095-439098 399->407 400->407 407->409 409->369
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: .B
                  • API String ID: 0-829718130
                  • Opcode ID: 1a429c879d0e0c11a062f5037e8e0557d84ca674edd92bd5450c4b7a15ab3dcd
                  • Instruction ID: ba4d2f9f1d6b6df295ecb80300e5698ac04355b15020690fa3d2e25e92e1a355
                  • Opcode Fuzzy Hash: 1a429c879d0e0c11a062f5037e8e0557d84ca674edd92bd5450c4b7a15ab3dcd
                  • Instruction Fuzzy Hash: 69C1E274A04349AFCB159FA9D841BAEBBB0AF0D310F1450AFF414A7392C7798D41CB69

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 410 44065b-44068b call 44042f 413 4406a6-4406b2 call 435221 410->413 414 44068d-440698 call 42f2c6 410->414 419 4406b4-4406c9 call 42f2c6 call 42f2d9 413->419 420 4406cb-440714 call 44039a 413->420 421 44069a-4406a1 call 42f2d9 414->421 419->421 429 440716-44071f 420->429 430 440781-44078a GetFileType 420->430 431 44097d-440983 421->431 435 440756-44077c GetLastError call 42f2a3 429->435 436 440721-440725 429->436 432 4407d3-4407d6 430->432 433 44078c-4407bd GetLastError call 42f2a3 CloseHandle 430->433 438 4407df-4407e5 432->438 439 4407d8-4407dd 432->439 433->421 447 4407c3-4407ce call 42f2d9 433->447 435->421 436->435 440 440727-440754 call 44039a 436->440 443 4407e9-440837 call 43516a 438->443 444 4407e7 438->444 439->443 440->430 440->435 453 440847-44086b call 44014d 443->453 454 440839-440845 call 4405ab 443->454 444->443 447->421 460 44086d 453->460 461 44087e-4408c1 453->461 454->453 459 44086f-440879 call 4386ae 454->459 459->431 460->459 463 4408e2-4408f0 461->463 464 4408c3-4408c7 461->464 467 4408f6-4408fa 463->467 468 44097b 463->468 464->463 466 4408c9-4408dd 464->466 466->463 467->468 469 4408fc-44092f CloseHandle call 44039a 467->469 468->431 472 440931-44095d GetLastError call 42f2a3 call 435333 469->472 473 440963-440977 469->473 472->473 473->468
                  APIs
                    • Part of subcall function 0044039A: CreateFileW.KERNELBASE(00000000,00000000,?,00440704,?,?,00000000,?,00440704,00000000,0000000C), ref: 004403B7
                  • GetLastError.KERNEL32 ref: 0044076F
                  • __dosmaperr.LIBCMT ref: 00440776
                  • GetFileType.KERNELBASE(00000000), ref: 00440782
                  • GetLastError.KERNEL32 ref: 0044078C
                  • __dosmaperr.LIBCMT ref: 00440795
                  • CloseHandle.KERNEL32(00000000), ref: 004407B5
                  • CloseHandle.KERNEL32(?), ref: 004408FF
                  • GetLastError.KERNEL32 ref: 00440931
                  • __dosmaperr.LIBCMT ref: 00440938
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                  • String ID: H
                  • API String ID: 4237864984-2852464175
                  • Opcode ID: 7e821adffe91cbc9713f8d52b49a87b3260336805fc21dec40f5ae5b36cdbdbf
                  • Instruction ID: 0e080a019c9861a23bdbb9aa90aa9b2b7a8dbc6c0bc5328ec41012dbdd50e36c
                  • Opcode Fuzzy Hash: 7e821adffe91cbc9713f8d52b49a87b3260336805fc21dec40f5ae5b36cdbdbf
                  • Instruction Fuzzy Hash: C8A11832A041148FEF19AF68D851BAE7BB0EB06324F14016FF915DB391D7399D22CB99

                  Control-flow Graph

                  APIs
                    • Part of subcall function 00403A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004D1418,?,00402E7F,?,?,?,00000000), ref: 00403A78
                    • Part of subcall function 00403357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00403379
                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0040356A
                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0044318D
                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 004431CE
                  • RegCloseKey.ADVAPI32(?), ref: 00443210
                  • _wcslen.LIBCMT ref: 00443277
                  • _wcslen.LIBCMT ref: 00443286
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                  • API String ID: 98802146-2727554177
                  • Opcode ID: 47612595baf8e8967cb60742a8425c4d553e9cd10144ccd1f6134466858df5b7
                  • Instruction ID: 6b06cd0ec7865beb68f8dca776b2102844a6d920aa240daec9c92be3ad86e6c7
                  • Opcode Fuzzy Hash: 47612595baf8e8967cb60742a8425c4d553e9cd10144ccd1f6134466858df5b7
                  • Instruction Fuzzy Hash: 4B719C715053009ED304EF66ED8195BBBE8FFA5744F40443FF945932A0DBB89A48CB69

                  Control-flow Graph

                  APIs
                  • GetSysColorBrush.USER32(0000000F), ref: 00402B8E
                  • LoadCursorW.USER32(00000000,00007F00), ref: 00402B9D
                  • LoadIconW.USER32(00000063), ref: 00402BB3
                  • LoadIconW.USER32(000000A4), ref: 00402BC5
                  • LoadIconW.USER32(000000A2), ref: 00402BD7
                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00402BEF
                  • RegisterClassExW.USER32(?), ref: 00402C40
                    • Part of subcall function 00402CD4: GetSysColorBrush.USER32(0000000F), ref: 00402D07
                    • Part of subcall function 00402CD4: RegisterClassExW.USER32(00000030), ref: 00402D31
                    • Part of subcall function 00402CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00402D42
                    • Part of subcall function 00402CD4: InitCommonControlsEx.COMCTL32(?), ref: 00402D5F
                    • Part of subcall function 00402CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00402D6F
                    • Part of subcall function 00402CD4: LoadIconW.USER32(000000A9), ref: 00402D85
                    • Part of subcall function 00402CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00402D94
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                  • String ID: #$0$AutoIt v3
                  • API String ID: 423443420-4155596026
                  • Opcode ID: 605ed9f92788a8b989f3a8f1d18a629d4d47fb207dfd681377a2d45831cf429d
                  • Instruction ID: fdf1f53ea2b3c6eff9ac3e4012a176caf8033a6cfb4dfa18940d773588615557
                  • Opcode Fuzzy Hash: 605ed9f92788a8b989f3a8f1d18a629d4d47fb207dfd681377a2d45831cf429d
                  • Instruction Fuzzy Hash: E121F870A02314BBEB109FE5EC99A997FB4FB48B50F40417BED05A66B0D7B505408F98
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 0040BB4E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Init_thread_footer
                  • String ID: p#M$p#M$p#M$p#M$p%M$p%M$x#M$x#M
                  • API String ID: 1385522511-4294567592
                  • Opcode ID: 60a5f6173983d50bd836f19c4ee3a840ce5d9c03cb06201b0fc964ae55784436
                  • Instruction ID: 343a0d36f4b6d5256f5d1d729f18b9c0352e9f795892c7fed817586e4d6d27b0
                  • Opcode Fuzzy Hash: 60a5f6173983d50bd836f19c4ee3a840ce5d9c03cb06201b0fc964ae55784436
                  • Instruction Fuzzy Hash: D932BF75A00209AFDB10DF54C994ABAB7B5EF44304F14806BED05AB392C77CAD46CB9E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 758 403170-403185 759 4031e5-4031e7 758->759 760 403187-40318a 758->760 759->760 761 4031e9 759->761 762 4031eb 760->762 763 40318c-403193 760->763 764 4031d0-4031d8 DefWindowProcW 761->764 765 4031f1-4031f6 762->765 766 442dfb-442e23 call 4018e2 call 41e499 762->766 767 403265-40326d PostQuitMessage 763->767 768 403199-40319e 763->768 774 4031de-4031e4 764->774 769 4031f8-4031fb 765->769 770 40321d-403244 SetTimer RegisterWindowMessageW 765->770 804 442e28-442e2f 766->804 775 403219-40321b 767->775 772 4031a4-4031a8 768->772 773 442e7c-442e90 call 46bf30 768->773 776 403201-403214 KillTimer call 4030f2 call 403c50 769->776 777 442d9c-442d9f 769->777 770->775 779 403246-403251 CreatePopupMenu 770->779 780 442e68-442e77 call 46c161 772->780 781 4031ae-4031b3 772->781 773->775 799 442e96 773->799 775->774 776->775 783 442dd7-442df6 MoveWindow 777->783 784 442da1-442da5 777->784 779->775 780->775 788 442e4d-442e54 781->788 789 4031b9-4031be 781->789 783->775 791 442dc6-442dd2 SetFocus 784->791 792 442da7-442daa 784->792 788->764 793 442e5a-442e63 call 460ad7 788->793 797 403253-403263 call 40326f 789->797 798 4031c4-4031ca 789->798 791->775 792->798 800 442db0-442dc1 call 4018e2 792->800 793->764 797->775 798->764 798->804 799->764 800->775 804->764 808 442e35-442e48 call 4030f2 call 403837 804->808 808->764
                  APIs
                  • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0040316A,?,?), ref: 004031D8
                  • KillTimer.USER32(?,00000001,?,?,?,?,?,0040316A,?,?), ref: 00403204
                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00403227
                  • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0040316A,?,?), ref: 00403232
                  • CreatePopupMenu.USER32 ref: 00403246
                  • PostQuitMessage.USER32(00000000), ref: 00403267
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                  • String ID: TaskbarCreated
                  • API String ID: 129472671-2362178303
                  • Opcode ID: ceda3d6a2b70603adb1016ef9d825d4e8f7f0574f64d5386c6f6373f7a72e13a
                  • Instruction ID: ab42f81a9c9e9540a8207aca63c2d886ba16079ae50bf9410dd7680181aa4467
                  • Opcode Fuzzy Hash: ceda3d6a2b70603adb1016ef9d825d4e8f7f0574f64d5386c6f6373f7a72e13a
                  • Instruction Fuzzy Hash: BC411435200200B7EB141FA89D69B7A3E1DEB5A306F0441BBFD01A93E1C7BC9E41976E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: D%M$D%M$D%M$D%M$D%MD%M$Variable must be of type 'Object'.
                  • API String ID: 0-1027932916
                  • Opcode ID: afbd9cbb7f1eedfeb7154f246d9289e4a85c62da78714202cced644de0f5c0ac
                  • Instruction ID: c4b2a72c4da046813e043d22fe78e5b358b2aee9d932fd58163e7719ded2f9e7
                  • Opcode Fuzzy Hash: afbd9cbb7f1eedfeb7154f246d9289e4a85c62da78714202cced644de0f5c0ac
                  • Instruction Fuzzy Hash: E6C2AF71A00214DFCB14CF5AC880AAEB7B1BF08305F24896BE945BB391D379ED56CB59
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 0040FE66
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Init_thread_footer
                  • String ID: D%M$D%M$D%M$D%M$D%MD%M
                  • API String ID: 1385522511-4257622051
                  • Opcode ID: a2da50bf1a00fc8e48dd5a58364141d8c9b9915468979c54c01f67f39a88a024
                  • Instruction ID: fb9accebd64adddd2bb5827335d69ce42ff79b9356890c8bce503789b0f03d42
                  • Opcode Fuzzy Hash: a2da50bf1a00fc8e48dd5a58364141d8c9b9915468979c54c01f67f39a88a024
                  • Instruction Fuzzy Hash: B7B26B74608301CFD724CF15C490A2AB7E1BB99304F24497FE885AB791D779EC89CB9A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1767 19a0920-19a0972 call 19a0820 CreateFileW 1770 19a097b-19a0988 1767->1770 1771 19a0974-19a0976 1767->1771 1774 19a098a-19a0996 1770->1774 1775 19a099b-19a09b2 VirtualAlloc 1770->1775 1772 19a0ad4-19a0ad8 1771->1772 1774->1772 1776 19a09bb-19a09e1 CreateFileW 1775->1776 1777 19a09b4-19a09b6 1775->1777 1779 19a09e3-19a0a00 1776->1779 1780 19a0a05-19a0a1f ReadFile 1776->1780 1777->1772 1779->1772 1781 19a0a43-19a0a47 1780->1781 1782 19a0a21-19a0a3e 1780->1782 1783 19a0a68-19a0a7f WriteFile 1781->1783 1784 19a0a49-19a0a66 1781->1784 1782->1772 1787 19a0aaa-19a0acf FindCloseChangeNotification VirtualFree 1783->1787 1788 19a0a81-19a0aa8 1783->1788 1784->1772 1787->1772 1788->1772
                  APIs
                  • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 019A0965
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                  • Instruction ID: 51781bf227914c27e133e8f89d0a325cab2556a8d70d13e780ff558b04e2a95b
                  • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                  • Instruction Fuzzy Hash: 2E510875A50208FBEF20DFA4CC59FDE7778EF48701F508A54F65AEA180DA749644CBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1807 402c63-402cd3 CreateWindowExW * 2 ShowWindow * 2
                  APIs
                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00402C91
                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00402CB2
                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00401CAD,?), ref: 00402CC6
                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00401CAD,?), ref: 00402CCF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$CreateShow
                  • String ID: AutoIt v3$edit
                  • API String ID: 1584632944-3779509399
                  • Opcode ID: 51e6fecc8764636b7c090a873b3b3bfe5ef2308d8e38334be490cb02b7739a6f
                  • Instruction ID: 7a34e4d0998ca0875f1963070f5042042a7a4deb83dd047b3e3833309c86b5c1
                  • Opcode Fuzzy Hash: 51e6fecc8764636b7c090a873b3b3bfe5ef2308d8e38334be490cb02b7739a6f
                  • Instruction Fuzzy Hash: FBF0B2B56412907BFB211B27AC48E772FBDD7CAF60B10407BFD04A25B0C6651850DAB8

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 1922 472947-4729b9 call 441f50 call 4725d6 call 41fe0b call 405722 call 47274e call 40511f call 425232 1937 4729bf-4729c6 call 472e66 1922->1937 1938 472a6c-472a73 call 472e66 1922->1938 1943 472a75-472a77 1937->1943 1944 4729cc-472a6a call 42d583 call 424983 call 429038 call 42d583 call 429038 * 2 1937->1944 1938->1943 1945 472a7c 1938->1945 1946 472cb6-472cb7 1943->1946 1948 472a7f-472b3a call 4050f5 * 8 call 473017 call 42e5eb 1944->1948 1945->1948 1949 472cd5-472cdb 1946->1949 1987 472b43-472b5e call 472792 1948->1987 1988 472b3c-472b3e 1948->1988 1952 472cf0-472cf6 1949->1952 1953 472cdd-472ced call 41fdcd call 41fe14 1949->1953 1953->1952 1991 472b64-472b6c 1987->1991 1992 472bf0-472bfc call 42e678 1987->1992 1988->1946 1993 472b74 1991->1993 1994 472b6e-472b72 1991->1994 1999 472c12-472c16 1992->1999 2000 472bfe-472c0d DeleteFileW 1992->2000 1996 472b79-472b97 call 4050f5 1993->1996 1994->1996 2006 472bc1-472bd7 call 47211d call 42dbb3 1996->2006 2007 472b99-472b9e 1996->2007 2002 472c91-472ca5 CopyFileW 1999->2002 2003 472c18-472c7e call 4725d6 call 42d2eb * 2 call 4722ce 1999->2003 2000->1946 2004 472ca7-472cb4 DeleteFileW 2002->2004 2005 472cb9-472ccf DeleteFileW call 472fd8 2002->2005 2003->2005 2027 472c80-472c8f DeleteFileW 2003->2027 2004->1946 2014 472cd4 2005->2014 2021 472bdc-472be7 2006->2021 2011 472ba1-472bb4 call 4728d2 2007->2011 2022 472bb6-472bbf 2011->2022 2014->1949 2021->1991 2024 472bed 2021->2024 2022->2006 2024->1992 2027->1946
                  APIs
                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00472C05
                  • DeleteFileW.KERNEL32(?), ref: 00472C87
                  • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00472C9D
                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00472CAE
                  • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00472CC0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: File$Delete$Copy
                  • String ID:
                  • API String ID: 3226157194-0
                  • Opcode ID: 1974a74113c8ecb11c3ee36e1a02ffb3d031a4db1108ec6ec54143f35f7c80ee
                  • Instruction ID: 25f273e5bc0cef79ba705e547f5ffbb84529f1a3e9f84871978032dcead80d90
                  • Opcode Fuzzy Hash: 1974a74113c8ecb11c3ee36e1a02ffb3d031a4db1108ec6ec54143f35f7c80ee
                  • Instruction Fuzzy Hash: 44B16C71E00129ABDF11DFA5CD85EDFB7BCEF48304F0080ABF509A6141EA789A448F69

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2302 435aa9-435ace 2303 435ad0-435ad2 2302->2303 2304 435ad7-435ad9 2302->2304 2305 435ca5-435cb4 call 420a8c 2303->2305 2306 435adb-435af5 call 42f2c6 call 42f2d9 call 4327ec 2304->2306 2307 435afa-435b1f 2304->2307 2306->2305 2309 435b21-435b24 2307->2309 2310 435b26-435b2c 2307->2310 2309->2310 2314 435b4e-435b53 2309->2314 2315 435b4b 2310->2315 2316 435b2e-435b46 call 42f2c6 call 42f2d9 call 4327ec 2310->2316 2319 435b55-435b61 call 439424 2314->2319 2320 435b64-435b6d call 43564e 2314->2320 2315->2314 2350 435c9c-435c9f 2316->2350 2319->2320 2331 435ba8-435bba 2320->2331 2332 435b6f-435b71 2320->2332 2334 435c02-435c23 WriteFile 2331->2334 2335 435bbc-435bc2 2331->2335 2336 435b73-435b78 2332->2336 2337 435b95-435b9e call 43542e 2332->2337 2341 435c25-435c2b GetLastError 2334->2341 2342 435c2e 2334->2342 2344 435bf2-435c00 call 4356c4 2335->2344 2345 435bc4-435bc7 2335->2345 2338 435b7e-435b8b call 4355e1 2336->2338 2339 435c6c-435c7e 2336->2339 2351 435ba3-435ba6 2337->2351 2359 435b8e-435b90 2338->2359 2348 435c80-435c83 2339->2348 2349 435c89-435c99 call 42f2d9 call 42f2c6 2339->2349 2341->2342 2352 435c31-435c3c 2342->2352 2344->2351 2353 435be2-435bf0 call 435891 2345->2353 2354 435bc9-435bcc 2345->2354 2348->2349 2357 435c85-435c87 2348->2357 2349->2350 2363 435ca4 2350->2363 2351->2359 2360 435ca1 2352->2360 2361 435c3e-435c43 2352->2361 2353->2351 2354->2339 2362 435bd2-435be0 call 4357a3 2354->2362 2357->2363 2359->2352 2360->2363 2367 435c45-435c4a 2361->2367 2368 435c69 2361->2368 2362->2351 2363->2305 2371 435c60-435c67 call 42f2a3 2367->2371 2372 435c4c-435c5e call 42f2d9 call 42f2c6 2367->2372 2368->2339 2371->2350 2372->2350
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: JO@
                  • API String ID: 0-2205270878
                  • Opcode ID: ce11c385007f2bca724f6a85d1323d771e574351dcda8f1700ed997d3dbc06b4
                  • Instruction ID: b658f802e9b97f4507de46c4e8aebdb1be01e23f2c7002ec2af2b44329f3f5e7
                  • Opcode Fuzzy Hash: ce11c385007f2bca724f6a85d1323d771e574351dcda8f1700ed997d3dbc06b4
                  • Instruction Fuzzy Hash: C7510171E006099FDB209FA5D845FEFBBB4AF0D328F54206BF404A7291D7799901CB6A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 2381 19a23b0-19a2501 call 19a0000 call 19a22a0 CreateFileW 2388 19a2508-19a2518 2381->2388 2389 19a2503 2381->2389 2392 19a251a 2388->2392 2393 19a251f-19a2539 VirtualAlloc 2388->2393 2390 19a25d5-19a25da 2389->2390 2392->2390 2394 19a253b 2393->2394 2395 19a2540-19a2557 ReadFile 2393->2395 2394->2390 2396 19a255b-19a2570 call 19a1070 2395->2396 2397 19a2559 2395->2397 2399 19a2575-19a25af call 19a22e0 call 19a12a0 2396->2399 2397->2390 2404 19a25cb-19a25d3 2399->2404 2405 19a25b1-19a25c6 call 19a2330 2399->2405 2404->2390 2405->2404
                  APIs
                    • Part of subcall function 019A22A0: Sleep.KERNELBASE(000001F4), ref: 019A22B1
                  • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 019A24F7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateFileSleep
                  • String ID: 3E6JR6HNK9YSCH0NGAP98O1PEBN83H
                  • API String ID: 2694422964-3165740031
                  • Opcode ID: 1adb666e34167b4a5e8f8a9bdb131d3117eea077a01e82f0bf7e5e3123611890
                  • Instruction ID: 6fd36f0e293c6d7404a18821429fd84fea4da452b686a13a2a8a71e3aa3a5640
                  • Opcode Fuzzy Hash: 1adb666e34167b4a5e8f8a9bdb131d3117eea077a01e82f0bf7e5e3123611890
                  • Instruction Fuzzy Hash: 3B61C570D14288DBEF11DBB8C854BDEBBB8AF15304F444199E6497B2C1C7B90B49CBA5
                  APIs
                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00403B0F,SwapMouseButtons,00000004,?), ref: 00403B40
                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00403B0F,SwapMouseButtons,00000004,?), ref: 00403B61
                  • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00403B0F,SwapMouseButtons,00000004,?), ref: 00403B83
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID: Control Panel\Mouse
                  • API String ID: 3677997916-824357125
                  • Opcode ID: 0959b0ddec1cba643f577c19215e0075b7e0a6184c558c9dd6fb4a3c2268b19c
                  • Instruction ID: ca195ead4528b8a23fc7ba3cfd62d337cdc7e86e54e9894420a49c809fb6550f
                  • Opcode Fuzzy Hash: 0959b0ddec1cba643f577c19215e0075b7e0a6184c558c9dd6fb4a3c2268b19c
                  • Instruction Fuzzy Hash: 74112AB5510208FFDB208FA5DC85EAFBBBCEF04749B10447BA805E7251D235AE449768
                  APIs
                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 004433A2
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00403A04
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: IconLoadNotifyShell_String_wcslen
                  • String ID: Line:
                  • API String ID: 2289894680-1585850449
                  • Opcode ID: 7d128d3df15a82c4a358750137bf652b887cfa9c7dfb85890cec34e191ef9638
                  • Instruction ID: 95e8adabefa257a8f7af2925cc6c9b09992a5e55aac9b429686e6934987c3a86
                  • Opcode Fuzzy Hash: 7d128d3df15a82c4a358750137bf652b887cfa9c7dfb85890cec34e191ef9638
                  • Instruction Fuzzy Hash: E531E471509300AAD320EF21DC45BDB77DCAB40719F10453FF999A21E1DB789A59C7CA
                  APIs
                  • GetOpenFileNameW.COMDLG32(?), ref: 00442C8C
                    • Part of subcall function 00403AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00403A97,?,?,00402E7F,?,?,?,00000000), ref: 00403AC2
                    • Part of subcall function 00402DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00402DC4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Name$Path$FileFullLongOpen
                  • String ID: X$`eL
                  • API String ID: 779396738-3458601479
                  • Opcode ID: 53279ed98f1ddc25463a3aaae1be568034c592c7089aa2f432b11dc7424c8d05
                  • Instruction ID: d7505428e9ad4803d3038fd71ae32b29c9b5e60610abb9b6b42f20f38915c3d6
                  • Opcode Fuzzy Hash: 53279ed98f1ddc25463a3aaae1be568034c592c7089aa2f432b11dc7424c8d05
                  • Instruction Fuzzy Hash: 55218471A00258AADB41EF95D849BDE7BBC9F49304F00806FE405B7281DBFC59898BA9
                  APIs
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00420668
                    • Part of subcall function 004232A4: RaiseException.KERNEL32(?,?,?,0042068A,?,004D1444,?,?,?,?,?,?,0042068A,00401129,004C8738,00401129), ref: 00423304
                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00420685
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Exception@8Throw$ExceptionRaise
                  • String ID: Unknown exception
                  • API String ID: 3476068407-410509341
                  • Opcode ID: 1c93af01848794445a72bfb2431dcf9a77b0a1dc333af1f5d66624383cff65e0
                  • Instruction ID: d7484763414f49eec336292b0164322d8bc8fec0ec74b040b8fefe003bdda1d4
                  • Opcode Fuzzy Hash: 1c93af01848794445a72bfb2431dcf9a77b0a1dc333af1f5d66624383cff65e0
                  • Instruction Fuzzy Hash: 83F0F434B0021CB3CB00BA65F846D9E7BAC5E00304BA0413BB81481592EF3CDA6A858C
                  APIs
                  • CreateProcessW.KERNELBASE(?,00000000), ref: 019A1045
                  • ExitProcess.KERNEL32(00000000), ref: 019A1064
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$CreateExit
                  • String ID: D
                  • API String ID: 126409537-2746444292
                  • Opcode ID: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                  • Instruction ID: e85f226ebb7e275c72ee2321d5b7a02d6195481ba63246e7ce2e1f566bedb3c9
                  • Opcode Fuzzy Hash: 5eb2aae7a9647d9e2c45f82c1b7c95c0f5ecba5966e3f1c76f424d9cb9e516ac
                  • Instruction Fuzzy Hash: EAF0FF7164024CABDB60DFE0CC49FEE777CBF44705F408518FB5A9A180DA7896088BA1
                  APIs
                  • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0047302F
                  • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00473044
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Temp$FileNamePath
                  • String ID: aut
                  • API String ID: 3285503233-3010740371
                  • Opcode ID: 71512074328a75fff9972111cfe85e082d2d6940b602f848983f38705948e534
                  • Instruction ID: 628ba23adaad8083477a704895c24df82d8478d918337c65dd219e80a5e16e8b
                  • Opcode Fuzzy Hash: 71512074328a75fff9972111cfe85e082d2d6940b602f848983f38705948e534
                  • Instruction Fuzzy Hash: E4D05E7690032877DA60A7A4AC4EFCB3A6CDB05750F0002B2B655E2091DAB49984CAE4
                  APIs
                  • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 004882F5
                  • TerminateProcess.KERNEL32(00000000), ref: 004882FC
                  • FreeLibrary.KERNEL32(?,?,?,?), ref: 004884DD
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$CurrentFreeLibraryTerminate
                  • String ID:
                  • API String ID: 146820519-0
                  • Opcode ID: 85b54c53e955947c68f10e5fa2a7a78c8db1b0cebc025a7180aab6755cd33ec8
                  • Instruction ID: d74eaa79ace3128ddca1a3dd5002602c4d6c5ebaf91e28acdc7ce5a21f1cf919
                  • Opcode Fuzzy Hash: 85b54c53e955947c68f10e5fa2a7a78c8db1b0cebc025a7180aab6755cd33ec8
                  • Instruction Fuzzy Hash: F4126E719083019FC714EF28C484B5ABBE1BF85318F44895EE8899B392DB35ED45CF96
                  APIs
                    • Part of subcall function 00401BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00401BF4
                    • Part of subcall function 00401BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00401BFC
                    • Part of subcall function 00401BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00401C07
                    • Part of subcall function 00401BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00401C12
                    • Part of subcall function 00401BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00401C1A
                    • Part of subcall function 00401BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00401C22
                    • Part of subcall function 00401B4A: RegisterWindowMessageW.USER32(00000004,?,004012C4), ref: 00401BA2
                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0040136A
                  • OleInitialize.OLE32 ref: 00401388
                  • CloseHandle.KERNEL32(00000000,00000000), ref: 004424AB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                  • String ID:
                  • API String ID: 1986988660-0
                  • Opcode ID: 30ade1e4b09dc6811e8ad8d2e13ce549de5376989f3b114438c8304ec167dde2
                  • Instruction ID: 9218da4dd06aac80b2a3e4a20ff6e351540835b2827a8609de6440eb1ad28d82
                  • Opcode Fuzzy Hash: 30ade1e4b09dc6811e8ad8d2e13ce549de5376989f3b114438c8304ec167dde2
                  • Instruction Fuzzy Hash: 67718CB4A02240BFC784EFBAB9656553BE1AB88344754823FE80AD73B2E7384440CF4D
                  APIs
                  • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,004385CC,?,004C8CC8,0000000C), ref: 00438704
                  • GetLastError.KERNEL32(?,004385CC,?,004C8CC8,0000000C), ref: 0043870E
                  • __dosmaperr.LIBCMT ref: 00438739
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                  • String ID:
                  • API String ID: 490808831-0
                  • Opcode ID: 14c91f73b7e8728a63fd2ff290d3386d89c4791c173d7cbfc75140c6a9c44d3b
                  • Instruction ID: 54c826ec21bc7476881363d740667dd6ea227f9d6439bed2f6130f9786f14060
                  • Opcode Fuzzy Hash: 14c91f73b7e8728a63fd2ff290d3386d89c4791c173d7cbfc75140c6a9c44d3b
                  • Instruction Fuzzy Hash: 2A016B3260532016C6306334684677FA7694B9A778F38212FFC158B2D2DEAC8C81819C
                  APIs
                  • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00472CD4,?,?,?,00000004,00000001), ref: 00472FF2
                  • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00472CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00473006
                  • CloseHandle.KERNEL32(00000000,?,00472CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0047300D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: File$CloseCreateHandleTime
                  • String ID:
                  • API String ID: 3397143404-0
                  • Opcode ID: 61917bd8496eee63fc267641ece8c84c082ee2940d027a62818832f7e3283921
                  • Instruction ID: bc47269281fe9c30abdd4185b743fa9049693d95c354176ebc6a714f52f52b51
                  • Opcode Fuzzy Hash: 61917bd8496eee63fc267641ece8c84c082ee2940d027a62818832f7e3283921
                  • Instruction Fuzzy Hash: 0CE0863228021077D2301755BC4EFCB3A1CD786B71F104231FB19751D046A1190156AC
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 004117F6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Init_thread_footer
                  • String ID: CALL
                  • API String ID: 1385522511-4196123274
                  • Opcode ID: 1affb3dc47cf8fcd8dd484f0ab16d980d602390e5289a21bfec852461bce8a66
                  • Instruction ID: 3a11a2c25e4a2b88b0940f904a25a0b9512868a59723bf3808024743d2e72fba
                  • Opcode Fuzzy Hash: 1affb3dc47cf8fcd8dd484f0ab16d980d602390e5289a21bfec852461bce8a66
                  • Instruction Fuzzy Hash: 9F229E706083019FC714DF15C490B6ABBF1BF85318F54892EF9968B3A2D779E885CB4A
                  APIs
                  • _wcslen.LIBCMT ref: 00476F6B
                    • Part of subcall function 00404ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404EFD
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LibraryLoad_wcslen
                  • String ID: >>>AUTOIT SCRIPT<<<
                  • API String ID: 3312870042-2806939583
                  • Opcode ID: d757e98c1ca47d1b311f9c5041ed6f63cecb1158dfb6fe462279872edc3d264f
                  • Instruction ID: 2b3f6741ab254729609263314b0fb7ad29dfcbe08dda2b9ee62f383131657d55
                  • Opcode Fuzzy Hash: d757e98c1ca47d1b311f9c5041ed6f63cecb1158dfb6fe462279872edc3d264f
                  • Instruction Fuzzy Hash: 06B1C8711082018FC714EF21C4919AFB7E5AF94308F45896EF89A97292DB38ED45CB9A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: __fread_nolock
                  • String ID: EA06
                  • API String ID: 2638373210-3962188686
                  • Opcode ID: b53a24788e0fca4d6a07d8c80dc017e7470f9ee81b147f37593f5b8dbfcca682
                  • Instruction ID: 1af5cae62b57901f487c7aa7d84b06404c4e6a966851124e5b9032ab90b9ba8e
                  • Opcode Fuzzy Hash: b53a24788e0fca4d6a07d8c80dc017e7470f9ee81b147f37593f5b8dbfcca682
                  • Instruction Fuzzy Hash: BA01F5729042287EDF18C7A9C816FEEBBF89F05305F00855FE192D2181E4B8E6088B64
                  APIs
                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00403908
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: IconNotifyShell_
                  • String ID:
                  • API String ID: 1144537725-0
                  • Opcode ID: 2694399698a6a97cb1bb546aebbdb0236bb7d9e1e82d00f7ead3e3590af0668f
                  • Instruction ID: c15524de2a5edb241e5e4553c1a1057d1caf3c26ebd884dd8025bc14ccf80c9a
                  • Opcode Fuzzy Hash: 2694399698a6a97cb1bb546aebbdb0236bb7d9e1e82d00f7ead3e3590af0668f
                  • Instruction Fuzzy Hash: 1231C0B16047009FE320EF25D884797BBE8FB49709F00097FF99993290E775AA04CB5A
                  APIs
                    • Part of subcall function 019A08E0: GetFileAttributesW.KERNELBASE(?), ref: 019A08EB
                  • CreateDirectoryW.KERNELBASE(?,00000000), ref: 019A119F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AttributesCreateDirectoryFile
                  • String ID:
                  • API String ID: 3401506121-0
                  • Opcode ID: 5468e61e16de3a673499f63b67702db3409f66859a3166e7a959fa09b0ce8f4e
                  • Instruction ID: c945e30ecd3895075dde1ebff8a39db21831d7c20a7c0def33f73922a0a6d654
                  • Opcode Fuzzy Hash: 5468e61e16de3a673499f63b67702db3409f66859a3166e7a959fa09b0ce8f4e
                  • Instruction Fuzzy Hash: 15518731A1020997EF14EFA4C954BEF7779EF58300F4045A9AA0DE7180EB75AB48CBA5
                  APIs
                    • Part of subcall function 00404E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00404EDD,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404E9C
                    • Part of subcall function 00404E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00404EAE
                    • Part of subcall function 00404E90: FreeLibrary.KERNEL32(00000000,?,?,00404EDD,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404EC0
                  • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404EFD
                    • Part of subcall function 00404E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00443CDE,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404E62
                    • Part of subcall function 00404E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00404E74
                    • Part of subcall function 00404E59: FreeLibrary.KERNEL32(00000000,?,?,00443CDE,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404E87
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Library$Load$AddressFreeProc
                  • String ID:
                  • API String ID: 2632591731-0
                  • Opcode ID: df20ae1e2716574bc1ca16d43483c0bc72628f8644b50fcbafa24c3d7384d030
                  • Instruction ID: 9ddf9b0cf780d360c7e3f13162c1e43e97f16f0071030faff16c96ba16bc1859
                  • Opcode Fuzzy Hash: df20ae1e2716574bc1ca16d43483c0bc72628f8644b50fcbafa24c3d7384d030
                  • Instruction Fuzzy Hash: 1C112B72600205AADF10BF61DC42FAD77A49F80B15F10843FF642B61C1DEB89A059B58
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: __wsopen_s
                  • String ID:
                  • API String ID: 3347428461-0
                  • Opcode ID: ba8e134145e456105cead83cb153e0ce4948047da74c30acfbb64a8666414d61
                  • Instruction ID: c3d8c7451d02fb9a076c18d9f90c3490fe791393346c0fda1f754169ca2211fe
                  • Opcode Fuzzy Hash: ba8e134145e456105cead83cb153e0ce4948047da74c30acfbb64a8666414d61
                  • Instruction Fuzzy Hash: 1B111C7590420AAFCF15DF58E94199BBBF5EF48314F14405AF808AB311E731DA11CB69
                  APIs
                    • Part of subcall function 00434C7D: RtlAllocateHeap.NTDLL(00000008,00401129,00000000,?,00432E29,00000001,00000364,?,?,?,0042F2DE,00433863,004D1444,?,0041FDF5,?), ref: 00434CBE
                  • _free.LIBCMT ref: 0043506C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AllocateHeap_free
                  • String ID:
                  • API String ID: 614378929-0
                  • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                  • Instruction ID: 40aca46b703f2a43d6ecd2bbb0191be73fcfb51e44ff699261211fb973284b72
                  • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                  • Instruction Fuzzy Hash: C10149B22047046BE3358F65D881A9AFBECFB8D370F25051EE184932C0EA75A805C7B8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                  • Instruction ID: 1b4d6980a134d3e695ccbb1325e41b93a735e5c084c39a27a01622c5a8040a66
                  • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                  • Instruction Fuzzy Hash: 69F0F932711A30D6C6313A67AD05B5737989F62379F90071FF420922D2DB7C940285AD
                  APIs
                  • RtlAllocateHeap.NTDLL(00000008,00401129,00000000,?,00432E29,00000001,00000364,?,?,?,0042F2DE,00433863,004D1444,?,0041FDF5,?), ref: 00434CBE
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 5dabace6e67e0c06eac08d1222056b7d28e40e59750a7cb9768306d93d03743a
                  • Instruction ID: d0801a08dd9eb2a549b4597277b611120f47e6b3ca7546de7ffd0a5e0a640668
                  • Opcode Fuzzy Hash: 5dabace6e67e0c06eac08d1222056b7d28e40e59750a7cb9768306d93d03743a
                  • Instruction Fuzzy Hash: 0AF0B43160223466DB215F62AD05BDB3788EFC57A0F177127BC15A72D1CA78FC0246AC
                  APIs
                  • RtlAllocateHeap.NTDLL(00000000,?,004D1444,?,0041FDF5,?,?,0040A976,00000010,004D1440,004013FC,?,004013C6,?,00401129), ref: 00433852
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 9ba315fed18f09302ef8e98e24a00faf4cf5fb8d5a829067cfb3019aa5550736
                  • Instruction ID: ea24614a18cfc8e0f5f1028d92bedc2ebf2131cea25f977605ef6495a1446606
                  • Opcode Fuzzy Hash: 9ba315fed18f09302ef8e98e24a00faf4cf5fb8d5a829067cfb3019aa5550736
                  • Instruction Fuzzy Hash: 72E0E531201234A6F6253E67AC01B9B37C8AF867B2F551037BC04926E0CB19DD0285ED
                  APIs
                  • FreeLibrary.KERNEL32(?,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404F6D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FreeLibrary
                  • String ID:
                  • API String ID: 3664257935-0
                  • Opcode ID: 023d803ffabb37db933a504339b132b1f4dabf63742a847e248392511a3809e1
                  • Instruction ID: 7da1d96633d8ef5f9dbaddc38a03c9d61b46ecb57ef492bc0d42c6129748a140
                  • Opcode Fuzzy Hash: 023d803ffabb37db933a504339b132b1f4dabf63742a847e248392511a3809e1
                  • Instruction Fuzzy Hash: B4F030B1105752CFDB349F65E490822B7E4EF54319310897FE3DA92651C7359844DF18
                  APIs
                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00402DC4
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LongNamePath_wcslen
                  • String ID:
                  • API String ID: 541455249-0
                  • Opcode ID: 874b14e6ba778e3cb0b3d62cc4bbe357d5b9dace6e30cfc053132212e855ca66
                  • Instruction ID: 03946bef7ad949c63c0565e81ec2c357cfa131606da016b7fbbec6739e0ec598
                  • Opcode Fuzzy Hash: 874b14e6ba778e3cb0b3d62cc4bbe357d5b9dace6e30cfc053132212e855ca66
                  • Instruction Fuzzy Hash: 6BE0CD72A001245BC710E7599C05FDA77EDDFC8794F0500B6FD09E7258D974AD848554
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: __fread_nolock
                  • String ID:
                  • API String ID: 2638373210-0
                  • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                  • Instruction ID: 54364b63386348eb026ccc7db4f5a764ab35cd8640585fbcd629c959ea5ef37d
                  • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                  • Instruction Fuzzy Hash: 09E01AB0609B005BDF396A28A9517F777E89F49300F00486FF69E82352E5A268458A4D
                  APIs
                    • Part of subcall function 00403837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00403908
                    • Part of subcall function 0040D730: GetInputState.USER32 ref: 0040D807
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00402B6B
                    • Part of subcall function 004030F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0040314E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: IconNotifyShell_$CurrentDirectoryInputState
                  • String ID:
                  • API String ID: 3667716007-0
                  • Opcode ID: 51b375163e44bbd97b33e92b415b87afdda3ca2b2e9e7a97be434286f3dee8a5
                  • Instruction ID: f0a8ae49cca8efb5320a79a97159484f4c2eb2d8bf7c45a8a970065e2a960d7c
                  • Opcode Fuzzy Hash: 51b375163e44bbd97b33e92b415b87afdda3ca2b2e9e7a97be434286f3dee8a5
                  • Instruction Fuzzy Hash: 17E0262230020417CA04BF72985257EBB5D8BD135AF00553FF542632E3CF3C4949421D
                  APIs
                  • GetFileAttributesW.KERNELBASE(?), ref: 019A08EB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                  • Instruction ID: 62df527c0b34ce5a6f597a12fd2e410c9877ad7f42c3ee9cad7686cd404006e5
                  • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                  • Instruction Fuzzy Hash: 9AE08C71A0520CEBEB20CFBC8808AA977A8DB84321F444A54F91EC3280D5318A689694
                  APIs
                  • GetFileAttributesW.KERNELBASE(?), ref: 019A08BB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                  • Instruction ID: 586d62514981ebce8c41a91242ed021ed58bffebf0eccde5d7b23d354199d924
                  • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                  • Instruction Fuzzy Hash: 8AD0A73090620CEBCB10CFBD9C04ADA73ACDB04321F004754FD19D3281D636994497D5
                  APIs
                  • CreateFileW.KERNELBASE(00000000,00000000,?,00440704,?,?,00000000,?,00440704,00000000,0000000C), ref: 004403B7
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateFile
                  • String ID:
                  • API String ID: 823142352-0
                  • Opcode ID: 019f9e133589fd3687463b32f0c6bc3c70e2a4d6a7a21c8abd77c6802d23c41a
                  • Instruction ID: 521aca0ec161b35fc7263a5d46959885f70ee066a467c01bc4f842704823e81c
                  • Opcode Fuzzy Hash: 019f9e133589fd3687463b32f0c6bc3c70e2a4d6a7a21c8abd77c6802d23c41a
                  • Instruction Fuzzy Hash: B2D06C3204010DBBDF028F84DD46EDA3BAAFB48714F014010BE1856020C732E821AB98
                  APIs
                  • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00401CBC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: InfoParametersSystem
                  • String ID:
                  • API String ID: 3098949447-0
                  • Opcode ID: ce1972e61f6ead1ed964811a17e374f6d7253294e9e64f6952c27d48b9b68509
                  • Instruction ID: add4b1965ee0a1157e16c8a0766cb0da33b99116fe27ee521f6a6fd1a6c8daee
                  • Opcode Fuzzy Hash: ce1972e61f6ead1ed964811a17e374f6d7253294e9e64f6952c27d48b9b68509
                  • Instruction Fuzzy Hash: E2C092362C1314BFF2148B84BD9EF107764A368B10F448023FA0AA95F3C3E22820EA58
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                  • Instruction ID: cb8fc1405275b7fd35930d776ca774b87ad7e16ce49f3ae074b720514b59c1ea
                  • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                  • Instruction Fuzzy Hash: F8311874A00109DBD718CF59E4809AAF7A1FF49300B2482A6E80ACF751E735EDC6DBC9
                  APIs
                  • Sleep.KERNELBASE(000001F4), ref: 019A22B1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Sleep
                  • String ID:
                  • API String ID: 3472027048-0
                  • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                  • Instruction ID: fe480fbb3610e8489b8bf31d2aa979af77f65614d019b6dd56a9337c398ea06d
                  • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                  • Instruction Fuzzy Hash: F2E0BF7494010EEFDB00EFA4D5496DE7BB4EF04311F1005A1FD05D7681DB309E548A62
                  APIs
                  • Sleep.KERNELBASE(000001F4), ref: 019A22B1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Sleep
                  • String ID:
                  • API String ID: 3472027048-0
                  • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                  • Instruction ID: 9ee00714f6c7c54737d6b56bddb81d6a98394e7c9fc6aa51d80201d5f6e1ac1c
                  • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                  • Instruction Fuzzy Hash: ECE0E67494010EDFDB00EFB4D54969E7FB4EF04301F100161FD05D2281D6309D508A72
                  APIs
                    • Part of subcall function 00419BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00419BB2
                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0049961A
                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0049965B
                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0049969F
                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004996C9
                  • SendMessageW.USER32 ref: 004996F2
                  • GetKeyState.USER32(00000011), ref: 0049978B
                  • GetKeyState.USER32(00000009), ref: 00499798
                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004997AE
                  • GetKeyState.USER32(00000010), ref: 004997B8
                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004997E9
                  • SendMessageW.USER32 ref: 00499810
                  • SendMessageW.USER32(?,00001030,?,00497E95), ref: 00499918
                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0049992E
                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00499941
                  • SetCapture.USER32(?), ref: 0049994A
                  • ClientToScreen.USER32(?,?), ref: 004999AF
                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 004999BC
                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004999D6
                  • ReleaseCapture.USER32 ref: 004999E1
                  • GetCursorPos.USER32(?), ref: 00499A19
                  • ScreenToClient.USER32(?,?), ref: 00499A26
                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00499A80
                  • SendMessageW.USER32 ref: 00499AAE
                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00499AEB
                  • SendMessageW.USER32 ref: 00499B1A
                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00499B3B
                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00499B4A
                  • GetCursorPos.USER32(?), ref: 00499B68
                  • ScreenToClient.USER32(?,?), ref: 00499B75
                  • GetParent.USER32(?), ref: 00499B93
                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00499BFA
                  • SendMessageW.USER32 ref: 00499C2B
                  • ClientToScreen.USER32(?,?), ref: 00499C84
                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00499CB4
                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00499CDE
                  • SendMessageW.USER32 ref: 00499D01
                  • ClientToScreen.USER32(?,?), ref: 00499D4E
                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00499D82
                    • Part of subcall function 00419944: GetWindowLongW.USER32(?,000000EB), ref: 00419952
                  • GetWindowLongW.USER32(?,000000F0), ref: 00499E05
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                  • String ID: @GUI_DRAGID$F$p#M
                  • API String ID: 3429851547-3815028896
                  • Opcode ID: 9acda88ef481f64dff2691987adc0f51729c3fbb8ee1b3f1175fb876a3806e9f
                  • Instruction ID: 451fa1f71198719e719a83d051876cca88b8aaffde1248d9f209bff65fa2bb0d
                  • Opcode Fuzzy Hash: 9acda88ef481f64dff2691987adc0f51729c3fbb8ee1b3f1175fb876a3806e9f
                  • Instruction Fuzzy Hash: C8427A71204201AFDB24CF68CC94EAABFE5EF49314F14067EFA59872A1D735AC50CB5A
                  APIs
                  • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 004948F3
                  • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00494908
                  • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00494927
                  • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0049494B
                  • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0049495C
                  • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0049497B
                  • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 004949AE
                  • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 004949D4
                  • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00494A0F
                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00494A56
                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00494A7E
                  • IsMenu.USER32(?), ref: 00494A97
                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00494AF2
                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00494B20
                  • GetWindowLongW.USER32(?,000000F0), ref: 00494B94
                  • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00494BE3
                  • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00494C82
                  • wsprintfW.USER32 ref: 00494CAE
                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00494CC9
                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00494CF1
                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00494D13
                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00494D33
                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00494D5A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                  • String ID: %d/%02d/%02d
                  • API String ID: 4054740463-328681919
                  • Opcode ID: e993ef3c1ba993e3f0e3703c3bc1d51b196be1ef856bc2e73f65451efa31c41d
                  • Instruction ID: 5eac038fe5f433155554c2c10b5bf9f2c42c8b1a3c0168f8d10ef8b7821d07a4
                  • Opcode Fuzzy Hash: e993ef3c1ba993e3f0e3703c3bc1d51b196be1ef856bc2e73f65451efa31c41d
                  • Instruction Fuzzy Hash: 8D12DE71600215ABEF248F25CC49FAF7FE8AF85314F10413AF915EA2E1DB789942CB58
                  APIs
                  • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0041F998
                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0045F474
                  • IsIconic.USER32(00000000), ref: 0045F47D
                  • ShowWindow.USER32(00000000,00000009), ref: 0045F48A
                  • SetForegroundWindow.USER32(00000000), ref: 0045F494
                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0045F4AA
                  • GetCurrentThreadId.KERNEL32 ref: 0045F4B1
                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0045F4BD
                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0045F4CE
                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 0045F4D6
                  • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0045F4DE
                  • SetForegroundWindow.USER32(00000000), ref: 0045F4E1
                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0045F4F6
                  • keybd_event.USER32(00000012,00000000), ref: 0045F501
                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0045F50B
                  • keybd_event.USER32(00000012,00000000), ref: 0045F510
                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0045F519
                  • keybd_event.USER32(00000012,00000000), ref: 0045F51E
                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 0045F528
                  • keybd_event.USER32(00000012,00000000), ref: 0045F52D
                  • SetForegroundWindow.USER32(00000000), ref: 0045F530
                  • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0045F557
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                  • String ID: Shell_TrayWnd
                  • API String ID: 4125248594-2988720461
                  • Opcode ID: 89acd574fb6a0b7656c56520897254534c713e2cba09e691e399ff85dd037462
                  • Instruction ID: 89da0c36e13a6727c88d70c3afad404323dbee3c10041995e1ca3f9583298dba
                  • Opcode Fuzzy Hash: 89acd574fb6a0b7656c56520897254534c713e2cba09e691e399ff85dd037462
                  • Instruction Fuzzy Hash: 2F319671A40318BBEB206BB55C8AFBF7E6CEB44B50F110077FA04E61D2D6B45D00AA69
                  APIs
                    • Part of subcall function 004616C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0046170D
                    • Part of subcall function 004616C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0046173A
                    • Part of subcall function 004616C3: GetLastError.KERNEL32 ref: 0046174A
                  • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00461286
                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 004612A8
                  • CloseHandle.KERNEL32(?), ref: 004612B9
                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004612D1
                  • GetProcessWindowStation.USER32 ref: 004612EA
                  • SetProcessWindowStation.USER32(00000000), ref: 004612F4
                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00461310
                    • Part of subcall function 004610BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004611FC), ref: 004610D4
                    • Part of subcall function 004610BF: CloseHandle.KERNEL32(?,?,004611FC), ref: 004610E9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                  • String ID: $default$winsta0$ZL
                  • API String ID: 22674027-2359302695
                  • Opcode ID: 2abaf8f1418ce2004baa20a81eac4c80cc2ecef88659ecde7724807467f62c60
                  • Instruction ID: a28069ea172d0e0229c1adbb0c91e81f8246f874796570f01ecfab716675dc87
                  • Opcode Fuzzy Hash: 2abaf8f1418ce2004baa20a81eac4c80cc2ecef88659ecde7724807467f62c60
                  • Instruction Fuzzy Hash: CE818F71900309AFDF109FA5DC49FEF7BB9EF04704F18412AF911A6260EB799944CB2A
                  APIs
                    • Part of subcall function 004610F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00461114
                    • Part of subcall function 004610F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 00461120
                    • Part of subcall function 004610F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 0046112F
                    • Part of subcall function 004610F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 00461136
                    • Part of subcall function 004610F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0046114D
                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00460BCC
                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00460C00
                  • GetLengthSid.ADVAPI32(?), ref: 00460C17
                  • GetAce.ADVAPI32(?,00000000,?), ref: 00460C51
                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00460C6D
                  • GetLengthSid.ADVAPI32(?), ref: 00460C84
                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00460C8C
                  • HeapAlloc.KERNEL32(00000000), ref: 00460C93
                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00460CB4
                  • CopySid.ADVAPI32(00000000), ref: 00460CBB
                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00460CEA
                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00460D0C
                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00460D1E
                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00460D45
                  • HeapFree.KERNEL32(00000000), ref: 00460D4C
                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00460D55
                  • HeapFree.KERNEL32(00000000), ref: 00460D5C
                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00460D65
                  • HeapFree.KERNEL32(00000000), ref: 00460D6C
                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00460D78
                  • HeapFree.KERNEL32(00000000), ref: 00460D7F
                    • Part of subcall function 00461193: GetProcessHeap.KERNEL32(00000008,00460BB1,?,00000000,?,00460BB1,?), ref: 004611A1
                    • Part of subcall function 00461193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00460BB1,?), ref: 004611A8
                    • Part of subcall function 00461193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00460BB1,?), ref: 004611B7
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                  • String ID:
                  • API String ID: 4175595110-0
                  • Opcode ID: 6f1d1eab96d0e58d5600fe02c65cedcc1878308623e8f5026091cf664e7cad02
                  • Instruction ID: fba8d662ddaae9df11d243ea9366e1dcc73a0a01e4a7c9837e69444c1501a4fc
                  • Opcode Fuzzy Hash: 6f1d1eab96d0e58d5600fe02c65cedcc1878308623e8f5026091cf664e7cad02
                  • Instruction Fuzzy Hash: 3D716E7190020AAFDF10DFE4DC85BAFBBB8BF15300F044626E915A7291E779A905CB69
                  APIs
                  • OpenClipboard.USER32(0049CC08), ref: 0047EB29
                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 0047EB37
                  • GetClipboardData.USER32(0000000D), ref: 0047EB43
                  • CloseClipboard.USER32 ref: 0047EB4F
                  • GlobalLock.KERNEL32(00000000), ref: 0047EB87
                  • CloseClipboard.USER32 ref: 0047EB91
                  • GlobalUnlock.KERNEL32(00000000,00000000), ref: 0047EBBC
                  • IsClipboardFormatAvailable.USER32(00000001), ref: 0047EBC9
                  • GetClipboardData.USER32(00000001), ref: 0047EBD1
                  • GlobalLock.KERNEL32(00000000), ref: 0047EBE2
                  • GlobalUnlock.KERNEL32(00000000,?), ref: 0047EC22
                  • IsClipboardFormatAvailable.USER32(0000000F), ref: 0047EC38
                  • GetClipboardData.USER32(0000000F), ref: 0047EC44
                  • GlobalLock.KERNEL32(00000000), ref: 0047EC55
                  • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0047EC77
                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0047EC94
                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0047ECD2
                  • GlobalUnlock.KERNEL32(00000000,?,?), ref: 0047ECF3
                  • CountClipboardFormats.USER32 ref: 0047ED14
                  • CloseClipboard.USER32 ref: 0047ED59
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                  • String ID:
                  • API String ID: 420908878-0
                  • Opcode ID: 8fe17c3bab9062a7bed266275bca05752757c30c2a912ef8c1c6ccc1190608e1
                  • Instruction ID: 447a503540a737e03ec4d46a85d158c84dc9abba7b119e26716bd7b04c4049c1
                  • Opcode Fuzzy Hash: 8fe17c3bab9062a7bed266275bca05752757c30c2a912ef8c1c6ccc1190608e1
                  • Instruction Fuzzy Hash: 6661F9352043019FD310EF25C888F6A7BA4AF58704F0486BFF45A972A1DB35ED05CB6A
                  APIs
                  • FindFirstFileW.KERNEL32(?,?), ref: 004769BE
                  • FindClose.KERNEL32(00000000), ref: 00476A12
                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00476A4E
                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00476A75
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00476AB2
                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00476ADF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                  • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                  • API String ID: 3830820486-3289030164
                  • Opcode ID: 9d3135ad1febd28d754d82b35882d5ff40bf617c4c6234b86c455014bec0be7b
                  • Instruction ID: 0bd16310d27d533a2d081857489bd4d1db209a6d1e6702d10dfe972364f7fd66
                  • Opcode Fuzzy Hash: 9d3135ad1febd28d754d82b35882d5ff40bf617c4c6234b86c455014bec0be7b
                  • Instruction Fuzzy Hash: BCD17871508340AFC710EBA5C881EAFB7ECAF98704F44492EF589D7191EB78EA44C766
                  APIs
                  • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 00479663
                  • GetFileAttributesW.KERNEL32(?), ref: 004796A1
                  • SetFileAttributesW.KERNEL32(?,?), ref: 004796BB
                  • FindNextFileW.KERNEL32(00000000,?), ref: 004796D3
                  • FindClose.KERNEL32(00000000), ref: 004796DE
                  • FindFirstFileW.KERNEL32(*.*,?), ref: 004796FA
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 0047974A
                  • SetCurrentDirectoryW.KERNEL32(004C6B7C), ref: 00479768
                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00479772
                  • FindClose.KERNEL32(00000000), ref: 0047977F
                  • FindClose.KERNEL32(00000000), ref: 0047978F
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                  • String ID: *.*
                  • API String ID: 1409584000-438819550
                  • Opcode ID: b2bc96c289f416ca38797849f78142382af58d5d1abd49691628c6991f17aa8e
                  • Instruction ID: d4aaf40869890fa9a321a3e40125cc3d44fdb7a38802f5ebe86ad51efc8d8379
                  • Opcode Fuzzy Hash: b2bc96c289f416ca38797849f78142382af58d5d1abd49691628c6991f17aa8e
                  • Instruction Fuzzy Hash: 8C31A432541219AADB14EFB5DC49EDF77AC9F09320F1081A7E819E2190EB38DD448A6C
                  APIs
                  • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 004797BE
                  • FindNextFileW.KERNEL32(00000000,?), ref: 00479819
                  • FindClose.KERNEL32(00000000), ref: 00479824
                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00479840
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00479890
                  • SetCurrentDirectoryW.KERNEL32(004C6B7C), ref: 004798AE
                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 004798B8
                  • FindClose.KERNEL32(00000000), ref: 004798C5
                  • FindClose.KERNEL32(00000000), ref: 004798D5
                    • Part of subcall function 0046DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0046DB00
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                  • String ID: *.*
                  • API String ID: 2640511053-438819550
                  • Opcode ID: 08009f9506173d6a8c255edc86dcc0ecfda648b1141ac077244459e378de50eb
                  • Instruction ID: 495e4a146dab6e58c30566e9c8dfa1d6dcbdd1e1662f98abe0714f5f10764809
                  • Opcode Fuzzy Hash: 08009f9506173d6a8c255edc86dcc0ecfda648b1141ac077244459e378de50eb
                  • Instruction Fuzzy Hash: 0831C5315406196ADF10EFB5EC48EDF77AC9F06324F1581ABE818A22D0DB38DD498A2D
                  APIs
                  • GetLocalTime.KERNEL32(?), ref: 00478257
                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00478267
                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00478273
                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00478310
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00478324
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00478356
                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0047838C
                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00478395
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CurrentDirectoryTime$File$Local$System
                  • String ID: *.*
                  • API String ID: 1464919966-438819550
                  • Opcode ID: 0a5646b9a09b1b589cea59cdf34af19873cf5b148a597532c8212f33060f7762
                  • Instruction ID: ec0bd870f80bf12659f63383d377d20427defd451f36f299c09526282445d03b
                  • Opcode Fuzzy Hash: 0a5646b9a09b1b589cea59cdf34af19873cf5b148a597532c8212f33060f7762
                  • Instruction Fuzzy Hash: 06619C725043059FC710EF65C88499FB3E8FF89318F04896EF98993251EB39E945CB9A
                  APIs
                    • Part of subcall function 00403AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00403A97,?,?,00402E7F,?,?,?,00000000), ref: 00403AC2
                    • Part of subcall function 0046E199: GetFileAttributesW.KERNEL32(?,0046CF95), ref: 0046E19A
                  • FindFirstFileW.KERNEL32(?,?), ref: 0046D122
                  • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0046D1DD
                  • MoveFileW.KERNEL32(?,?), ref: 0046D1F0
                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0046D20D
                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046D237
                    • Part of subcall function 0046D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0046D21C,?,?), ref: 0046D2B2
                  • FindClose.KERNEL32(00000000,?,?,?), ref: 0046D253
                  • FindClose.KERNEL32(00000000), ref: 0046D264
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                  • String ID: \*.*
                  • API String ID: 1946585618-1173974218
                  • Opcode ID: 9b3e5d3e5ebe9d0059891b799ff9c4ea5bb52d40759b5a867d195dae7264e656
                  • Instruction ID: da9c7cc7adf92f154ef8a75c6e12d1e766ca85ccd6e7875007feca1946bbe232
                  • Opcode Fuzzy Hash: 9b3e5d3e5ebe9d0059891b799ff9c4ea5bb52d40759b5a867d195dae7264e656
                  • Instruction Fuzzy Hash: 1B616F71D0110D9BCF05EBE1C9929EEB7B5AF55304F2481AAE40177292EB385F09CB6A
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                  • String ID:
                  • API String ID: 1737998785-0
                  • Opcode ID: 8368addd3b95697cd8db1ee6ebe80e4f7274778474e2aaa1c6c53d436946e5f3
                  • Instruction ID: 31251baaf32f351de7778df961977fd25441d5b15c2f72f92dc87ea2c7501845
                  • Opcode Fuzzy Hash: 8368addd3b95697cd8db1ee6ebe80e4f7274778474e2aaa1c6c53d436946e5f3
                  • Instruction Fuzzy Hash: 0541A335604511EFD320CF16D888B5A7BE5EF48318F14C5AAE4198B7A2C739EC41CB99
                  APIs
                    • Part of subcall function 004616C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0046170D
                    • Part of subcall function 004616C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0046173A
                    • Part of subcall function 004616C3: GetLastError.KERNEL32 ref: 0046174A
                  • ExitWindowsEx.USER32(?,00000000), ref: 0046E932
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                  • String ID: $ $@$SeShutdownPrivilege
                  • API String ID: 2234035333-3163812486
                  • Opcode ID: b96c2a0a8a4f47adf6c99b3b0435ccfefb1d85958ad9cc69c56c726e97da3043
                  • Instruction ID: eb52d6be280e91a3479a4c9c93090d33203d32185dd35972c73cc41e4985f576
                  • Opcode Fuzzy Hash: b96c2a0a8a4f47adf6c99b3b0435ccfefb1d85958ad9cc69c56c726e97da3043
                  • Instruction Fuzzy Hash: 7C012BB6710210ABFB5426B69C85FBB73AC9F14754F150437F802E21D1F5695C4481AE
                  APIs
                  • socket.WSOCK32(00000002,00000001,00000006), ref: 00481276
                  • WSAGetLastError.WSOCK32 ref: 00481283
                  • bind.WSOCK32(00000000,?,00000010), ref: 004812BA
                  • WSAGetLastError.WSOCK32 ref: 004812C5
                  • closesocket.WSOCK32(00000000), ref: 004812F4
                  • listen.WSOCK32(00000000,00000005), ref: 00481303
                  • WSAGetLastError.WSOCK32 ref: 0048130D
                  • closesocket.WSOCK32(00000000), ref: 0048133C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLast$closesocket$bindlistensocket
                  • String ID:
                  • API String ID: 540024437-0
                  • Opcode ID: dd98f8202aba79796c57e48e731577952ce9a50eaedf74f618eb9b9ddbb7e935
                  • Instruction ID: ce28ad5cbf6225e9ea6dc1edb30dc527f953928a226dc1dda54e321c2215de1d
                  • Opcode Fuzzy Hash: dd98f8202aba79796c57e48e731577952ce9a50eaedf74f618eb9b9ddbb7e935
                  • Instruction Fuzzy Hash: 244193316001009FD710EF64C4C4B6ABBE5AF46318F1885AAD8569F3E6C775ED82CBE5
                  APIs
                  • _free.LIBCMT ref: 0043B9D4
                  • _free.LIBCMT ref: 0043B9F8
                  • _free.LIBCMT ref: 0043BB7F
                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,004A3700), ref: 0043BB91
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004D121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0043BC09
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004D1270,000000FF,?,0000003F,00000000,?), ref: 0043BC36
                  • _free.LIBCMT ref: 0043BD4B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                  • String ID:
                  • API String ID: 314583886-0
                  • Opcode ID: 8e1ab56355fcd08fc52a6704cd795d14ff78001090b23ef68c0ae7f2c546dafc
                  • Instruction ID: 71ae4cf4c1b7f42d99881a5d695aef9df234634b51de67786957360bd0beca24
                  • Opcode Fuzzy Hash: 8e1ab56355fcd08fc52a6704cd795d14ff78001090b23ef68c0ae7f2c546dafc
                  • Instruction Fuzzy Hash: 8EC13C71A04204AFDB20DF659C41BAA7BB8EF49310F1461AFEA94D7351DB389E41C7D8
                  APIs
                    • Part of subcall function 00403AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00403A97,?,?,00402E7F,?,?,?,00000000), ref: 00403AC2
                    • Part of subcall function 0046E199: GetFileAttributesW.KERNEL32(?,0046CF95), ref: 0046E19A
                  • FindFirstFileW.KERNEL32(?,?), ref: 0046D420
                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 0046D470
                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046D481
                  • FindClose.KERNEL32(00000000), ref: 0046D498
                  • FindClose.KERNEL32(00000000), ref: 0046D4A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                  • String ID: \*.*
                  • API String ID: 2649000838-1173974218
                  • Opcode ID: 2df3a2f652ca3e994cc6e46c095a2a74bd65cf7c7df61fef8d8ee1dcfc12855c
                  • Instruction ID: 53818abd8a2c914abd403a079adf620a96c10967e39a6483e3d81c850f0d193b
                  • Opcode Fuzzy Hash: 2df3a2f652ca3e994cc6e46c095a2a74bd65cf7c7df61fef8d8ee1dcfc12855c
                  • Instruction Fuzzy Hash: AD3170719183459BC304EF65C8919AF77A8AE91304F444E2FF4D1622D1EB38AE09CB6B
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: __floor_pentium4
                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                  • API String ID: 4168288129-2761157908
                  • Opcode ID: d36d642652a26de60f8180d17ea76e7c76dd79590718a29a24308ceaa12e0c42
                  • Instruction ID: 11a7b4ff1fb68f5cb3f2ac3fe9731016f2f84ad1b05d2b742d6db5be86653bd3
                  • Opcode Fuzzy Hash: d36d642652a26de60f8180d17ea76e7c76dd79590718a29a24308ceaa12e0c42
                  • Instruction Fuzzy Hash: 94C26C71E056288FDB29CE29DD407EAB7B5EB48304F1451EBD80DE7281E778AE858F44
                  APIs
                  • _wcslen.LIBCMT ref: 004764DC
                  • CoInitialize.OLE32(00000000), ref: 00476639
                  • CoCreateInstance.OLE32(0049FCF8,00000000,00000001,0049FB68,?), ref: 00476650
                  • CoUninitialize.OLE32 ref: 004768D4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                  • String ID: .lnk
                  • API String ID: 886957087-24824748
                  • Opcode ID: 9545a9c088e76c4e6b92dd9cb2970a3788846d1390ffe20bda88ac8e3d4e5368
                  • Instruction ID: d0bb72b36f0c3be6f4d9adaa6407929a3aa0b63b58f28ffd8b4fd6195cfdec25
                  • Opcode Fuzzy Hash: 9545a9c088e76c4e6b92dd9cb2970a3788846d1390ffe20bda88ac8e3d4e5368
                  • Instruction Fuzzy Hash: A7D15C71508601AFC304EF25C881EABB7E9FF94308F11896EF5599B291DB34ED09CB96
                  APIs
                  • GetForegroundWindow.USER32(?,?,00000000), ref: 004822E8
                    • Part of subcall function 0047E4EC: GetWindowRect.USER32(?,?), ref: 0047E504
                  • GetDesktopWindow.USER32 ref: 00482312
                  • GetWindowRect.USER32(00000000), ref: 00482319
                  • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00482355
                  • GetCursorPos.USER32(?), ref: 00482381
                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 004823DF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Rectmouse_event$CursorDesktopForeground
                  • String ID:
                  • API String ID: 2387181109-0
                  • Opcode ID: b0a4e48dd66b5824444019d0540c92ce7d017f65b45e459c58e2f5098004674c
                  • Instruction ID: 05b831872450339c644785dfbb21d9b45ae3de71cb0cae446400f5b7fa18373c
                  • Opcode Fuzzy Hash: b0a4e48dd66b5824444019d0540c92ce7d017f65b45e459c58e2f5098004674c
                  • Instruction Fuzzy Hash: 2331CF72505315AFC720EF65C845A5BB7E9FF84314F00092EF98597281DB78EA08CB9A
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00479B78
                  • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00479C8B
                    • Part of subcall function 00473874: GetInputState.USER32 ref: 004738CB
                    • Part of subcall function 00473874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00473966
                  • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00479BA8
                  • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00479C75
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                  • String ID: *.*
                  • API String ID: 1972594611-438819550
                  • Opcode ID: 7acb0a154b22eca82d4832484c7c78dbe3164d6a534a943445dbf0d130a904f0
                  • Instruction ID: e32824acfdb09f5b3aa58c1a709ce8cdac26dbe08683530e39126bd671aea28d
                  • Opcode Fuzzy Hash: 7acb0a154b22eca82d4832484c7c78dbe3164d6a534a943445dbf0d130a904f0
                  • Instruction Fuzzy Hash: 234186719042099FDF15DF65C989AEEBBB8FF05314F24806BE809A2291E7349E44CF69
                  APIs
                    • Part of subcall function 00419BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00419BB2
                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00419A4E
                  • GetSysColor.USER32(0000000F), ref: 00419B23
                  • SetBkColor.GDI32(?,00000000), ref: 00419B36
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Color$LongProcWindow
                  • String ID:
                  • API String ID: 3131106179-0
                  • Opcode ID: 008d7f4966374fd70fc10806bddab33b900210bcee92a512a1071b2935ce9feb
                  • Instruction ID: e8bc8b2f7a0bb2fb347258d8ffc67998038f63e5322d7f54452ed9c4e97b1286
                  • Opcode Fuzzy Hash: 008d7f4966374fd70fc10806bddab33b900210bcee92a512a1071b2935ce9feb
                  • Instruction Fuzzy Hash: E0A12F70208444BEE7249A2DAC78DFB3A9DDF46355B14412FF802C6792C62D9D8AC27F
                  APIs
                    • Part of subcall function 0048304E: inet_addr.WSOCK32(?), ref: 0048307A
                    • Part of subcall function 0048304E: _wcslen.LIBCMT ref: 0048309B
                  • socket.WSOCK32(00000002,00000002,00000011), ref: 0048185D
                  • WSAGetLastError.WSOCK32 ref: 00481884
                  • bind.WSOCK32(00000000,?,00000010), ref: 004818DB
                  • WSAGetLastError.WSOCK32 ref: 004818E6
                  • closesocket.WSOCK32(00000000), ref: 00481915
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                  • String ID:
                  • API String ID: 1601658205-0
                  • Opcode ID: fddb4916d305d9aa77e7ea3c76e7392278f2e167924f1c2a3f3dab574a5640fd
                  • Instruction ID: 6c1146d80a6d47799e3eb1c02aaa38066deff44b86852a1e056cb773c88fe3f6
                  • Opcode Fuzzy Hash: fddb4916d305d9aa77e7ea3c76e7392278f2e167924f1c2a3f3dab574a5640fd
                  • Instruction Fuzzy Hash: 37519571A00200AFD710BF25C8C6F6A77E59B44718F0484AEF9066F3D3C779AD828BA5
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                  • String ID:
                  • API String ID: 292994002-0
                  • Opcode ID: 5347e4da358eca34548c4d68295ac4be29339ef082366b830d4751c2b14d8c7b
                  • Instruction ID: 46f85afb1d901da7ddbaad2f414343a11cdface8d7546eab0ffee271a72cceae
                  • Opcode Fuzzy Hash: 5347e4da358eca34548c4d68295ac4be29339ef082366b830d4751c2b14d8c7b
                  • Instruction Fuzzy Hash: F521A6317402129FDB208F1AD884B677FA5EF95315F19807EE8468B361CB79EC42CB99
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                  • API String ID: 0-1546025612
                  • Opcode ID: 3458d5c8e35a5eb4d4abe9221a761b80d123fd2791c941d34f43bea1275577d0
                  • Instruction ID: cfaa6e03878f45bc30a657fdf19458c7a45ef9019784888bbaa0b3c236211f0e
                  • Opcode Fuzzy Hash: 3458d5c8e35a5eb4d4abe9221a761b80d123fd2791c941d34f43bea1275577d0
                  • Instruction Fuzzy Hash: 0DA2BF70E0021ACBEF24CF58CA407AEB7B1BF55310F2581ABD855A7385EB789D81CB59
                  APIs
                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 004682AA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: lstrlen
                  • String ID: ($tbL$|
                  • API String ID: 1659193697-2980396599
                  • Opcode ID: 53b3e5754b6068006e11b25e88e9c46f9786f92ca06542b0b3488b0abd307178
                  • Instruction ID: 7c3d1f1d6e60aedeafb0bfd01292ff39ac576a8867c44a4da25a8b83af91c2c8
                  • Opcode Fuzzy Hash: 53b3e5754b6068006e11b25e88e9c46f9786f92ca06542b0b3488b0abd307178
                  • Instruction Fuzzy Hash: 0A323774A007059FCB28CF19C481A6AB7F0FF48710B15C56EE89ADB7A1EB74E981CB45
                  APIs
                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0048A6AC
                  • Process32FirstW.KERNEL32(00000000,?), ref: 0048A6BA
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • Process32NextW.KERNEL32(00000000,?), ref: 0048A79C
                  • CloseHandle.KERNEL32(00000000), ref: 0048A7AB
                    • Part of subcall function 0041CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00443303,?), ref: 0041CE8A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                  • String ID:
                  • API String ID: 1991900642-0
                  • Opcode ID: 7dcc0cb43a4b69c08180481aca583503f1f849f862ff8363d9ed98e6823bf61d
                  • Instruction ID: 2fb6e68db42923f4ef2dbf57205bcc35e8d348dbbe2b431b4c5cce30a2e3f606
                  • Opcode Fuzzy Hash: 7dcc0cb43a4b69c08180481aca583503f1f849f862ff8363d9ed98e6823bf61d
                  • Instruction Fuzzy Hash: 815150715083009FD710EF25C886A5FBBE8FF89758F00892EF985A7291EB74D904CB96
                  APIs
                  • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0046AAAC
                  • SetKeyboardState.USER32(00000080), ref: 0046AAC8
                  • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0046AB36
                  • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0046AB88
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: KeyboardState$InputMessagePostSend
                  • String ID:
                  • API String ID: 432972143-0
                  • Opcode ID: 2f9ea872fcd5b16b6c320691fed18c074195a392627c57f820666567241ad18b
                  • Instruction ID: d6c7c82b2cb215497aa10c5a808ccb43316a8de1af06af0472ee38c67f59c034
                  • Opcode Fuzzy Hash: 2f9ea872fcd5b16b6c320691fed18c074195a392627c57f820666567241ad18b
                  • Instruction Fuzzy Hash: 88311E30A40A046EFB35CA65CC057FF77A6AB45710F04421BF281652D1E37D9DA1CB6B
                  APIs
                  • InternetReadFile.WININET(?,?,00000400,?), ref: 0047CE89
                  • GetLastError.KERNEL32(?,00000000), ref: 0047CEEA
                  • SetEvent.KERNEL32(?,?,00000000), ref: 0047CEFE
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorEventFileInternetLastRead
                  • String ID:
                  • API String ID: 234945975-0
                  • Opcode ID: 3707b9c9ae3a207289ecf942033c06d8de7be24509dd88a896998beb2b0dedf8
                  • Instruction ID: c40b4181ee2efc8aab5048ca8942e242746b3d8f2e06dc6c00c056ee98eefdf4
                  • Opcode Fuzzy Hash: 3707b9c9ae3a207289ecf942033c06d8de7be24509dd88a896998beb2b0dedf8
                  • Instruction Fuzzy Hash: 2221B0716007059FE730DFA5D984BA777FCEB10318F10842FE64A92291E778EE458B68
                  APIs
                  • IsDebuggerPresent.KERNEL32 ref: 0043271A
                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00432724
                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00432731
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                  • String ID:
                  • API String ID: 3906539128-0
                  • Opcode ID: 9180bc1e0d4adcb3e56e733c61344fc6c4b54028a6dd9c7a72aec5ce681bd319
                  • Instruction ID: 7a38b418b9f860c086cdc517caf7e31996ff0f82c80e1bf280a0a806f4ffcd45
                  • Opcode Fuzzy Hash: 9180bc1e0d4adcb3e56e733c61344fc6c4b54028a6dd9c7a72aec5ce681bd319
                  • Instruction Fuzzy Hash: 2431D574911228ABCB21DF65DD8979DB7B8BF18310F5041EAE80CA7261E7749F818F48
                  APIs
                  • SetErrorMode.KERNEL32(00000001), ref: 004751DA
                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00475238
                  • SetErrorMode.KERNEL32(00000000), ref: 004752A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorMode$DiskFreeSpace
                  • String ID:
                  • API String ID: 1682464887-0
                  • Opcode ID: 6902364949b2d7807722b0e5d9ab2f323de730a597aeec86adc4549c799d6072
                  • Instruction ID: 6ef1684098f943dc999916600b65b7d91fa5241aab8e216c5f41f1ed8be4e899
                  • Opcode Fuzzy Hash: 6902364949b2d7807722b0e5d9ab2f323de730a597aeec86adc4549c799d6072
                  • Instruction Fuzzy Hash: 1B316F75A00518DFDB00DF54D8C4EADBBB4FF48318F0480AAE805AB392DB35E845CB55
                  APIs
                    • Part of subcall function 0041FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00420668
                    • Part of subcall function 0041FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00420685
                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0046170D
                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0046173A
                  • GetLastError.KERNEL32 ref: 0046174A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                  • String ID:
                  • API String ID: 577356006-0
                  • Opcode ID: 81c5be98c81557f5773b06dfddee4f81f10b46aca21fb959753ea4759e00b5f3
                  • Instruction ID: bc7cfa38161a7c9c8966792a06d2b7d2c0a658b2a9dabc564d92e1320148404f
                  • Opcode Fuzzy Hash: 81c5be98c81557f5773b06dfddee4f81f10b46aca21fb959753ea4759e00b5f3
                  • Instruction Fuzzy Hash: 1311CEB2400304AFD718AF54ECC6DABB7B9EB04714B24852FE05653291EB74BC828B68
                  APIs
                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0046D608
                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0046D645
                  • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0046D650
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CloseControlCreateDeviceFileHandle
                  • String ID:
                  • API String ID: 33631002-0
                  • Opcode ID: a64bd305ea81324e51a1bd492d16af95e6b0a74186cd21d324060d9bd8ea620c
                  • Instruction ID: 9cf142b5a91240cc45f4139159ef7cd91e4fccfca0fa27a343eaf3f9661dcb0e
                  • Opcode Fuzzy Hash: a64bd305ea81324e51a1bd492d16af95e6b0a74186cd21d324060d9bd8ea620c
                  • Instruction Fuzzy Hash: E5115E75E05228BFDB208F95DC85FAFBBBCEB45B50F108166F904E7290D6704A058BA6
                  APIs
                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0046168C
                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 004616A1
                  • FreeSid.ADVAPI32(?), ref: 004616B1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AllocateCheckFreeInitializeMembershipToken
                  • String ID:
                  • API String ID: 3429775523-0
                  • Opcode ID: 4a00d4538f4a05a87a9b86106f75b9d3a5b158a7f568ef3bb80f56e57e52c2db
                  • Instruction ID: 0e9862e382fd7f3c7c80cc72a483831afada185aba4413ed44114177f31b515e
                  • Opcode Fuzzy Hash: 4a00d4538f4a05a87a9b86106f75b9d3a5b158a7f568ef3bb80f56e57e52c2db
                  • Instruction Fuzzy Hash: 87F0F475950309FBDB00DFE4DD89EAEBBBCEB08604F504566E501E2191E774AA448A54
                  APIs
                  • GetCurrentProcess.KERNEL32(004328E9,?,00424CBE,004328E9,004C88B8,0000000C,00424E15,004328E9,00000002,00000000,?,004328E9), ref: 00424D09
                  • TerminateProcess.KERNEL32(00000000,?,00424CBE,004328E9,004C88B8,0000000C,00424E15,004328E9,00000002,00000000,?,004328E9), ref: 00424D10
                  • ExitProcess.KERNEL32 ref: 00424D22
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$CurrentExitTerminate
                  • String ID:
                  • API String ID: 1703294689-0
                  • Opcode ID: 5d8ae118f18770bba33106c795b06a97d98750d4dba6e5fd75aa60012db170f6
                  • Instruction ID: fe90fd950eb08efbe530349c79327dd63b2599f04b4284c9dcc21481306f286a
                  • Opcode Fuzzy Hash: 5d8ae118f18770bba33106c795b06a97d98750d4dba6e5fd75aa60012db170f6
                  • Instruction Fuzzy Hash: 53E0B631110158AFCF21AF55EE4AA593B69EB95B85F50402AFC098B222CB39DD42CA98
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: /
                  • API String ID: 0-2043925204
                  • Opcode ID: 1f729ab8471c975a88b421826102304f1a6c61b9826944682b036adcf93c0e22
                  • Instruction ID: 14c7fa559f5b4763ff171dda732297e2c54b28abf4a20cbe459c24970349e514
                  • Opcode Fuzzy Hash: 1f729ab8471c975a88b421826102304f1a6c61b9826944682b036adcf93c0e22
                  • Instruction Fuzzy Hash: 57415C769002186FCB20DFB9CC89EBB7778EB88314F1041AEF905D7280E6749D41CB58
                  APIs
                  • GetUserNameW.ADVAPI32(?,?), ref: 0045D28C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: NameUser
                  • String ID: X64
                  • API String ID: 2645101109-893830106
                  • Opcode ID: 5ae9d3a5c223f98af8f624c997bceb394d8cbf493b0a2dfdf90e0dacfa383068
                  • Instruction ID: 6673ed9d8e3918b7c14938a1278ac1c58549085a93c5f5605fffacb35cb33faf
                  • Opcode Fuzzy Hash: 5ae9d3a5c223f98af8f624c997bceb394d8cbf493b0a2dfdf90e0dacfa383068
                  • Instruction Fuzzy Hash: B6D0C9B480111DEFCB90CB90DCC8DDDB77CBB14305F1001A2F506A2000D77495498F25
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                  • Instruction ID: a0d5f0f00030a5dacf01e29960c58ab36aaed1dbcef93d8d5a01d90ac0399c71
                  • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                  • Instruction Fuzzy Hash: 72023C71E002299BDF14CFA9D9C06AEFBF1EF48314F65816AD819E7384D735AA41CB84
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: Variable is not of type 'Object'.$p#M
                  • API String ID: 0-1505659392
                  • Opcode ID: fe54bd77857ea1937803d7f9e37cb6f65e923bf72e1bfcd8a191f8102bcad167
                  • Instruction ID: 38d766a4293b3aa07483d6856ceb5ffcb9eb73abb101c86768fb291438b6ba99
                  • Opcode Fuzzy Hash: fe54bd77857ea1937803d7f9e37cb6f65e923bf72e1bfcd8a191f8102bcad167
                  • Instruction Fuzzy Hash: 19327C74900219DBDF14DF90C881AEEB7B5BF05308F24416BE806BB2D2D779AD4ACB59
                  APIs
                  • FindFirstFileW.KERNEL32(?,?), ref: 00476918
                  • FindClose.KERNEL32(00000000), ref: 00476961
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Find$CloseFileFirst
                  • String ID:
                  • API String ID: 2295610775-0
                  • Opcode ID: cc119e9cb8d3ba5596bdb68c0d606dab488912ceaa58e861835c95aaf75134e1
                  • Instruction ID: 92942087b29a5d91dd29e42cd07644915c47f19228977071f32efbc9528b55e8
                  • Opcode Fuzzy Hash: cc119e9cb8d3ba5596bdb68c0d606dab488912ceaa58e861835c95aaf75134e1
                  • Instruction Fuzzy Hash: D011B1B16046019FC710CF29C4C4A16BBE1EF84328F05C6AEE5699F7A2CB34EC05CB95
                  APIs
                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00484891,?,?,00000035,?), ref: 004737E4
                  • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00484891,?,?,00000035,?), ref: 004737F4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorFormatLastMessage
                  • String ID:
                  • API String ID: 3479602957-0
                  • Opcode ID: a32bef480801aa5e4c810934379b6bc065fb17cd8c6182978b8547d15b8cff7c
                  • Instruction ID: 2c5fbe7c2752015df322a2356125e26b958e5dd1351939e5ef290c0b02a942fb
                  • Opcode Fuzzy Hash: a32bef480801aa5e4c810934379b6bc065fb17cd8c6182978b8547d15b8cff7c
                  • Instruction Fuzzy Hash: 19F0EC716042142AE72017764C8DFDB775DDFC4765F004176F509D2291D5605D44C6B4
                  APIs
                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0046B25D
                  • keybd_event.USER32(?,76C1C0D0,?,00000000), ref: 0046B270
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: InputSendkeybd_event
                  • String ID:
                  • API String ID: 3536248340-0
                  • Opcode ID: d119593b4e5ebd584fa468a1e8ca90e3721e51bee6ae15b10dfa037ed15b2bfb
                  • Instruction ID: 389103867b5a1a62c80a13fc494159a1aa3ff9a704fe43b7a758784a3dee98d5
                  • Opcode Fuzzy Hash: d119593b4e5ebd584fa468a1e8ca90e3721e51bee6ae15b10dfa037ed15b2bfb
                  • Instruction Fuzzy Hash: C6F06D7080428EABDB058FA0C805BAE7BB0FF04305F00805AF951A5192D37982019F99
                  APIs
                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004611FC), ref: 004610D4
                  • CloseHandle.KERNEL32(?,?,004611FC), ref: 004610E9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AdjustCloseHandlePrivilegesToken
                  • String ID:
                  • API String ID: 81990902-0
                  • Opcode ID: a3f4e25b6cff822c2018d42503ca35e20d0161a55d362c1c72afbd0d22a16eef
                  • Instruction ID: 36680a2f8fbc7064708e9eb61d2762ab0639a2d8bc41b053545934f4eabf6867
                  • Opcode Fuzzy Hash: a3f4e25b6cff822c2018d42503ca35e20d0161a55d362c1c72afbd0d22a16eef
                  • Instruction Fuzzy Hash: 14E0BF72018610AEE7252B51FC45EB777A9EB04314F14883FF5A6804B1DB666CE1DB58
                  APIs
                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00436766,?,?,00000008,?,?,0043FEFE,00000000), ref: 00436998
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ExceptionRaise
                  • String ID:
                  • API String ID: 3997070919-0
                  • Opcode ID: 198a520ea869a35980b3f78eccd319767a6126f68f47798b27a54d549f42ff15
                  • Instruction ID: d30b49202280407283aebb84bb8e606652760a62ec8e3b3cb6f6b3a781ee24c8
                  • Opcode Fuzzy Hash: 198a520ea869a35980b3f78eccd319767a6126f68f47798b27a54d549f42ff15
                  • Instruction Fuzzy Hash: 75B15D7151060AAFD719CF28C48AB657BE0FF09364F26D659E899CF3A1C339D982CB44
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: fc9b716e5d7671c1241b7c4712162e63b804e2f0a4251a4178bb985621070140
                  • Instruction ID: 9c96022233e00f45b40e0282f1d885220868f9e058b094fd9f7a4bbb96fcb14f
                  • Opcode Fuzzy Hash: fc9b716e5d7671c1241b7c4712162e63b804e2f0a4251a4178bb985621070140
                  • Instruction Fuzzy Hash: 611252719002299FDB14CF59C8806EEB7B5FF48710F14819BE849EB252EB389E85CF95
                  APIs
                  • BlockInput.USER32(00000001), ref: 0047EABD
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: BlockInput
                  • String ID:
                  • API String ID: 3456056419-0
                  • Opcode ID: 15020fdac601a566885ed4c0a870f6d579dd1160b3a1fd7142283fffb891c640
                  • Instruction ID: b40af947e9697942177ffb577b1694246c813bd138668231549b55f752874d47
                  • Opcode Fuzzy Hash: 15020fdac601a566885ed4c0a870f6d579dd1160b3a1fd7142283fffb891c640
                  • Instruction Fuzzy Hash: 42E01A31200204AFC710EF6AD844E9AB7E9AF98764F00846BFC49D7391DA78AC418B99
                  APIs
                  • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,004203EE), ref: 004209DA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ExceptionFilterUnhandled
                  • String ID:
                  • API String ID: 3192549508-0
                  • Opcode ID: 34453acfcdf46af830c81bc421b5064df1454124b76db59955965f425ba95087
                  • Instruction ID: f705d55398cb153b68197336f49732564042bcd18df78a8ece02566bb4e07c66
                  • Opcode Fuzzy Hash: 34453acfcdf46af830c81bc421b5064df1454124b76db59955965f425ba95087
                  • Instruction Fuzzy Hash:
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0
                  • API String ID: 0-4108050209
                  • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                  • Instruction ID: dd5f3ba559151bc3021faa4d08a574aa33d8e02e948c2b5efb3109fbb398670e
                  • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                  • Instruction Fuzzy Hash: FB5168B170C7355AEB386629749A7BF27859B02344FD8090FD882C7382C60DDE82D75E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0&M
                  • API String ID: 0-278495883
                  • Opcode ID: c32e3fc8385f568c32938d2280db9929dc4b1fa9f2a4dd4730763afb1ea23267
                  • Instruction ID: cef1c09b466cac432e6cc030d138e4a232e0cfdd24342920920addecda63d74c
                  • Opcode Fuzzy Hash: c32e3fc8385f568c32938d2280db9929dc4b1fa9f2a4dd4730763afb1ea23267
                  • Instruction Fuzzy Hash: 5321D8323216118BDB28CF79C9226BE73E5A764310F188A2FE4A7C33D0DE79A904C754
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ad0e8307ef338da49e0da29b8b170f2fc18eeef58ad5343f8096971db0679d2e
                  • Instruction ID: 3ce898e0723c675ca30dfd83868675bb9146081620d05d072c43bf9694a9d0bf
                  • Opcode Fuzzy Hash: ad0e8307ef338da49e0da29b8b170f2fc18eeef58ad5343f8096971db0679d2e
                  • Instruction Fuzzy Hash: 99325661D29F014DD7239638CD22336A649AFBB3D5F15E337E81AB5EA6EB28C4C35104
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7e3b1f49e82936be172b0303e30b5fac16f65e483f72630dc639334d00fedcf3
                  • Instruction ID: 567821adab74a7b52272253c1dccd6f41d6d8a7a8cd2a5a9328308b85443cdc3
                  • Opcode Fuzzy Hash: 7e3b1f49e82936be172b0303e30b5fac16f65e483f72630dc639334d00fedcf3
                  • Instruction Fuzzy Hash: 5B32E631A003158FDF24CE69C8D46BE7BA1EB45306F288567DC4597393E23C9D8ADA8D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5bcc3d9166a0242764d4bc1e70deacf1a206030cd09490a2fad302018f0b9b9c
                  • Instruction ID: 16488a37a9ebf6b43e4c6892e0fc228140128a1d93a8fd0dca1333f1a8601933
                  • Opcode Fuzzy Hash: 5bcc3d9166a0242764d4bc1e70deacf1a206030cd09490a2fad302018f0b9b9c
                  • Instruction Fuzzy Hash: 3C22D170E006099FEF14CF65D841AAEB3F1FF44304F14453AE816A7292EB39AD55CB59
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 162d60c108e19d52b5546031e15313829679ff4244cc0ed0e5eba159f4329a50
                  • Instruction ID: a7c37e6f1452ed374a139f2922219f308528d16e40839c2f88b42618a8a79e06
                  • Opcode Fuzzy Hash: 162d60c108e19d52b5546031e15313829679ff4244cc0ed0e5eba159f4329a50
                  • Instruction Fuzzy Hash: 9C02CAB0E00205EFDB04DF55D881AAEB7B1FF44304F11856AE806AB391EB39ED55CB99
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                  • Instruction ID: 263be3c91c1eb535f95e0da61d69067ed54d374e2ef309587b9275242729dd05
                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                  • Instruction Fuzzy Hash: B89194723090F30ADB29467AA57403FFFF15AA23A135A07AFD4F2CA2E1FD189554D624
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2cfc99caef6fcf3a1232713fd42500ccdf6fc43273da94df47a7739a65c3388a
                  • Instruction ID: 84ac85275a216eff532c1add87baca4d75615409e8ba58ee8a571bdc319d84d4
                  • Opcode Fuzzy Hash: 2cfc99caef6fcf3a1232713fd42500ccdf6fc43273da94df47a7739a65c3388a
                  • Instruction Fuzzy Hash: C761467130873596DA349929B895BBF3794DF41318FD0091FE842DB382DA1DAE42871E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                  • Instruction ID: 76ceb53c6dfe0c4248e762e257b909a8a314b5929079aaa7e546bb38e22f71ec
                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                  • Instruction Fuzzy Hash: 548174727080B309DB2D423A957443FFFE15AE23A135A079FD4F2CB2E1EE288554E624
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                  • Instruction ID: 006c8081c181ac556f1a3c92b2aca6193dbe47c0ae63bec452bc5a4e227960d5
                  • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                  • Instruction Fuzzy Hash: 8A41D571D1051CDBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                  • Instruction ID: 5f2b69c4ca0c07659c30bd558e44720f882da4edb0dd530b4aa9734253af1875
                  • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                  • Instruction Fuzzy Hash: 1A018078A04109EFCB44DF98C5909AEF7B5FB48310B608699D809A7701D730AE41DB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                  • Instruction ID: 1e82e51fa2cffabc05baf737206902140f81da6608289866a5e4c42ce7819e4a
                  • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                  • Instruction Fuzzy Hash: 53018078A04209EFCB48DF98C5909AEF7B5FB48210B608599D909A7701D730AE41DB80
                  Memory Dump Source
                  • Source File: 00000000.00000002.1437848830.00000000019A0000.00000040.00001000.00020000.00000000.sdmp, Offset: 019A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_19a0000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                  • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                  • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                  • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                  APIs
                  • DeleteObject.GDI32(00000000), ref: 00482B30
                  • DeleteObject.GDI32(00000000), ref: 00482B43
                  • DestroyWindow.USER32 ref: 00482B52
                  • GetDesktopWindow.USER32 ref: 00482B6D
                  • GetWindowRect.USER32(00000000), ref: 00482B74
                  • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00482CA3
                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00482CB1
                  • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482CF8
                  • GetClientRect.USER32(00000000,?), ref: 00482D04
                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00482D40
                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482D62
                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482D75
                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482D80
                  • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482D89
                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482D98
                  • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482DA1
                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482DA8
                  • GlobalFree.KERNEL32(00000000), ref: 00482DB3
                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482DC5
                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,0049FC38,00000000), ref: 00482DDB
                  • GlobalFree.KERNEL32(00000000), ref: 00482DEB
                  • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00482E11
                  • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00482E30
                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00482E52
                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0048303F
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                  • String ID: $AutoIt v3$DISPLAY$static
                  • API String ID: 2211948467-2373415609
                  • Opcode ID: b494cc3624a38074f3221385d133c055cd0034efb3e5cf8de8c6dcb354adba42
                  • Instruction ID: bbf4dd1d0e10ac38dbf2890fd7e20bdbd7a257b4c3ab9d414e1cffb64e0bd8dd
                  • Opcode Fuzzy Hash: b494cc3624a38074f3221385d133c055cd0034efb3e5cf8de8c6dcb354adba42
                  • Instruction Fuzzy Hash: E7028D71900205EFDB14DFA4CD89EAE7BB9EF49314F00856AF915AB2A1C774AD01CF68
                  APIs
                  • SetTextColor.GDI32(?,00000000), ref: 0049712F
                  • GetSysColorBrush.USER32(0000000F), ref: 00497160
                  • GetSysColor.USER32(0000000F), ref: 0049716C
                  • SetBkColor.GDI32(?,000000FF), ref: 00497186
                  • SelectObject.GDI32(?,?), ref: 00497195
                  • InflateRect.USER32(?,000000FF,000000FF), ref: 004971C0
                  • GetSysColor.USER32(00000010), ref: 004971C8
                  • CreateSolidBrush.GDI32(00000000), ref: 004971CF
                  • FrameRect.USER32(?,?,00000000), ref: 004971DE
                  • DeleteObject.GDI32(00000000), ref: 004971E5
                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00497230
                  • FillRect.USER32(?,?,?), ref: 00497262
                  • GetWindowLongW.USER32(?,000000F0), ref: 00497284
                    • Part of subcall function 004973E8: GetSysColor.USER32(00000012), ref: 00497421
                    • Part of subcall function 004973E8: SetTextColor.GDI32(?,?), ref: 00497425
                    • Part of subcall function 004973E8: GetSysColorBrush.USER32(0000000F), ref: 0049743B
                    • Part of subcall function 004973E8: GetSysColor.USER32(0000000F), ref: 00497446
                    • Part of subcall function 004973E8: GetSysColor.USER32(00000011), ref: 00497463
                    • Part of subcall function 004973E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00497471
                    • Part of subcall function 004973E8: SelectObject.GDI32(?,00000000), ref: 00497482
                    • Part of subcall function 004973E8: SetBkColor.GDI32(?,00000000), ref: 0049748B
                    • Part of subcall function 004973E8: SelectObject.GDI32(?,?), ref: 00497498
                    • Part of subcall function 004973E8: InflateRect.USER32(?,000000FF,000000FF), ref: 004974B7
                    • Part of subcall function 004973E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004974CE
                    • Part of subcall function 004973E8: GetWindowLongW.USER32(00000000,000000F0), ref: 004974DB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                  • String ID:
                  • API String ID: 4124339563-0
                  • Opcode ID: 1d8408493b8f9eca714ed5f7439df046efebe5dd77da0c9f66854e1289a10aec
                  • Instruction ID: 7653aa0511b1474f4b3cda614fda4756ac704073239f7f11a827eee26e1b1a20
                  • Opcode Fuzzy Hash: 1d8408493b8f9eca714ed5f7439df046efebe5dd77da0c9f66854e1289a10aec
                  • Instruction Fuzzy Hash: AFA1B172018311BFDB109F60DC89E5B7BA9FF99320F100A3AF962961E1D734E945CB5A
                  APIs
                  • DestroyWindow.USER32(?,?), ref: 00418E14
                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00456AC5
                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00456AFE
                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00456F43
                    • Part of subcall function 00418F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00418BE8,?,00000000,?,?,?,?,00418BBA,00000000,?), ref: 00418FC5
                  • SendMessageW.USER32(?,00001053), ref: 00456F7F
                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00456F96
                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00456FAC
                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00456FB7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                  • String ID: 0
                  • API String ID: 2760611726-4108050209
                  • Opcode ID: c4e1d079e7feecc1f0c7021be5bb067e54142e6e8afc53484fab5642190c1190
                  • Instruction ID: e9b540a01f17715450491459bb1486a3ac7e1ecb175c7ce654376cd1565cf959
                  • Opcode Fuzzy Hash: c4e1d079e7feecc1f0c7021be5bb067e54142e6e8afc53484fab5642190c1190
                  • Instruction Fuzzy Hash: 7812AC70601211AFDB21CF14C894BA6B7F5FB45302F95446FE885CB262CB39AC9ACB59
                  APIs
                  • DestroyWindow.USER32(00000000), ref: 0048273E
                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0048286A
                  • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 004828A9
                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 004828B9
                  • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00482900
                  • GetClientRect.USER32(00000000,?), ref: 0048290C
                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00482955
                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00482964
                  • GetStockObject.GDI32(00000011), ref: 00482974
                  • SelectObject.GDI32(00000000,00000000), ref: 00482978
                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00482988
                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00482991
                  • DeleteDC.GDI32(00000000), ref: 0048299A
                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004829C6
                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 004829DD
                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00482A1D
                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00482A31
                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00482A42
                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00482A77
                  • GetStockObject.GDI32(00000011), ref: 00482A82
                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00482A8D
                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00482A97
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                  • API String ID: 2910397461-517079104
                  • Opcode ID: 75e675519c1aedcc4f22a6906d58bc5e48459ae5d838ab3ec349a53c673adf86
                  • Instruction ID: e9ade11dab0fe2af951de518d2c42dc0868fb73828cf1c45992ce1b7dabbae1d
                  • Opcode Fuzzy Hash: 75e675519c1aedcc4f22a6906d58bc5e48459ae5d838ab3ec349a53c673adf86
                  • Instruction Fuzzy Hash: 9CB16F71A00215BFEB14DF69CD85FAE7BA9EB08714F00452AF915E72E0D774AD40CBA8
                  APIs
                  • SetErrorMode.KERNEL32(00000001), ref: 00474AED
                  • GetDriveTypeW.KERNEL32(?,0049CB68,?,\\.\,0049CC08), ref: 00474BCA
                  • SetErrorMode.KERNEL32(00000000,0049CB68,?,\\.\,0049CC08), ref: 00474D36
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorMode$DriveType
                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                  • API String ID: 2907320926-4222207086
                  • Opcode ID: ab80831dd2eb253968ff5bd395b14728ef159c1b25e70c5eac400577a6d6c2f3
                  • Instruction ID: 0ac9adffbc1f8b7afb3ae8515e1ade7549d640cd2c15dac342cbcd9624f2b695
                  • Opcode Fuzzy Hash: ab80831dd2eb253968ff5bd395b14728ef159c1b25e70c5eac400577a6d6c2f3
                  • Instruction Fuzzy Hash: 6361B2356051059FCB05DF24CA81EF977A0AB84344B26C02BE80BAB691DB3DED42DB5E
                  APIs
                  • GetSysColor.USER32(00000012), ref: 00497421
                  • SetTextColor.GDI32(?,?), ref: 00497425
                  • GetSysColorBrush.USER32(0000000F), ref: 0049743B
                  • GetSysColor.USER32(0000000F), ref: 00497446
                  • CreateSolidBrush.GDI32(?), ref: 0049744B
                  • GetSysColor.USER32(00000011), ref: 00497463
                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00497471
                  • SelectObject.GDI32(?,00000000), ref: 00497482
                  • SetBkColor.GDI32(?,00000000), ref: 0049748B
                  • SelectObject.GDI32(?,?), ref: 00497498
                  • InflateRect.USER32(?,000000FF,000000FF), ref: 004974B7
                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004974CE
                  • GetWindowLongW.USER32(00000000,000000F0), ref: 004974DB
                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0049752A
                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00497554
                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00497572
                  • DrawFocusRect.USER32(?,?), ref: 0049757D
                  • GetSysColor.USER32(00000011), ref: 0049758E
                  • SetTextColor.GDI32(?,00000000), ref: 00497596
                  • DrawTextW.USER32(?,004970F5,000000FF,?,00000000), ref: 004975A8
                  • SelectObject.GDI32(?,?), ref: 004975BF
                  • DeleteObject.GDI32(?), ref: 004975CA
                  • SelectObject.GDI32(?,?), ref: 004975D0
                  • DeleteObject.GDI32(?), ref: 004975D5
                  • SetTextColor.GDI32(?,?), ref: 004975DB
                  • SetBkColor.GDI32(?,?), ref: 004975E5
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                  • String ID:
                  • API String ID: 1996641542-0
                  • Opcode ID: 1195c3c338048cde382ca9e06bec7546f8486f8a3f5afba851761c3510aa3d87
                  • Instruction ID: 809f5c748247be305c2d038453bd7a4f80c17b766ea098e9d8b68210fc43f4d9
                  • Opcode Fuzzy Hash: 1195c3c338048cde382ca9e06bec7546f8486f8a3f5afba851761c3510aa3d87
                  • Instruction Fuzzy Hash: 7E613D72904218BFDF019FA4DC89EAE7FB9EB09320F114136F915AB2A1D7759940CF98
                  APIs
                  • GetCursorPos.USER32(?), ref: 00491128
                  • GetDesktopWindow.USER32 ref: 0049113D
                  • GetWindowRect.USER32(00000000), ref: 00491144
                  • GetWindowLongW.USER32(?,000000F0), ref: 00491199
                  • DestroyWindow.USER32(?), ref: 004911B9
                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 004911ED
                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0049120B
                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0049121D
                  • SendMessageW.USER32(00000000,00000421,?,?), ref: 00491232
                  • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00491245
                  • IsWindowVisible.USER32(00000000), ref: 004912A1
                  • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 004912BC
                  • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 004912D0
                  • GetWindowRect.USER32(00000000,?), ref: 004912E8
                  • MonitorFromPoint.USER32(?,?,00000002), ref: 0049130E
                  • GetMonitorInfoW.USER32(00000000,?), ref: 00491328
                  • CopyRect.USER32(?,?), ref: 0049133F
                  • SendMessageW.USER32(00000000,00000412,00000000), ref: 004913AA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                  • String ID: ($0$tooltips_class32
                  • API String ID: 698492251-4156429822
                  • Opcode ID: 2df0520ea53f781151155a9dccb26768136dc9de2785cb82424ff2f6e4428622
                  • Instruction ID: 4fa3465cd89e115d083a00c14f180ab48255e67d4e67e6ea643bc7373abc173c
                  • Opcode Fuzzy Hash: 2df0520ea53f781151155a9dccb26768136dc9de2785cb82424ff2f6e4428622
                  • Instruction Fuzzy Hash: 63B18C71604341AFDB10DF65C885A5BBBE4FF88354F00892EF999AB2A1C735EC44CB99
                  APIs
                  • CharUpperBuffW.USER32(?,?), ref: 004902E5
                  • _wcslen.LIBCMT ref: 0049031F
                  • _wcslen.LIBCMT ref: 00490389
                  • _wcslen.LIBCMT ref: 004903F1
                  • _wcslen.LIBCMT ref: 00490475
                  • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 004904C5
                  • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00490504
                    • Part of subcall function 0041F9F2: _wcslen.LIBCMT ref: 0041F9FD
                    • Part of subcall function 0046223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00462258
                    • Part of subcall function 0046223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0046228A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$MessageSend$BuffCharUpper
                  • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                  • API String ID: 1103490817-719923060
                  • Opcode ID: b3078c2079efdba59c02469cbec69a3e9f01576e3346aea7aeeede21f83beaad
                  • Instruction ID: 9a54775b287b5774c99644f3016330cb526a800e56de7245beb016a960f4771f
                  • Opcode Fuzzy Hash: b3078c2079efdba59c02469cbec69a3e9f01576e3346aea7aeeede21f83beaad
                  • Instruction Fuzzy Hash: D4E1B2312082019FCB14DF25C95092BBBE5BFC8758B14457EF896AB391DB38ED46CB4A
                  APIs
                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00418968
                  • GetSystemMetrics.USER32(00000007), ref: 00418970
                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0041899B
                  • GetSystemMetrics.USER32(00000008), ref: 004189A3
                  • GetSystemMetrics.USER32(00000004), ref: 004189C8
                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 004189E5
                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 004189F5
                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00418A28
                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00418A3C
                  • GetClientRect.USER32(00000000,000000FF), ref: 00418A5A
                  • GetStockObject.GDI32(00000011), ref: 00418A76
                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00418A81
                    • Part of subcall function 0041912D: GetCursorPos.USER32(?), ref: 00419141
                    • Part of subcall function 0041912D: ScreenToClient.USER32(00000000,?), ref: 0041915E
                    • Part of subcall function 0041912D: GetAsyncKeyState.USER32(00000001), ref: 00419183
                    • Part of subcall function 0041912D: GetAsyncKeyState.USER32(00000002), ref: 0041919D
                  • SetTimer.USER32(00000000,00000000,00000028,004190FC), ref: 00418AA8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                  • String ID: AutoIt v3 GUI
                  • API String ID: 1458621304-248962490
                  • Opcode ID: 9b22b474b8465658301ac0bcbc4df9570785728c239dcb6a9251e847d7526efb
                  • Instruction ID: 24350be98dd57b743f4a3dd19b60f581808337178d510593da20842267799206
                  • Opcode Fuzzy Hash: 9b22b474b8465658301ac0bcbc4df9570785728c239dcb6a9251e847d7526efb
                  • Instruction Fuzzy Hash: CBB16F71600209AFDB14DFA8CC95BEE7BB5FB48315F11422BFE1597290DB38A841CB59
                  APIs
                    • Part of subcall function 004610F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00461114
                    • Part of subcall function 004610F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 00461120
                    • Part of subcall function 004610F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 0046112F
                    • Part of subcall function 004610F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 00461136
                    • Part of subcall function 004610F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0046114D
                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00460DF5
                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00460E29
                  • GetLengthSid.ADVAPI32(?), ref: 00460E40
                  • GetAce.ADVAPI32(?,00000000,?), ref: 00460E7A
                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00460E96
                  • GetLengthSid.ADVAPI32(?), ref: 00460EAD
                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00460EB5
                  • HeapAlloc.KERNEL32(00000000), ref: 00460EBC
                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00460EDD
                  • CopySid.ADVAPI32(00000000), ref: 00460EE4
                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00460F13
                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00460F35
                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00460F47
                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00460F6E
                  • HeapFree.KERNEL32(00000000), ref: 00460F75
                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00460F7E
                  • HeapFree.KERNEL32(00000000), ref: 00460F85
                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00460F8E
                  • HeapFree.KERNEL32(00000000), ref: 00460F95
                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00460FA1
                  • HeapFree.KERNEL32(00000000), ref: 00460FA8
                    • Part of subcall function 00461193: GetProcessHeap.KERNEL32(00000008,00460BB1,?,00000000,?,00460BB1,?), ref: 004611A1
                    • Part of subcall function 00461193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00460BB1,?), ref: 004611A8
                    • Part of subcall function 00461193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00460BB1,?), ref: 004611B7
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                  • String ID:
                  • API String ID: 4175595110-0
                  • Opcode ID: 45c2a3535d20612bdbd0e9ab5ee118db897ba99b8e4ba87040f1d0bb3022ba22
                  • Instruction ID: 0fb3ce4afe998c41078967e3b78393224d602ba31502d030620368beac206456
                  • Opcode Fuzzy Hash: 45c2a3535d20612bdbd0e9ab5ee118db897ba99b8e4ba87040f1d0bb3022ba22
                  • Instruction Fuzzy Hash: 92717B7290020AABDF209FA5DC85BAFBBB8BF15300F044126F919A6291E775DD05CB69
                  APIs
                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0048C4BD
                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,0049CC08,00000000,?,00000000,?,?), ref: 0048C544
                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0048C5A4
                  • _wcslen.LIBCMT ref: 0048C5F4
                  • _wcslen.LIBCMT ref: 0048C66F
                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0048C6B2
                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0048C7C1
                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0048C84D
                  • RegCloseKey.ADVAPI32(?), ref: 0048C881
                  • RegCloseKey.ADVAPI32(00000000), ref: 0048C88E
                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0048C960
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                  • API String ID: 9721498-966354055
                  • Opcode ID: 6ff89c77b89d335e935a70a66716c50b0bb9a0ae14573bfd1fb04df1e85b7c2a
                  • Instruction ID: c2a433ac3ef539583300f68ceb4562f11c5db710a61bc91a506c5d7cd8db0dd2
                  • Opcode Fuzzy Hash: 6ff89c77b89d335e935a70a66716c50b0bb9a0ae14573bfd1fb04df1e85b7c2a
                  • Instruction Fuzzy Hash: 541271356042019FD714EF15C881E2AB7E5EF88758F14886EF8499B3A2DB39FC41CB99
                  APIs
                  • CharUpperBuffW.USER32(?,?), ref: 004909C6
                  • _wcslen.LIBCMT ref: 00490A01
                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00490A54
                  • _wcslen.LIBCMT ref: 00490A8A
                  • _wcslen.LIBCMT ref: 00490B06
                  • _wcslen.LIBCMT ref: 00490B81
                    • Part of subcall function 0041F9F2: _wcslen.LIBCMT ref: 0041F9FD
                    • Part of subcall function 00462BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00462BFA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$MessageSend$BuffCharUpper
                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                  • API String ID: 1103490817-4258414348
                  • Opcode ID: 7f0726da428d1f857e1947c38dbf15062f352fe45e50e90fc4be6ee75e981708
                  • Instruction ID: 1013c0651a9dba8fe5b30329448c2a67b3bcb7d5d7144e3293d99a1aa7eccc76
                  • Opcode Fuzzy Hash: 7f0726da428d1f857e1947c38dbf15062f352fe45e50e90fc4be6ee75e981708
                  • Instruction Fuzzy Hash: A0E1B2752083019FCB14DF25C45096ABBE1BF94358F10896EF8966B3A2D738ED45CB8A
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$BuffCharUpper
                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                  • API String ID: 1256254125-909552448
                  • Opcode ID: b31e78215c04d9e7d477a3ca5053a964ce584295d374fffe22a77a35a0470901
                  • Instruction ID: ed2a7cc976ee06f379692ae362c4bca03eff38a4ab6ac2818ef3541a2519e057
                  • Opcode Fuzzy Hash: b31e78215c04d9e7d477a3ca5053a964ce584295d374fffe22a77a35a0470901
                  • Instruction Fuzzy Hash: 6D71E63260052A8BCB10FE79D9C16BF33919BA0754B11492BF86597384E73DDD8587BC
                  APIs
                  • _wcslen.LIBCMT ref: 0049835A
                  • _wcslen.LIBCMT ref: 0049836E
                  • _wcslen.LIBCMT ref: 00498391
                  • _wcslen.LIBCMT ref: 004983B4
                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 004983F2
                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00495BF2), ref: 0049844E
                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00498487
                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 004984CA
                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00498501
                  • FreeLibrary.KERNEL32(?), ref: 0049850D
                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0049851D
                  • DestroyIcon.USER32(?,?,?,?,?,00495BF2), ref: 0049852C
                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00498549
                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00498555
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                  • String ID: .dll$.exe$.icl
                  • API String ID: 799131459-1154884017
                  • Opcode ID: 5ed259a3dd636ea1506d4e87527b88dddd6922e2630e92815831cad2243b0ba6
                  • Instruction ID: 4e18c377d3a93d3c1868f56d560fd42ffcf80cca71b042c358b88d151030d548
                  • Opcode Fuzzy Hash: 5ed259a3dd636ea1506d4e87527b88dddd6922e2630e92815831cad2243b0ba6
                  • Instruction Fuzzy Hash: BC61D071640215BAEF14DF69DC81BBF7BA8AF05720F10412FF815D61D1DB78A980CBA8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                  • API String ID: 0-1645009161
                  • Opcode ID: 572253963f525e02906e6e58a8eda6c3630d1565cc9188daafa6b218338521ae
                  • Instruction ID: 143d0d3894ee3fcd827cba236b78bf0a762740ba91adbf79a0b17f8313cd745c
                  • Opcode Fuzzy Hash: 572253963f525e02906e6e58a8eda6c3630d1565cc9188daafa6b218338521ae
                  • Instruction Fuzzy Hash: AD81B471A04205BBDF20AB61DC42FAF3B64AF54344F14403BF905BB2D2EB7CA945C69A
                  APIs
                  • LoadIconW.USER32(00000063), ref: 00465A2E
                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00465A40
                  • SetWindowTextW.USER32(?,?), ref: 00465A57
                  • GetDlgItem.USER32(?,000003EA), ref: 00465A6C
                  • SetWindowTextW.USER32(00000000,?), ref: 00465A72
                  • GetDlgItem.USER32(?,000003E9), ref: 00465A82
                  • SetWindowTextW.USER32(00000000,?), ref: 00465A88
                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00465AA9
                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00465AC3
                  • GetWindowRect.USER32(?,?), ref: 00465ACC
                  • _wcslen.LIBCMT ref: 00465B33
                  • SetWindowTextW.USER32(?,?), ref: 00465B6F
                  • GetDesktopWindow.USER32 ref: 00465B75
                  • GetWindowRect.USER32(00000000), ref: 00465B7C
                  • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00465BD3
                  • GetClientRect.USER32(?,?), ref: 00465BE0
                  • PostMessageW.USER32(?,00000005,00000000,?), ref: 00465C05
                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00465C2F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                  • String ID:
                  • API String ID: 895679908-0
                  • Opcode ID: 995c23ee9de8ec63ae521d5336bbf1a014c3310c08a33b5eb24cc9a98bea18a1
                  • Instruction ID: 0a901d73f7802359af014b314dccce5a02935b980301162514e1a12ab8627d3d
                  • Opcode Fuzzy Hash: 995c23ee9de8ec63ae521d5336bbf1a014c3310c08a33b5eb24cc9a98bea18a1
                  • Instruction Fuzzy Hash: 54718171900B059FDB20DFA8CD85A6EBBF5FF48704F10452AE542A26A0D774FD44CB59
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen
                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[L
                  • API String ID: 176396367-2673105605
                  • Opcode ID: 3ef901a7c4d3f7d847686ef54d8ca3cb0fe16cad14b22e338ef83e5d3e0195a7
                  • Instruction ID: dec465ae6880087b831d7e9f7dc700507f7d777555492fb578c4aceba1586c83
                  • Opcode Fuzzy Hash: 3ef901a7c4d3f7d847686ef54d8ca3cb0fe16cad14b22e338ef83e5d3e0195a7
                  • Instruction Fuzzy Hash: 6BE10332A00566ABCB149F64C451BEEFBB0BF44715F54812FE456B3380FB38AE858799
                  APIs
                  • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 004200C6
                    • Part of subcall function 004200ED: InitializeCriticalSectionAndSpinCount.KERNEL32(004D070C,00000FA0,053FFEC2,?,?,?,?,004423B3,000000FF), ref: 0042011C
                    • Part of subcall function 004200ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,004423B3,000000FF), ref: 00420127
                    • Part of subcall function 004200ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,004423B3,000000FF), ref: 00420138
                    • Part of subcall function 004200ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0042014E
                    • Part of subcall function 004200ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0042015C
                    • Part of subcall function 004200ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0042016A
                    • Part of subcall function 004200ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00420195
                    • Part of subcall function 004200ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004201A0
                  • ___scrt_fastfail.LIBCMT ref: 004200E7
                    • Part of subcall function 004200A3: __onexit.LIBCMT ref: 004200A9
                  Strings
                  • SleepConditionVariableCS, xrefs: 00420154
                  • kernel32.dll, xrefs: 00420133
                  • WakeAllConditionVariable, xrefs: 00420162
                  • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00420122
                  • InitializeConditionVariable, xrefs: 00420148
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                  • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                  • API String ID: 66158676-1714406822
                  • Opcode ID: ed7e43c6380ba617abe833e8cd4ec0574e43a35956320d61fe7d0cf66bf0707d
                  • Instruction ID: 84b6f6118bdc231d3a488da8fe478963a291621794897a1b1255fb41307b7b9d
                  • Opcode Fuzzy Hash: ed7e43c6380ba617abe833e8cd4ec0574e43a35956320d61fe7d0cf66bf0707d
                  • Instruction Fuzzy Hash: 1B21F6327457206BEB106BB5BC46B6A77E4DB05B51F60023BF802E7392DB6D98008A9C
                  APIs
                  • CharLowerBuffW.USER32(00000000,00000000,0049CC08), ref: 00474527
                  • _wcslen.LIBCMT ref: 0047453B
                  • _wcslen.LIBCMT ref: 00474599
                  • _wcslen.LIBCMT ref: 004745F4
                  • _wcslen.LIBCMT ref: 0047463F
                  • _wcslen.LIBCMT ref: 004746A7
                    • Part of subcall function 0041F9F2: _wcslen.LIBCMT ref: 0041F9FD
                  • GetDriveTypeW.KERNEL32(?,004C6BF0,00000061), ref: 00474743
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$BuffCharDriveLowerType
                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                  • API String ID: 2055661098-1000479233
                  • Opcode ID: 7a032b10261071238578d7798be2a8d8f1bbc0d2a2d447e15a69d6f0c622db57
                  • Instruction ID: d98997375423f878c0017acd91fdc058ed6cfa4487477bd8f6599caaed90522b
                  • Opcode Fuzzy Hash: 7a032b10261071238578d7798be2a8d8f1bbc0d2a2d447e15a69d6f0c622db57
                  • Instruction Fuzzy Hash: 5CB103716083029BC710DF28C890ABBB7E5AFD5724F50892EF49A97391E738D845CA5A
                  APIs
                    • Part of subcall function 00419BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00419BB2
                  • DragQueryPoint.SHELL32(?,?), ref: 00499147
                    • Part of subcall function 00497674: ClientToScreen.USER32(?,?), ref: 0049769A
                    • Part of subcall function 00497674: GetWindowRect.USER32(?,?), ref: 00497710
                    • Part of subcall function 00497674: PtInRect.USER32(?,?,00498B89), ref: 00497720
                  • SendMessageW.USER32(?,000000B0,?,?), ref: 004991B0
                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 004991BB
                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 004991DE
                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00499225
                  • SendMessageW.USER32(?,000000B0,?,?), ref: 0049923E
                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00499255
                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00499277
                  • DragFinish.SHELL32(?), ref: 0049927E
                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00499371
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#M
                  • API String ID: 221274066-2015629680
                  • Opcode ID: cc5226adbb9b96ac99bcee9125aa241e4809515293bea636d27be4bdb13d5005
                  • Instruction ID: 3df0e896286e7cc24d35a34c115dd35c96d1348fae80d5e553011d8ae7303d2a
                  • Opcode Fuzzy Hash: cc5226adbb9b96ac99bcee9125aa241e4809515293bea636d27be4bdb13d5005
                  • Instruction Fuzzy Hash: 36618A71108301AFD700EF65CC85DAFBBE8EF99354F00092FF591922A1DB349A49CB5A
                  APIs
                  • _wcslen.LIBCMT ref: 0048B198
                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0048B1B0
                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0048B1D4
                  • _wcslen.LIBCMT ref: 0048B200
                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0048B214
                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0048B236
                  • _wcslen.LIBCMT ref: 0048B332
                    • Part of subcall function 004705A7: GetStdHandle.KERNEL32(000000F6), ref: 004705C6
                  • _wcslen.LIBCMT ref: 0048B34B
                  • _wcslen.LIBCMT ref: 0048B366
                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0048B3B6
                  • GetLastError.KERNEL32(00000000), ref: 0048B407
                  • CloseHandle.KERNEL32(?), ref: 0048B439
                  • CloseHandle.KERNEL32(00000000), ref: 0048B44A
                  • CloseHandle.KERNEL32(00000000), ref: 0048B45C
                  • CloseHandle.KERNEL32(00000000), ref: 0048B46E
                  • CloseHandle.KERNEL32(?), ref: 0048B4E3
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                  • String ID:
                  • API String ID: 2178637699-0
                  • Opcode ID: 6c26a828d419c392216f6ba5c3558db43b659c4bbd39098d0d63fa909e086c7f
                  • Instruction ID: bb510aeb41faed9d03c7259fc64420f109ae724ee6bccea42d6d47e6be20ccfc
                  • Opcode Fuzzy Hash: 6c26a828d419c392216f6ba5c3558db43b659c4bbd39098d0d63fa909e086c7f
                  • Instruction Fuzzy Hash: BDF18C315043009FC714EF25C891A6FBBE0EF85718F14896EF8955B2A2CB39EC45CB9A
                  APIs
                  • GetMenuItemCount.USER32(004D1990), ref: 00442F8D
                  • GetMenuItemCount.USER32(004D1990), ref: 0044303D
                  • GetCursorPos.USER32(?), ref: 00443081
                  • SetForegroundWindow.USER32(00000000), ref: 0044308A
                  • TrackPopupMenuEx.USER32(004D1990,00000000,?,00000000,00000000,00000000), ref: 0044309D
                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004430A9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                  • String ID: 0
                  • API String ID: 36266755-4108050209
                  • Opcode ID: f1fd613179ef594869f11dd80bb4a4429448fc4ee6c5b267f90848000e4c88e0
                  • Instruction ID: 50604dc0154d471f9d9f05728990120ecc12f68252d1d5e29eca4ee7fd44c235
                  • Opcode Fuzzy Hash: f1fd613179ef594869f11dd80bb4a4429448fc4ee6c5b267f90848000e4c88e0
                  • Instruction Fuzzy Hash: 8C711730640215BAFB218F25CD89F9BBF68FF01724F20422BF514662E0C7B9AD54D799
                  APIs
                  • DestroyWindow.USER32(?,?), ref: 00496DEB
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00496E5F
                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00496E81
                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00496E94
                  • DestroyWindow.USER32(?), ref: 00496EB5
                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 00496EE4
                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00496EFD
                  • GetDesktopWindow.USER32 ref: 00496F16
                  • GetWindowRect.USER32(00000000), ref: 00496F1D
                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00496F35
                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00496F4D
                    • Part of subcall function 00419944: GetWindowLongW.USER32(?,000000EB), ref: 00419952
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                  • String ID: 0$tooltips_class32
                  • API String ID: 2429346358-3619404913
                  • Opcode ID: 6428b4afc25977ee63a403d95399c66df614a0ee7afea08159283990d6292f2d
                  • Instruction ID: 6a0311cad4bd6a39f66962045e872b5819b0b1edc96ae1726a8a34bf2098f0d7
                  • Opcode Fuzzy Hash: 6428b4afc25977ee63a403d95399c66df614a0ee7afea08159283990d6292f2d
                  • Instruction Fuzzy Hash: 6B715874104244AFDB21CF18D894FBBBBFAFB99304F55042EF98997261C774A906CB19
                  APIs
                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0047C4B0
                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0047C4C3
                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0047C4D7
                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0047C4F0
                  • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0047C533
                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0047C549
                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0047C554
                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0047C584
                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0047C5DC
                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0047C5F0
                  • InternetCloseHandle.WININET(00000000), ref: 0047C5FB
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                  • String ID:
                  • API String ID: 3800310941-3916222277
                  • Opcode ID: 7c91576087ff3762589d5d9375ec81b3101d2abcd0dc8baf7d7a45dd79255699
                  • Instruction ID: 62966bfdfc762d986eb43c7bc46254d8f994bea3438afeba38a38ba0b5e87711
                  • Opcode Fuzzy Hash: 7c91576087ff3762589d5d9375ec81b3101d2abcd0dc8baf7d7a45dd79255699
                  • Instruction Fuzzy Hash: 4D516FB0500605BFDB218FA1C9C8AAB7BBCFF14744F00842FF94996250D739E9449BA8
                  APIs
                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00498592
                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985A2
                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985AD
                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985BA
                  • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985C8
                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985D7
                  • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985E0
                  • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985E7
                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004985F8
                  • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0049FC38,?), ref: 00498611
                  • GlobalFree.KERNEL32(00000000), ref: 00498621
                  • GetObjectW.GDI32(?,00000018,?), ref: 00498641
                  • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00498671
                  • DeleteObject.GDI32(?), ref: 00498699
                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004986AF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                  • String ID:
                  • API String ID: 3840717409-0
                  • Opcode ID: ecf7bf33f19c8727181582f7a1fc1acabdf2093612c6ed86d011053e0d604fa0
                  • Instruction ID: eb69097575f49255b2fdd6a809ba57042cfc9ad38165ae5ecb00aa39181f9416
                  • Opcode Fuzzy Hash: ecf7bf33f19c8727181582f7a1fc1acabdf2093612c6ed86d011053e0d604fa0
                  • Instruction Fuzzy Hash: D2410C75600204BFDB119FA9DD88EAB7BB8EF99711F10407AF905EB260DB349D01CB68
                  APIs
                  • VariantInit.OLEAUT32(00000000), ref: 00471502
                  • VariantCopy.OLEAUT32(?,?), ref: 0047150B
                  • VariantClear.OLEAUT32(?), ref: 00471517
                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 004715FB
                  • VarR8FromDec.OLEAUT32(?,?), ref: 00471657
                  • VariantInit.OLEAUT32(?), ref: 00471708
                  • SysFreeString.OLEAUT32(?), ref: 0047178C
                  • VariantClear.OLEAUT32(?), ref: 004717D8
                  • VariantClear.OLEAUT32(?), ref: 004717E7
                  • VariantInit.OLEAUT32(00000000), ref: 00471823
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                  • API String ID: 1234038744-3931177956
                  • Opcode ID: ba598f90c12e18ab22f3f3a14ae79ad0d42ff63962e58bea57040a0ec4672516
                  • Instruction ID: 0c605db627f9a6fcea8deb3e881c5d7ac84542bb8d3de78438d95bbb650700a1
                  • Opcode Fuzzy Hash: ba598f90c12e18ab22f3f3a14ae79ad0d42ff63962e58bea57040a0ec4672516
                  • Instruction Fuzzy Hash: 19D11371A00105EBDF089F69D885BF9B7B5BF44704F54C06BE40AAB2A0DB38DC46DB5A
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                    • Part of subcall function 0048C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0048B6AE,?,?), ref: 0048C9B5
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048C9F1
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048CA68
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048CA9E
                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0048B6F4
                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0048B772
                  • RegDeleteValueW.ADVAPI32(?,?), ref: 0048B80A
                  • RegCloseKey.ADVAPI32(?), ref: 0048B87E
                  • RegCloseKey.ADVAPI32(?), ref: 0048B89C
                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0048B8F2
                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0048B904
                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0048B922
                  • FreeLibrary.KERNEL32(00000000), ref: 0048B983
                  • RegCloseKey.ADVAPI32(00000000), ref: 0048B994
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                  • String ID: RegDeleteKeyExW$advapi32.dll
                  • API String ID: 146587525-4033151799
                  • Opcode ID: 75175d9ad90b8601f1d711508c6a1e4fc295dfd1eb731fceb7cbb3808139d2de
                  • Instruction ID: dff2ae94d901b68dfbc339473ba99015738ca5bac0efe396a6ca95e9687f61ef
                  • Opcode Fuzzy Hash: 75175d9ad90b8601f1d711508c6a1e4fc295dfd1eb731fceb7cbb3808139d2de
                  • Instruction Fuzzy Hash: 11C16D70204201AFD710EF15C495F2ABBE5EF84318F14896EE59A5B3A2CB39EC45CBD6
                  APIs
                  • GetDC.USER32(00000000), ref: 004825D8
                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004825E8
                  • CreateCompatibleDC.GDI32(?), ref: 004825F4
                  • SelectObject.GDI32(00000000,?), ref: 00482601
                  • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0048266D
                  • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 004826AC
                  • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 004826D0
                  • SelectObject.GDI32(?,?), ref: 004826D8
                  • DeleteObject.GDI32(?), ref: 004826E1
                  • DeleteDC.GDI32(?), ref: 004826E8
                  • ReleaseDC.USER32(00000000,?), ref: 004826F3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                  • String ID: (
                  • API String ID: 2598888154-3887548279
                  • Opcode ID: 80a922af6ff0b400d9b4d55868f74a63bb4a5b444080528099388fb43a20a8dd
                  • Instruction ID: b8a9b27da65527d2ec4fd9924957b6d7e15a17d16c08fc6de10c4135e4ddce9e
                  • Opcode Fuzzy Hash: 80a922af6ff0b400d9b4d55868f74a63bb4a5b444080528099388fb43a20a8dd
                  • Instruction Fuzzy Hash: 44611475D00219EFCF04DFA4D985AAEBBB5FF48310F20852AE955A7250E374A941CFA8
                  APIs
                  • ___free_lconv_mon.LIBCMT ref: 0043DAA1
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D659
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D66B
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D67D
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D68F
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D6A1
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D6B3
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D6C5
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D6D7
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D6E9
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D6FB
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D70D
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D71F
                    • Part of subcall function 0043D63C: _free.LIBCMT ref: 0043D731
                  • _free.LIBCMT ref: 0043DA96
                    • Part of subcall function 004329C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000), ref: 004329DE
                    • Part of subcall function 004329C8: GetLastError.KERNEL32(00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000,00000000), ref: 004329F0
                  • _free.LIBCMT ref: 0043DAB8
                  • _free.LIBCMT ref: 0043DACD
                  • _free.LIBCMT ref: 0043DAD8
                  • _free.LIBCMT ref: 0043DAFA
                  • _free.LIBCMT ref: 0043DB0D
                  • _free.LIBCMT ref: 0043DB1B
                  • _free.LIBCMT ref: 0043DB26
                  • _free.LIBCMT ref: 0043DB5E
                  • _free.LIBCMT ref: 0043DB65
                  • _free.LIBCMT ref: 0043DB82
                  • _free.LIBCMT ref: 0043DB9A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                  • String ID:
                  • API String ID: 161543041-0
                  • Opcode ID: ba9ecef691faa970056ea1d3866dd1f1132379091b2b346f906a9454ef583009
                  • Instruction ID: ffe76eae24fd8544d019f3284b9d6afa4b39dd2c00b4ff96bdf9c62132f8b44f
                  • Opcode Fuzzy Hash: ba9ecef691faa970056ea1d3866dd1f1132379091b2b346f906a9454ef583009
                  • Instruction Fuzzy Hash: 1F315CB1A042049FEB21AA3AF945B5BB7E9FF08314F15646FE449D7291DF78AC40C728
                  APIs
                  • GetClassNameW.USER32(?,?,00000100), ref: 0046369C
                  • _wcslen.LIBCMT ref: 004636A7
                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00463797
                  • GetClassNameW.USER32(?,?,00000400), ref: 0046380C
                  • GetDlgCtrlID.USER32(?), ref: 0046385D
                  • GetWindowRect.USER32(?,?), ref: 00463882
                  • GetParent.USER32(?), ref: 004638A0
                  • ScreenToClient.USER32(00000000), ref: 004638A7
                  • GetClassNameW.USER32(?,?,00000100), ref: 00463921
                  • GetWindowTextW.USER32(?,?,00000400), ref: 0046395D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                  • String ID: %s%u
                  • API String ID: 4010501982-679674701
                  • Opcode ID: 10ae961581674d5cbcf1e214d19add7430943aa4d55c825e828419219232a29a
                  • Instruction ID: 7b5c3b41c8cbfb7d3e55e91aba6d366648bd1860090b62885b86946cfe082944
                  • Opcode Fuzzy Hash: 10ae961581674d5cbcf1e214d19add7430943aa4d55c825e828419219232a29a
                  • Instruction Fuzzy Hash: FB91D671204246AFD714DF24C885BABF7A8FF44355F00452AF999C2290EB38EA49CB96
                  APIs
                  • GetClassNameW.USER32(?,?,00000400), ref: 00464994
                  • GetWindowTextW.USER32(?,?,00000400), ref: 004649DA
                  • _wcslen.LIBCMT ref: 004649EB
                  • CharUpperBuffW.USER32(?,00000000), ref: 004649F7
                  • _wcsstr.LIBVCRUNTIME ref: 00464A2C
                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00464A64
                  • GetWindowTextW.USER32(?,?,00000400), ref: 00464A9D
                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00464AE6
                  • GetClassNameW.USER32(?,?,00000400), ref: 00464B20
                  • GetWindowRect.USER32(?,?), ref: 00464B8B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                  • String ID: ThumbnailClass
                  • API String ID: 1311036022-1241985126
                  • Opcode ID: b0eb2cffebd71530849ad0f8d6f1fc17b2ef59f95678408b0c2633a6fa0fed5b
                  • Instruction ID: ef2d3bd4ef7e396348df645b57022939d607c9c9aefbfeb88a630890a8734fbd
                  • Opcode Fuzzy Hash: b0eb2cffebd71530849ad0f8d6f1fc17b2ef59f95678408b0c2633a6fa0fed5b
                  • Instruction Fuzzy Hash: 4991BD71104205AFDF04DF14C981BAB77A8EF84714F04846BFD859A296EB38ED45CBAA
                  APIs
                    • Part of subcall function 00419BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00419BB2
                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00498D5A
                  • GetFocus.USER32 ref: 00498D6A
                  • GetDlgCtrlID.USER32(00000000), ref: 00498D75
                  • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00498E1D
                  • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00498ECF
                  • GetMenuItemCount.USER32(?), ref: 00498EEC
                  • GetMenuItemID.USER32(?,00000000), ref: 00498EFC
                  • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00498F2E
                  • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00498F70
                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00498FA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                  • String ID: 0
                  • API String ID: 1026556194-4108050209
                  • Opcode ID: 0445e5d47e0633a50362685ed54f0853f7c9fe5740d42ff216a218705f9617e5
                  • Instruction ID: f09423b894425bfc5704633e703d5dd2c6ec2960b86f90cba4647bf1a8ff03c3
                  • Opcode Fuzzy Hash: 0445e5d47e0633a50362685ed54f0853f7c9fe5740d42ff216a218705f9617e5
                  • Instruction Fuzzy Hash: D1818D71508311ABDF10CF28C884AAB7BE9BB8A754F14053FF985D7291DB38D901CB69
                  APIs
                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0048CC64
                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0048CC8D
                  • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0048CD48
                    • Part of subcall function 0048CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0048CCAA
                    • Part of subcall function 0048CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0048CCBD
                    • Part of subcall function 0048CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0048CCCF
                    • Part of subcall function 0048CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0048CD05
                    • Part of subcall function 0048CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0048CD28
                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 0048CCF3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                  • String ID: RegDeleteKeyExW$advapi32.dll
                  • API String ID: 2734957052-4033151799
                  • Opcode ID: dcd9112891bd2ee60c26572573abb16304940212726aceebbe92ece07dd225c5
                  • Instruction ID: e86a5ad9e06cbea96041afa100c71b13dc6c8b19f8e223668f847576c6ff0ca9
                  • Opcode Fuzzy Hash: dcd9112891bd2ee60c26572573abb16304940212726aceebbe92ece07dd225c5
                  • Instruction Fuzzy Hash: 17317E71901128BBD720AB95DCC8EFFBBBCEF15740F000576A905E3240D6389A459BB8
                  APIs
                  • timeGetTime.WINMM ref: 0046E6B4
                    • Part of subcall function 0041E551: timeGetTime.WINMM(?,?,0046E6D4), ref: 0041E555
                  • Sleep.KERNEL32(0000000A), ref: 0046E6E1
                  • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0046E705
                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0046E727
                  • SetActiveWindow.USER32 ref: 0046E746
                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0046E754
                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 0046E773
                  • Sleep.KERNEL32(000000FA), ref: 0046E77E
                  • IsWindow.USER32 ref: 0046E78A
                  • EndDialog.USER32(00000000), ref: 0046E79B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                  • String ID: BUTTON
                  • API String ID: 1194449130-3405671355
                  • Opcode ID: 2fa67f0e142f612aeb7d58deafcfc03ae6a8127cb1edbb26ea12d7241a330f20
                  • Instruction ID: bb1c645b88745d441f71c4c0e3317fcc2af5ab1b42d7041e6cab7d24ff849380
                  • Opcode Fuzzy Hash: 2fa67f0e142f612aeb7d58deafcfc03ae6a8127cb1edbb26ea12d7241a330f20
                  • Instruction Fuzzy Hash: 13219278241200BFEB015F66EDC9A263BE9EB75349F100437F801912B1EBB59C009B2E
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0046EA5D
                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0046EA73
                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046EA84
                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0046EA96
                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0046EAA7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: SendString$_wcslen
                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                  • API String ID: 2420728520-1007645807
                  • Opcode ID: 3ea94977c5d223316f1155f6eff61fa39fea3f99cf92d776db3c494c09294a11
                  • Instruction ID: 3692b6db05fd65ba027c1393d3da603a5f1682cfd2a4fe2854ed4949e6019a26
                  • Opcode Fuzzy Hash: 3ea94977c5d223316f1155f6eff61fa39fea3f99cf92d776db3c494c09294a11
                  • Instruction Fuzzy Hash: 611191B9A5021979D720A7A6DD4AFFF6ABCEFD1B04F10443F7801A20D1EA780D05C5B9
                  APIs
                    • Part of subcall function 00418F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00418BE8,?,00000000,?,?,?,?,00418BBA,00000000,?), ref: 00418FC5
                  • DestroyWindow.USER32(?), ref: 00418C81
                  • KillTimer.USER32(00000000,?,?,?,?,00418BBA,00000000,?), ref: 00418D1B
                  • DestroyAcceleratorTable.USER32(00000000), ref: 00456973
                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00418BBA,00000000,?), ref: 004569A1
                  • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00418BBA,00000000,?), ref: 004569B8
                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00418BBA,00000000), ref: 004569D4
                  • DeleteObject.GDI32(00000000), ref: 004569E6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                  • String ID:
                  • API String ID: 641708696-0
                  • Opcode ID: fbedbd1a7937270782ab1f8e2379ddec0a405b1dff3a68fadf911eade46e8b87
                  • Instruction ID: 904443176f2e0c5aabccd5091ed5999ad562dca2c220c71f3dfeb9455a1b2caf
                  • Opcode Fuzzy Hash: fbedbd1a7937270782ab1f8e2379ddec0a405b1dff3a68fadf911eade46e8b87
                  • Instruction Fuzzy Hash: 9B618770502600EFCB219F14D958BAAB7F2FB50316F50452FE8429BA60CB39ACC5CB9D
                  APIs
                    • Part of subcall function 00419944: GetWindowLongW.USER32(?,000000EB), ref: 00419952
                  • GetSysColor.USER32(0000000F), ref: 00419862
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ColorLongWindow
                  • String ID:
                  • API String ID: 259745315-0
                  • Opcode ID: 62751d272673b0821f713b73e41fe23e6aa4ecf6cc85e1f49b590694757af1f2
                  • Instruction ID: 61c94829c2f462e06b9a30ff81eafb122e759f6e81981193f23f48934df35d16
                  • Opcode Fuzzy Hash: 62751d272673b0821f713b73e41fe23e6aa4ecf6cc85e1f49b590694757af1f2
                  • Instruction Fuzzy Hash: 2041E731104644AFDB206F389C95BFA37A5FB16331F144627F9A2872E2D7349C86DB19
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0044F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00469717
                  • LoadStringW.USER32(00000000,?,0044F7F8,00000001), ref: 00469720
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0044F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00469742
                  • LoadStringW.USER32(00000000,?,0044F7F8,00000001), ref: 00469745
                  • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00469866
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: HandleLoadModuleString$Message_wcslen
                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                  • API String ID: 747408836-2268648507
                  • Opcode ID: 7b38b459b0b7ee8610b7421aa3696a694746c801a850e6032a21f670c94f97eb
                  • Instruction ID: dc6073b0ffb8b2717a848ac97e341e3e6e2156971ee481b89b677cdd9599d0e4
                  • Opcode Fuzzy Hash: 7b38b459b0b7ee8610b7421aa3696a694746c801a850e6032a21f670c94f97eb
                  • Instruction Fuzzy Hash: 5A414D72800209AACB04FBE1CD82EEE777DAF14745F10403BB60172092EB796F49CB69
                  APIs
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004607A2
                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004607BE
                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004607DA
                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00460804
                  • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0046082C
                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00460837
                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0046083C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                  • API String ID: 323675364-22481851
                  • Opcode ID: 4f9931b86399ff3fdc48cabcab343352e6cc1c909b92cb775524740a28e2332d
                  • Instruction ID: 456a90b4fc616be063c3ea6fd44dfdeda56d2f04aa281644d67354a3b811078f
                  • Opcode Fuzzy Hash: 4f9931b86399ff3fdc48cabcab343352e6cc1c909b92cb775524740a28e2332d
                  • Instruction Fuzzy Hash: DF411972910228ABCB15EFA4DC85DEEB778BF14344F14413AE901B32A1EB346E14CB94
                  APIs
                  • CoInitialize.OLE32(00000000), ref: 00477AF3
                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00477B8F
                  • SHGetDesktopFolder.SHELL32(?), ref: 00477BA3
                  • CoCreateInstance.OLE32(0049FD08,00000000,00000001,004C6E6C,?), ref: 00477BEF
                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00477C74
                  • CoTaskMemFree.OLE32(?,?), ref: 00477CCC
                  • SHBrowseForFolderW.SHELL32(?), ref: 00477D57
                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00477D7A
                  • CoTaskMemFree.OLE32(00000000), ref: 00477D81
                  • CoTaskMemFree.OLE32(00000000), ref: 00477DD6
                  • CoUninitialize.OLE32 ref: 00477DDC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                  • String ID:
                  • API String ID: 2762341140-0
                  • Opcode ID: f6687e422928640ca7869dec78d00f4ed6719a713b8843af70cafdad0ba949d0
                  • Instruction ID: 39bbd3678709868c1330d616e21568fed79a46750d80a3cae74fa18317dd7f80
                  • Opcode Fuzzy Hash: f6687e422928640ca7869dec78d00f4ed6719a713b8843af70cafdad0ba949d0
                  • Instruction Fuzzy Hash: 5EC12C75A04109AFCB14DF64C884DAEBBF5FF48308B1484AAE91AEB361D734ED45CB94
                  APIs
                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00495504
                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00495515
                  • CharNextW.USER32(00000158), ref: 00495544
                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00495585
                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0049559B
                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004955AC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$CharNext
                  • String ID:
                  • API String ID: 1350042424-0
                  • Opcode ID: d161e1ce9203be114704a4439add49d4e860955f28bb8d8851bfc5335a59baec
                  • Instruction ID: 23b6a745198481fe7597f927e24a292adea9889f47785b6f77cf4ece44108869
                  • Opcode Fuzzy Hash: d161e1ce9203be114704a4439add49d4e860955f28bb8d8851bfc5335a59baec
                  • Instruction Fuzzy Hash: 5761AD71900608BBDF12DF50CC84EFF3FB9EB05720F204066F925A6291D7389A81DB69
                  APIs
                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0045FAAF
                  • SafeArrayAllocData.OLEAUT32(?), ref: 0045FB08
                  • VariantInit.OLEAUT32(?), ref: 0045FB1A
                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 0045FB3A
                  • VariantCopy.OLEAUT32(?,?), ref: 0045FB8D
                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 0045FBA1
                  • VariantClear.OLEAUT32(?), ref: 0045FBB6
                  • SafeArrayDestroyData.OLEAUT32(?), ref: 0045FBC3
                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0045FBCC
                  • VariantClear.OLEAUT32(?), ref: 0045FBDE
                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0045FBE9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                  • String ID:
                  • API String ID: 2706829360-0
                  • Opcode ID: d065f95d9964d003929c320fd761995a09dfa1eba26e18688a85f29929e3774e
                  • Instruction ID: d0f5244db563a2ebb953bca7e1bf553e058448cf4b9d20363b30dd2a6705a66b
                  • Opcode Fuzzy Hash: d065f95d9964d003929c320fd761995a09dfa1eba26e18688a85f29929e3774e
                  • Instruction Fuzzy Hash: CD416035A00219DFCF00DF64C8949AEBBB9FF58345F00807AE915A7262DB34A949CFA5
                  APIs
                  • WSAStartup.WSOCK32(00000101,?), ref: 004805BC
                  • inet_addr.WSOCK32(?), ref: 0048061C
                  • gethostbyname.WSOCK32(?), ref: 00480628
                  • IcmpCreateFile.IPHLPAPI ref: 00480636
                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 004806C6
                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 004806E5
                  • IcmpCloseHandle.IPHLPAPI(?), ref: 004807B9
                  • WSACleanup.WSOCK32 ref: 004807BF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                  • String ID: Ping
                  • API String ID: 1028309954-2246546115
                  • Opcode ID: c247edb2eed694ae295fc67957cb95a495a4c18ce6dbcdd1137eebf9cadcd6c5
                  • Instruction ID: 5c0c681a77d667199f412a631dc81a6052911fdb817d86fd0548510bbdadaad4
                  • Opcode Fuzzy Hash: c247edb2eed694ae295fc67957cb95a495a4c18ce6dbcdd1137eebf9cadcd6c5
                  • Instruction Fuzzy Hash: 9A91A135614241AFD360EF15C489F1ABBE0EF44318F1489AAF4699B7A2C738EC49CF95
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$BuffCharLower
                  • String ID: cdecl$none$stdcall$winapi
                  • API String ID: 707087890-567219261
                  • Opcode ID: cb388e303b5336f06868d7919d8d2e66aec040e8f0d5d8257fd8325fbab22050
                  • Instruction ID: 8212ab8b0198c01814745c1b291fcdb86e5b13909f40ebd7fc902a52f087fba3
                  • Opcode Fuzzy Hash: cb388e303b5336f06868d7919d8d2e66aec040e8f0d5d8257fd8325fbab22050
                  • Instruction Fuzzy Hash: 3251A431A001169BCB14EF69C9409BE73E5BF64324BA1462FE825E73C5DB39DD41C798
                  APIs
                  • CoInitialize.OLE32 ref: 00483774
                  • CoUninitialize.OLE32 ref: 0048377F
                  • CoCreateInstance.OLE32(?,00000000,00000017,0049FB78,?), ref: 004837D9
                  • IIDFromString.OLE32(?,?), ref: 0048384C
                  • VariantInit.OLEAUT32(?), ref: 004838E4
                  • VariantClear.OLEAUT32(?), ref: 00483936
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                  • API String ID: 636576611-1287834457
                  • Opcode ID: 1a80d009dbb9f2ac7bf3bb44ceae522497428bdc4dd0e1c13d26cb6814bec441
                  • Instruction ID: 09448163fb94b08c5125ba562485cc8212cf43027621ceee6864fd56bf278ce6
                  • Opcode Fuzzy Hash: 1a80d009dbb9f2ac7bf3bb44ceae522497428bdc4dd0e1c13d26cb6814bec441
                  • Instruction Fuzzy Hash: B3618D70608301AFD310EF55C888B5EB7E4AF44B15F10485EF98597291D778EE49CB9A
                  APIs
                    • Part of subcall function 00419BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00419BB2
                    • Part of subcall function 0041912D: GetCursorPos.USER32(?), ref: 00419141
                    • Part of subcall function 0041912D: ScreenToClient.USER32(00000000,?), ref: 0041915E
                    • Part of subcall function 0041912D: GetAsyncKeyState.USER32(00000001), ref: 00419183
                    • Part of subcall function 0041912D: GetAsyncKeyState.USER32(00000002), ref: 0041919D
                  • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00498B6B
                  • ImageList_EndDrag.COMCTL32 ref: 00498B71
                  • ReleaseCapture.USER32 ref: 00498B77
                  • SetWindowTextW.USER32(?,00000000), ref: 00498C12
                  • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00498C25
                  • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00498CFF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                  • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#M
                  • API String ID: 1924731296-1961496832
                  • Opcode ID: 06de6f4ed672b4f868e7cfaa5b5db41331229d1416ab3956df12f097b3293ae0
                  • Instruction ID: 52717fa2b95b97a14e042308ffc4897870df37abc473548e4af4715ce2610060
                  • Opcode Fuzzy Hash: 06de6f4ed672b4f868e7cfaa5b5db41331229d1416ab3956df12f097b3293ae0
                  • Instruction Fuzzy Hash: D1517B71105300AFDB00EF15D8A9FAA7BE4BB85714F40063EF956672E2CB789D44CB6A
                  APIs
                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 004733CF
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 004733F0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LoadString$_wcslen
                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                  • API String ID: 4099089115-3080491070
                  • Opcode ID: 7350e0165f010d261893c9f4803e04fb0f7d59449f32f750725959f3c8171fb2
                  • Instruction ID: 1426893d16c5a8541d83e9fc750115f455adac83308913478daf6e2c423aeb3d
                  • Opcode Fuzzy Hash: 7350e0165f010d261893c9f4803e04fb0f7d59449f32f750725959f3c8171fb2
                  • Instruction Fuzzy Hash: 19518271900109BADF14EBE1CD46EEEB778AF04745F10807BB905721A2EB392F58DB69
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$BuffCharUpper
                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                  • API String ID: 1256254125-769500911
                  • Opcode ID: e1c4ef30d4339e6e2b65e40461cf0db23954e06adbf37201190a46b47bcb9e52
                  • Instruction ID: 16ff66291ae7142d824ee3a28711f6f5a2cfdd0b8d46551da25f226ae2d73451
                  • Opcode Fuzzy Hash: e1c4ef30d4339e6e2b65e40461cf0db23954e06adbf37201190a46b47bcb9e52
                  • Instruction Fuzzy Hash: 4B41F432A011269ACB206F7DC8905BF77A5EBA0758B25412BE421DB384F739CDC2C7D6
                  APIs
                  • SetErrorMode.KERNEL32(00000001), ref: 004753A0
                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00475416
                  • GetLastError.KERNEL32 ref: 00475420
                  • SetErrorMode.KERNEL32(00000000,READY), ref: 004754A7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Error$Mode$DiskFreeLastSpace
                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                  • API String ID: 4194297153-14809454
                  • Opcode ID: 729518a6c0cfb7bbb2194ed8628378fe14ba429d7a222be60e312a83549b7c57
                  • Instruction ID: c84e953c2e58dff2a5b5b0cc672f699c00e7d82dfc9b0f9726610f43d7423484
                  • Opcode Fuzzy Hash: 729518a6c0cfb7bbb2194ed8628378fe14ba429d7a222be60e312a83549b7c57
                  • Instruction Fuzzy Hash: 7F318D35A005049FDB10DF68C484BEA7BA4EB45309F14C06BE40ADF392DBB9DD82CB99
                  APIs
                  • CreateMenu.USER32 ref: 00493C79
                  • SetMenu.USER32(?,00000000), ref: 00493C88
                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00493D10
                  • IsMenu.USER32(?), ref: 00493D24
                  • CreatePopupMenu.USER32 ref: 00493D2E
                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00493D5B
                  • DrawMenuBar.USER32 ref: 00493D63
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Menu$CreateItem$DrawInfoInsertPopup
                  • String ID: 0$F
                  • API String ID: 161812096-3044882817
                  • Opcode ID: b2a60e14e018d663fa55a81db5ff368922ac4faeb82bc60f9e85116724bebc83
                  • Instruction ID: b91e1e235a1bc7a01833517849901071aef4b11d4c4293359304a87f4873cbf2
                  • Opcode Fuzzy Hash: b2a60e14e018d663fa55a81db5ff368922ac4faeb82bc60f9e85116724bebc83
                  • Instruction Fuzzy Hash: 73416CB5A01209EFDF14CFA4D894AAA7BB5FF4A351F14013AE94697360D734AA10CB58
                  APIs
                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00493A9D
                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00493AA0
                  • GetWindowLongW.USER32(?,000000F0), ref: 00493AC7
                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00493AEA
                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00493B62
                  • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00493BAC
                  • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00493BC7
                  • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00493BE2
                  • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00493BF6
                  • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00493C13
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$LongWindow
                  • String ID:
                  • API String ID: 312131281-0
                  • Opcode ID: 863a9386dd68544a25b4dbb1b0d7cc861b13c881a53a64f4b53dda24079983d3
                  • Instruction ID: ade6b4bc2faa9311db67ada8b044e63368f6cba9b4a03933416f70eda9a3338b
                  • Opcode Fuzzy Hash: 863a9386dd68544a25b4dbb1b0d7cc861b13c881a53a64f4b53dda24079983d3
                  • Instruction Fuzzy Hash: 7E615D75900248AFDB10DFA4CC81EEE7BB8EB09704F1041AAFA15A73A2D774AE45DB54
                  APIs
                  • GetCurrentThreadId.KERNEL32 ref: 0046B151
                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0046A1E1,?,00000001), ref: 0046B165
                  • GetWindowThreadProcessId.USER32(00000000), ref: 0046B16C
                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0046A1E1,?,00000001), ref: 0046B17B
                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 0046B18D
                  • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0046A1E1,?,00000001), ref: 0046B1A6
                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0046A1E1,?,00000001), ref: 0046B1B8
                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0046A1E1,?,00000001), ref: 0046B1FD
                  • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0046A1E1,?,00000001), ref: 0046B212
                  • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0046A1E1,?,00000001), ref: 0046B21D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                  • String ID:
                  • API String ID: 2156557900-0
                  • Opcode ID: 382b209a2cba78ddf8e41334d2b6ba1cf6c3b081d995b84236608703fe32d354
                  • Instruction ID: f6a348beda4ffe143d5e590981e048a75270d40ba3837d0816f26ad695a91573
                  • Opcode Fuzzy Hash: 382b209a2cba78ddf8e41334d2b6ba1cf6c3b081d995b84236608703fe32d354
                  • Instruction Fuzzy Hash: 57318271640204BFDB119F64DC98BAE7BA9EB51356F104037FA01D6250E7789D818FAE
                  APIs
                  • _free.LIBCMT ref: 00432C94
                    • Part of subcall function 004329C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000), ref: 004329DE
                    • Part of subcall function 004329C8: GetLastError.KERNEL32(00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000,00000000), ref: 004329F0
                  • _free.LIBCMT ref: 00432CA0
                  • _free.LIBCMT ref: 00432CAB
                  • _free.LIBCMT ref: 00432CB6
                  • _free.LIBCMT ref: 00432CC1
                  • _free.LIBCMT ref: 00432CCC
                  • _free.LIBCMT ref: 00432CD7
                  • _free.LIBCMT ref: 00432CE2
                  • _free.LIBCMT ref: 00432CED
                  • _free.LIBCMT ref: 00432CFB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: b89e3fc481ae3e176462e99b8a7668b8f79c4b48a0d814554b3974eba80e6475
                  • Instruction ID: 3051c53e0822a8872d8489ac48bb26e9ebb0418146d7d3ac8d6911c10ac1cf4c
                  • Opcode Fuzzy Hash: b89e3fc481ae3e176462e99b8a7668b8f79c4b48a0d814554b3974eba80e6475
                  • Instruction Fuzzy Hash: F9112BB6200018BFCB02EF55EA42DDD3BA5FF09344F4050AAFA485F232D675EE509B94
                  APIs
                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401459
                  • OleUninitialize.OLE32(?,00000000), ref: 004014F8
                  • UnregisterHotKey.USER32(?), ref: 004016DD
                  • DestroyWindow.USER32(?), ref: 004424B9
                  • FreeLibrary.KERNEL32(?), ref: 0044251E
                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0044254B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                  • String ID: close all
                  • API String ID: 469580280-3243417748
                  • Opcode ID: 3d1dd693a3a782e6c4e9f1bbd6ef2690dc1141c438bd47c980261ecb8bbc567e
                  • Instruction ID: 1b622f8cca6128ea30bf35ea39827fa5fc47dd8eb3ad01c4cafdaef943526809
                  • Opcode Fuzzy Hash: 3d1dd693a3a782e6c4e9f1bbd6ef2690dc1141c438bd47c980261ecb8bbc567e
                  • Instruction Fuzzy Hash: 48D19D317012129FDB19EF15C995A29F7A0BF05304F5441AFE84A7B3A2DB38AD12CF59
                  APIs
                  • SetWindowLongW.USER32(?,000000EB), ref: 00405C7A
                    • Part of subcall function 00405D0A: GetClientRect.USER32(?,?), ref: 00405D30
                    • Part of subcall function 00405D0A: GetWindowRect.USER32(?,?), ref: 00405D71
                    • Part of subcall function 00405D0A: ScreenToClient.USER32(?,?), ref: 00405D99
                  • GetDC.USER32 ref: 004446F5
                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00444708
                  • SelectObject.GDI32(00000000,00000000), ref: 00444716
                  • SelectObject.GDI32(00000000,00000000), ref: 0044472B
                  • ReleaseDC.USER32(?,00000000), ref: 00444733
                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 004447C4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                  • String ID: U
                  • API String ID: 4009187628-3372436214
                  • Opcode ID: fc88bf487012d287045aa7dbc4333abd7d516997430eb8e6c17b957814580e93
                  • Instruction ID: 18c0316b4590178f6e3925bbe4dbfa53a0d9920bccc32b03521c8a94a4d491fc
                  • Opcode Fuzzy Hash: fc88bf487012d287045aa7dbc4333abd7d516997430eb8e6c17b957814580e93
                  • Instruction Fuzzy Hash: 8171E030400205DFEF218F64C984ABB7BB1FF86324F14427BED556A2A6C7389842DF69
                  APIs
                  • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 004735E4
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • LoadStringW.USER32(004D2390,?,00000FFF,?), ref: 0047360A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LoadString$_wcslen
                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                  • API String ID: 4099089115-2391861430
                  • Opcode ID: eb896b8e2b1799887fce0511e1a89e17cc79fd2e457b7826d85e33af4f969589
                  • Instruction ID: 1ab214c128badca45ff07410e642431328e0b3a6551c87b6a7327aa8e2f1ad17
                  • Opcode Fuzzy Hash: eb896b8e2b1799887fce0511e1a89e17cc79fd2e457b7826d85e33af4f969589
                  • Instruction Fuzzy Hash: 67517371800209BADF14EFA1CC42EEEBB79AF04745F14813BF505721A2EB391A99DF59
                  APIs
                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047C272
                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0047C29A
                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0047C2CA
                  • GetLastError.KERNEL32 ref: 0047C322
                  • SetEvent.KERNEL32(?), ref: 0047C336
                  • InternetCloseHandle.WININET(00000000), ref: 0047C341
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                  • String ID:
                  • API String ID: 3113390036-3916222277
                  • Opcode ID: 2ae87fead1b28522ffa763f2cfc4779ca44399286855b199adfd1e371db4c569
                  • Instruction ID: 7f47d04d608913b586c8f08289edd0458440cd40b92be60ebc4de0d4a00b3483
                  • Opcode Fuzzy Hash: 2ae87fead1b28522ffa763f2cfc4779ca44399286855b199adfd1e371db4c569
                  • Instruction Fuzzy Hash: 14317171500604AFD7219FA58CC4AAB7BFCEB59744B10C52FF84A92201DB38DD059BA9
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00443AAF,?,?,Bad directive syntax error,0049CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 004698BC
                  • LoadStringW.USER32(00000000,?,00443AAF,?), ref: 004698C3
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00469987
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: HandleLoadMessageModuleString_wcslen
                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                  • API String ID: 858772685-4153970271
                  • Opcode ID: 35c814936f1dd32bc15b5df856404db4fb2140b47f2021faa70e6393b4990be8
                  • Instruction ID: 551ec2a85a5fe91f92dce7e2b3b89b7bc3e306fd30fdb11d4db69dc2ba035c50
                  • Opcode Fuzzy Hash: 35c814936f1dd32bc15b5df856404db4fb2140b47f2021faa70e6393b4990be8
                  • Instruction Fuzzy Hash: 2321913181021AABCF15AF90CC46FEE7739BF14705F04446FF915710A2EB79AA28DB19
                  APIs
                  • GetParent.USER32 ref: 004620AB
                  • GetClassNameW.USER32(00000000,?,00000100), ref: 004620C0
                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0046214D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ClassMessageNameParentSend
                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                  • API String ID: 1290815626-3381328864
                  • Opcode ID: 8c65e68c5093e92e7d410f0c47d842fd6cd50d60c2769177c48d3f94328cf3cb
                  • Instruction ID: 92216a087c2b3a214069876dba0e85c20e3b9e2fc58689a3b3ad7a817c6cf774
                  • Opcode Fuzzy Hash: 8c65e68c5093e92e7d410f0c47d842fd6cd50d60c2769177c48d3f94328cf3cb
                  • Instruction Fuzzy Hash: 3D11E77A788B17B9F6016621AC06EEB779CDB16324B20002BFB04A51D1FEAD7C42551E
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                  • String ID:
                  • API String ID: 1282221369-0
                  • Opcode ID: 755353a0899066e8f4f07fb7a531df8e2d90b31389a803dea094346c2faad477
                  • Instruction ID: 05b1af434bcca4c45db1c3e2a8b3b367b08b06696651023259944f127f524509
                  • Opcode Fuzzy Hash: 755353a0899066e8f4f07fb7a531df8e2d90b31389a803dea094346c2faad477
                  • Instruction Fuzzy Hash: 9C6136B1A04310AFDB25AFB5A881B6A7BA5EF0D318F14516FF900A7381D63A9901C79C
                  APIs
                  • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00495186
                  • ShowWindow.USER32(?,00000000), ref: 004951C7
                  • ShowWindow.USER32(?,00000005,?,00000000), ref: 004951CD
                  • SetFocus.USER32(?,?,00000005,?,00000000), ref: 004951D1
                    • Part of subcall function 00496FBA: DeleteObject.GDI32(00000000), ref: 00496FE6
                  • GetWindowLongW.USER32(?,000000F0), ref: 0049520D
                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0049521A
                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0049524D
                  • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00495287
                  • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00495296
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                  • String ID:
                  • API String ID: 3210457359-0
                  • Opcode ID: 63f8fce6ee56eb2916ba1f5880f577bd9ce9be7d31bf0783226abd7592391d9a
                  • Instruction ID: 2f6ec6b9a940971946aba6a87621bbb08546372b017322c8b31ba23090961908
                  • Opcode Fuzzy Hash: 63f8fce6ee56eb2916ba1f5880f577bd9ce9be7d31bf0783226abd7592391d9a
                  • Instruction Fuzzy Hash: F3519F30A40A08BEEF229F65CC46BD93F65AB05325F344077FA25962E0C379A981DF49
                  APIs
                  • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00456890
                  • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 004568A9
                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 004568B9
                  • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 004568D1
                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 004568F2
                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00418874,00000000,00000000,00000000,000000FF,00000000), ref: 00456901
                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0045691E
                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00418874,00000000,00000000,00000000,000000FF,00000000), ref: 0045692D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Icon$DestroyExtractImageLoadMessageSend
                  • String ID:
                  • API String ID: 1268354404-0
                  • Opcode ID: d63c51336c4034a1745d8c490dd669fa66d818d99361f70e4bdf35798142b978
                  • Instruction ID: 5ced514379628bb0f67f0973741f5ab2a5dfa9bdd961912c2b7f256765f21f3b
                  • Opcode Fuzzy Hash: d63c51336c4034a1745d8c490dd669fa66d818d99361f70e4bdf35798142b978
                  • Instruction Fuzzy Hash: 60518CB0600209EFDB20DF25CC91BAA7BB5FF54350F10452EF906972A0DB78E991DB58
                  APIs
                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0047C182
                  • GetLastError.KERNEL32 ref: 0047C195
                  • SetEvent.KERNEL32(?), ref: 0047C1A9
                    • Part of subcall function 0047C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047C272
                    • Part of subcall function 0047C253: GetLastError.KERNEL32 ref: 0047C322
                    • Part of subcall function 0047C253: SetEvent.KERNEL32(?), ref: 0047C336
                    • Part of subcall function 0047C253: InternetCloseHandle.WININET(00000000), ref: 0047C341
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                  • String ID:
                  • API String ID: 337547030-0
                  • Opcode ID: 05408d45139247b7bcb9b0ab34475d6da33b465ea748379226b62031ee06977d
                  • Instruction ID: ad223e64a256ba6d622a408250f1e533b8ca103c90cb607afc9d9c604c5bfcdd
                  • Opcode Fuzzy Hash: 05408d45139247b7bcb9b0ab34475d6da33b465ea748379226b62031ee06977d
                  • Instruction Fuzzy Hash: 3931A171900601AFDB219FA5DD84AA7BBF9FF28300B00847FF95A82611C734E8109FA8
                  APIs
                    • Part of subcall function 00463A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00463A57
                    • Part of subcall function 00463A3D: GetCurrentThreadId.KERNEL32 ref: 00463A5E
                    • Part of subcall function 00463A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004625B3), ref: 00463A65
                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 004625BD
                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004625DB
                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 004625DF
                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 004625E9
                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00462601
                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00462605
                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 0046260F
                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00462623
                  • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00462627
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                  • String ID:
                  • API String ID: 2014098862-0
                  • Opcode ID: 2f4d1fdb8c17c331799828f8887b12a5bf7f082a9617624e6a7c48990999124f
                  • Instruction ID: 659e0465d2e936b2535ace8495fd7f55644899dc4765ae7d9b52ae139348cc60
                  • Opcode Fuzzy Hash: 2f4d1fdb8c17c331799828f8887b12a5bf7f082a9617624e6a7c48990999124f
                  • Instruction Fuzzy Hash: 5E01B530290610BBFB1067699CCAF593E59DF9AB52F100026F314AE0D1C9E11444DA6E
                  APIs
                  • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00461449,?,?,00000000), ref: 0046180C
                  • HeapAlloc.KERNEL32(00000000,?,00461449,?,?,00000000), ref: 00461813
                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00461449,?,?,00000000), ref: 00461828
                  • GetCurrentProcess.KERNEL32(?,00000000,?,00461449,?,?,00000000), ref: 00461830
                  • DuplicateHandle.KERNEL32(00000000,?,00461449,?,?,00000000), ref: 00461833
                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00461449,?,?,00000000), ref: 00461843
                  • GetCurrentProcess.KERNEL32(00461449,00000000,?,00461449,?,?,00000000), ref: 0046184B
                  • DuplicateHandle.KERNEL32(00000000,?,00461449,?,?,00000000), ref: 0046184E
                  • CreateThread.KERNEL32(00000000,00000000,00461874,00000000,00000000,00000000), ref: 00461868
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                  • String ID:
                  • API String ID: 1957940570-0
                  • Opcode ID: 3295afeee8cc8c7093bf6fe07bd8220d614ae4baa1aa8168f6bf151d454cb0f3
                  • Instruction ID: b364dd57c3a3bf7db4e02ab8b84294dee306902c98affd7dc5dc9744fb0d4595
                  • Opcode Fuzzy Hash: 3295afeee8cc8c7093bf6fe07bd8220d614ae4baa1aa8168f6bf151d454cb0f3
                  • Instruction Fuzzy Hash: 3101AC75240304BFE610AB65DD8AF5B3B6CEB99B11F404422FA05DB1A1D6749C008F38
                  APIs
                    • Part of subcall function 0046D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0046D501
                    • Part of subcall function 0046D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0046D50F
                    • Part of subcall function 0046D4DC: CloseHandle.KERNEL32(00000000), ref: 0046D5DC
                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0048A16D
                  • GetLastError.KERNEL32 ref: 0048A180
                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0048A1B3
                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 0048A268
                  • GetLastError.KERNEL32(00000000), ref: 0048A273
                  • CloseHandle.KERNEL32(00000000), ref: 0048A2C4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                  • String ID: SeDebugPrivilege
                  • API String ID: 2533919879-2896544425
                  • Opcode ID: 91a1d346542f3b818cfef32e4957358fa657d51a12c24dba774d987266b5289d
                  • Instruction ID: bbae0825d9504e816833fa2aec840b687267c384c8e474c3100c895eea3b3aa3
                  • Opcode Fuzzy Hash: 91a1d346542f3b818cfef32e4957358fa657d51a12c24dba774d987266b5289d
                  • Instruction Fuzzy Hash: C96180702042429FE720EF15C4D4F1ABBE1AF54318F18849EE4564B7A3C7BAEC55CB9A
                  APIs
                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00493925
                  • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0049393A
                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00493954
                  • _wcslen.LIBCMT ref: 00493999
                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 004939C6
                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 004939F4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$Window_wcslen
                  • String ID: SysListView32
                  • API String ID: 2147712094-78025650
                  • Opcode ID: 3ecd89782b7b5123188dbc6cfaf20b30c3abe0ff2b40ad5abd01ade34b70e5ea
                  • Instruction ID: 013bb0722e0a1e7de6f290400708e6d2b920f730889d4b40bdacc0df7213a591
                  • Opcode Fuzzy Hash: 3ecd89782b7b5123188dbc6cfaf20b30c3abe0ff2b40ad5abd01ade34b70e5ea
                  • Instruction Fuzzy Hash: 1B419271A00218ABDF21DF64CC45FEA7BA9EB09354F10053BF954A7291D7799D808B98
                  APIs
                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0046BCFD
                  • IsMenu.USER32(00000000), ref: 0046BD1D
                  • CreatePopupMenu.USER32 ref: 0046BD53
                  • GetMenuItemCount.USER32(00C96118), ref: 0046BDA4
                  • InsertMenuItemW.USER32(00C96118,?,00000001,00000030), ref: 0046BDCC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Menu$Item$CountCreateInfoInsertPopup
                  • String ID: 0$2
                  • API String ID: 93392585-3793063076
                  • Opcode ID: fc23f78126ae8f3c17f335ed2ee0a4bbf63056aa4ee57b4678f8e2eb18c6fe53
                  • Instruction ID: d2fe6743287e205c4ec621a8d721353cc11330f79cd585bc8e40e3a4eb8813f7
                  • Opcode Fuzzy Hash: fc23f78126ae8f3c17f335ed2ee0a4bbf63056aa4ee57b4678f8e2eb18c6fe53
                  • Instruction Fuzzy Hash: 7151C070600205ABDB11CFA9C8C4BAEBBF9EF45314F14412BE441DB291E7789981CB9B
                  APIs
                  • _ValidateLocalCookies.LIBCMT ref: 00422D4B
                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00422D53
                  • _ValidateLocalCookies.LIBCMT ref: 00422DE1
                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00422E0C
                  • _ValidateLocalCookies.LIBCMT ref: 00422E61
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                  • String ID: &HB$csm
                  • API String ID: 1170836740-430194703
                  • Opcode ID: 17a0005c6933a5144f9f8d8205935f8b0f75e75d15b2970b1a508403548e2111
                  • Instruction ID: 4818aa0c625e2817a00b2cc851399fe9171d4dad415be29509831b30a559dab0
                  • Opcode Fuzzy Hash: 17a0005c6933a5144f9f8d8205935f8b0f75e75d15b2970b1a508403548e2111
                  • Instruction Fuzzy Hash: CE41F734F00228ABCF10DF69D944A9FBBB0BF45328F94815BE8145B352D7799A01CB94
                  APIs
                  • LoadIconW.USER32(00000000,00007F03), ref: 0046C913
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: IconLoad
                  • String ID: blank$info$question$stop$warning
                  • API String ID: 2457776203-404129466
                  • Opcode ID: 2f3f6c772facaa6c2e88fc6b5b5e819e8bf7cb92eb527ae9d8b990f435669e35
                  • Instruction ID: bb0d5d1ca0b7b7549bd628b7d457241fa207a64defe98c7702ddfa90c16ab9c0
                  • Opcode Fuzzy Hash: 2f3f6c772facaa6c2e88fc6b5b5e819e8bf7cb92eb527ae9d8b990f435669e35
                  • Instruction Fuzzy Hash: CA115B75789306BAA704AB10ACC2EBB239CCF15318B60003FF444A6282FB7C5D0052AE
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$LocalTime
                  • String ID:
                  • API String ID: 952045576-0
                  • Opcode ID: a420661d227a2c7768e02056e3bc6b955d7d94d0c3ec397bd8422308fd40afbd
                  • Instruction ID: 4f8958e37ec1e81abdee0eef7bf6fc4addebcbdb16e8410d4e2bf860027f3b8a
                  • Opcode Fuzzy Hash: a420661d227a2c7768e02056e3bc6b955d7d94d0c3ec397bd8422308fd40afbd
                  • Instruction Fuzzy Hash: 9241A465D10128B5CB11EBB6D88A9CF77A8AF45310F904467E514E3161FB38E245C3AE
                  APIs
                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0045682C,00000004,00000000,00000000), ref: 0041F953
                  • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0045682C,00000004,00000000,00000000), ref: 0045F3D1
                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0045682C,00000004,00000000,00000000), ref: 0045F454
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ShowWindow
                  • String ID:
                  • API String ID: 1268545403-0
                  • Opcode ID: 4097de2063e2d903274c254244b3b6af1c99affe0ef641e9fa623c96fc32751a
                  • Instruction ID: 10a6b06008afa1e2328434a854a09bd47367bc282bad862656ef31b7fbd0d56e
                  • Opcode Fuzzy Hash: 4097de2063e2d903274c254244b3b6af1c99affe0ef641e9fa623c96fc32751a
                  • Instruction Fuzzy Hash: 4D415FB0118640BAD734AB29C8887AB7B916B56325F58443FE44752761C63D98CFCB1E
                  APIs
                  • DeleteObject.GDI32(00000000), ref: 00492D1B
                  • GetDC.USER32(00000000), ref: 00492D23
                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00492D2E
                  • ReleaseDC.USER32(00000000,00000000), ref: 00492D3A
                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00492D76
                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00492D87
                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00495A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00492DC2
                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00492DE1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                  • String ID:
                  • API String ID: 3864802216-0
                  • Opcode ID: 40775b777a9ed974af0fa6005f63a35fd003ccd795d9b9edb304a55b101f72ec
                  • Instruction ID: c014384b98ff002bb39f8f228335d4e310598615e16fec949adeca6e26dd830f
                  • Opcode Fuzzy Hash: 40775b777a9ed974af0fa6005f63a35fd003ccd795d9b9edb304a55b101f72ec
                  • Instruction Fuzzy Hash: 4F316B72201214BBEF118F508C8AFEB3FA9EB19755F044076FE089A291C6B59C51CBA8
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _memcmp
                  • String ID:
                  • API String ID: 2931989736-0
                  • Opcode ID: f574267dd208e8414daf43423a911871f3c4da1cc2f54f3bbf8c3215cc0c872d
                  • Instruction ID: e0219283109e526c755bfb0067b1299e64ae9441197aa3b019e1f6381a1da279
                  • Opcode Fuzzy Hash: f574267dd208e8414daf43423a911871f3c4da1cc2f54f3bbf8c3215cc0c872d
                  • Instruction Fuzzy Hash: 2D219561740A197BE6149521DD82FBB235DAE20399F944037FD089AA81F72CED25C1AF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: NULL Pointer assignment$Not an Object type
                  • API String ID: 0-572801152
                  • Opcode ID: 04f164943aaf497c4b66bc9eafae9d181c66bb72785b5d391fc7d77ea212bbc8
                  • Instruction ID: 1bf2488d1df435c699735f151444ac7b81e52084c40feb6cc3c7295a9c6c286a
                  • Opcode Fuzzy Hash: 04f164943aaf497c4b66bc9eafae9d181c66bb72785b5d391fc7d77ea212bbc8
                  • Instruction Fuzzy Hash: DED1D375A0060A9FDF10EFA8C884BAEB7B5BF48344F14886AE915EB380E774DD45CB54
                  APIs
                  • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,004417FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 004415CE
                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004417FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00441651
                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,004417FB,?,004417FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004416E4
                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004417FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004416FB
                    • Part of subcall function 00433820: RtlAllocateHeap.NTDLL(00000000,?,004D1444,?,0041FDF5,?,?,0040A976,00000010,004D1440,004013FC,?,004013C6,?,00401129), ref: 00433852
                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004417FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00441777
                  • __freea.LIBCMT ref: 004417A2
                  • __freea.LIBCMT ref: 004417AE
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                  • String ID:
                  • API String ID: 2829977744-0
                  • Opcode ID: 0580935182319acf0986065053460dd0c5db5f7d2393057fb5d76a01597ff8fa
                  • Instruction ID: 61043d0715f82f9c83f994bef9256619e617f3eba19e56cad677481ceaf8c2f0
                  • Opcode Fuzzy Hash: 0580935182319acf0986065053460dd0c5db5f7d2393057fb5d76a01597ff8fa
                  • Instruction Fuzzy Hash: 8891B271E00216ABEB208E64C881EEF7BF59F49354F18466BE805E7261D73DDC81CB68
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$ClearInit
                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                  • API String ID: 2610073882-625585964
                  • Opcode ID: ac140e23675bb14214067e9e22e9b859db925955238518eeda0ebec4d2ee67ef
                  • Instruction ID: 302d8e85ba75092837d4fbd64c786191f5a26cbf20250f77e8306e51f43bb105
                  • Opcode Fuzzy Hash: ac140e23675bb14214067e9e22e9b859db925955238518eeda0ebec4d2ee67ef
                  • Instruction Fuzzy Hash: 9E917371A00216AFDF20DFA5C844FAF7BB8EF85714F10895AF505AB280D7789945CFA8
                  APIs
                  • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0047125C
                  • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00471284
                  • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 004712A8
                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004712D8
                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0047135F
                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004713C4
                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00471430
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ArraySafe$Data$Access$UnaccessVartype
                  • String ID:
                  • API String ID: 2550207440-0
                  • Opcode ID: 7f72667380810bfe83ac03ce95753f0bdbed7838e2ae56f3509da28350e74c75
                  • Instruction ID: eeb8a1cab3dcaf25cce9ef12d76c697ee4238524dd65f2955dc5ebd01ffaeda3
                  • Opcode Fuzzy Hash: 7f72667380810bfe83ac03ce95753f0bdbed7838e2ae56f3509da28350e74c75
                  • Instruction Fuzzy Hash: EE91F471A00218AFDB10DF99C884BFE77B5FF45314F14806BE905E72A2D778A941CB99
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ObjectSelect$BeginCreatePath
                  • String ID:
                  • API String ID: 3225163088-0
                  • Opcode ID: 4f211f78bc30ad95b27f5cb4d7f60e07ad57b5bd2944a6bdef5f2fc8962bcbbb
                  • Instruction ID: 5e354bf8666d2df3c288563dc956d0438b18d1603999bdd2ec6b7625199c5dc1
                  • Opcode Fuzzy Hash: 4f211f78bc30ad95b27f5cb4d7f60e07ad57b5bd2944a6bdef5f2fc8962bcbbb
                  • Instruction Fuzzy Hash: BB911771904219EFCB10CFA9C884AEEBBB9FF49320F14455AE915B7251D378AD82CB64
                  APIs
                  • VariantInit.OLEAUT32(?), ref: 0048396B
                  • CharUpperBuffW.USER32(?,?), ref: 00483A7A
                  • _wcslen.LIBCMT ref: 00483A8A
                  • VariantClear.OLEAUT32(?), ref: 00483C1F
                    • Part of subcall function 00470CDF: VariantInit.OLEAUT32(00000000), ref: 00470D1F
                    • Part of subcall function 00470CDF: VariantCopy.OLEAUT32(?,?), ref: 00470D28
                    • Part of subcall function 00470CDF: VariantClear.OLEAUT32(?), ref: 00470D34
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                  • API String ID: 4137639002-1221869570
                  • Opcode ID: 690b30ce57c808038e774699821501690e8f8ce31fc8d7f726ea9f59a978559d
                  • Instruction ID: 5ee05177af821d28c0339942000487e4f738c6e6fb7a355de418583010d04a9f
                  • Opcode Fuzzy Hash: 690b30ce57c808038e774699821501690e8f8ce31fc8d7f726ea9f59a978559d
                  • Instruction Fuzzy Hash: E89149756083059FC704EF25C48096EB7E4BF88719F14886EF88997351DB38EE46CB96
                  APIs
                    • Part of subcall function 0046000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?,?,?,0046035E), ref: 0046002B
                    • Part of subcall function 0046000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?,?), ref: 00460046
                    • Part of subcall function 0046000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?,?), ref: 00460054
                    • Part of subcall function 0046000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?), ref: 00460064
                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00484C51
                  • _wcslen.LIBCMT ref: 00484D59
                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00484DCF
                  • CoTaskMemFree.OLE32(?), ref: 00484DDA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                  • String ID: NULL Pointer assignment
                  • API String ID: 614568839-2785691316
                  • Opcode ID: 805fa7f04c465343740e9c92e99c2b8ea71e5eb3428725b1344ec4acb19ea1be
                  • Instruction ID: 34672b3efb296b58192750c7ded87718e57233607254ae5501f83e8b5ffc5208
                  • Opcode Fuzzy Hash: 805fa7f04c465343740e9c92e99c2b8ea71e5eb3428725b1344ec4acb19ea1be
                  • Instruction Fuzzy Hash: 6D912871D00219AFDF10EFA5D880AEEB7B8BF48304F10856AE915B7281EB385A45CF64
                  APIs
                  • GetMenu.USER32(?), ref: 00492183
                  • GetMenuItemCount.USER32(00000000), ref: 004921B5
                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004921DD
                  • _wcslen.LIBCMT ref: 00492213
                  • GetMenuItemID.USER32(?,?), ref: 0049224D
                  • GetSubMenu.USER32(?,?), ref: 0049225B
                    • Part of subcall function 00463A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00463A57
                    • Part of subcall function 00463A3D: GetCurrentThreadId.KERNEL32 ref: 00463A5E
                    • Part of subcall function 00463A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004625B3), ref: 00463A65
                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004922E3
                    • Part of subcall function 0046E97B: Sleep.KERNEL32 ref: 0046E9F3
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                  • String ID:
                  • API String ID: 4196846111-0
                  • Opcode ID: 8d4e3de8c2f1fbb50e88d52abeb75c2742586b86a19a2b679d60c6708a1c4693
                  • Instruction ID: 1805a0cc69fbbb964e15b8a736a655253a014d7244d3b62ceb63d91bf63e25d0
                  • Opcode Fuzzy Hash: 8d4e3de8c2f1fbb50e88d52abeb75c2742586b86a19a2b679d60c6708a1c4693
                  • Instruction Fuzzy Hash: 2A719075A00215AFCF10DF65C981AAEBBF1EF48314F1484BAE816EB341D778ED418B95
                  APIs
                  • GetParent.USER32(?), ref: 0046AEF9
                  • GetKeyboardState.USER32(?), ref: 0046AF0E
                  • SetKeyboardState.USER32(?), ref: 0046AF6F
                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 0046AF9D
                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 0046AFBC
                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 0046AFFD
                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0046B020
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessagePost$KeyboardState$Parent
                  • String ID:
                  • API String ID: 87235514-0
                  • Opcode ID: 8ba9329f5e92e9aafe7d6210d21796c70848bd923dbcc46e916c1a158f3e09e2
                  • Instruction ID: 9924b26ac272194e3fc2510f454a83dab54fe79ae351ef58dbb63b9bc59f5407
                  • Opcode Fuzzy Hash: 8ba9329f5e92e9aafe7d6210d21796c70848bd923dbcc46e916c1a158f3e09e2
                  • Instruction Fuzzy Hash: 7B51C3A0A047D53DFB3682348845BBB7EE99B06304F08848AE1D5955C3E3ADACD4D79B
                  APIs
                  • GetParent.USER32(00000000), ref: 0046AD19
                  • GetKeyboardState.USER32(?), ref: 0046AD2E
                  • SetKeyboardState.USER32(?), ref: 0046AD8F
                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0046ADBB
                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0046ADD8
                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0046AE17
                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0046AE38
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessagePost$KeyboardState$Parent
                  • String ID:
                  • API String ID: 87235514-0
                  • Opcode ID: a843fa4b37df1311c615547b8d4ddbcfaa844942cebff1219c35041fbe4f6eb7
                  • Instruction ID: e772fa98876e3abb59c89613fc69063f5804bceb421966d291ff7e32e81c25bc
                  • Opcode Fuzzy Hash: a843fa4b37df1311c615547b8d4ddbcfaa844942cebff1219c35041fbe4f6eb7
                  • Instruction Fuzzy Hash: EF5108A0644BD13DFB328334CC95B7B7ED95B05300F08848AE1D5659C2E399ECA4DB5B
                  APIs
                  • GetConsoleCP.KERNEL32(00443CD6,?,?,?,?,?,?,?,?,00435BA3,?,?,00443CD6,?,?), ref: 00435470
                  • __fassign.LIBCMT ref: 004354EB
                  • __fassign.LIBCMT ref: 00435506
                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00443CD6,00000005,00000000,00000000), ref: 0043552C
                  • WriteFile.KERNEL32(?,00443CD6,00000000,00435BA3,00000000,?,?,?,?,?,?,?,?,?,00435BA3,?), ref: 0043554B
                  • WriteFile.KERNEL32(?,?,00000001,00435BA3,00000000,?,?,?,?,?,?,?,?,?,00435BA3,?), ref: 00435584
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                  • String ID:
                  • API String ID: 1324828854-0
                  • Opcode ID: 7850a60d81c923c6729269c404aade9b900cc1d094dee1c2b49cd7d090460185
                  • Instruction ID: 03b2d8e156cb616675dc9e509242e86edbd9154058664cc16284d0fe897106b2
                  • Opcode Fuzzy Hash: 7850a60d81c923c6729269c404aade9b900cc1d094dee1c2b49cd7d090460185
                  • Instruction Fuzzy Hash: 4A51C570900649AFDB10CFA8D885AEEBBF9EF0D300F14552BF955E7291D734AA41CB68
                  APIs
                    • Part of subcall function 0048304E: inet_addr.WSOCK32(?), ref: 0048307A
                    • Part of subcall function 0048304E: _wcslen.LIBCMT ref: 0048309B
                  • socket.WSOCK32(00000002,00000001,00000006), ref: 00481112
                  • WSAGetLastError.WSOCK32 ref: 00481121
                  • WSAGetLastError.WSOCK32 ref: 004811C9
                  • closesocket.WSOCK32(00000000), ref: 004811F9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                  • String ID:
                  • API String ID: 2675159561-0
                  • Opcode ID: dbd23f55031ac0a013bbd3399b20094ebf9ac1a4033711b01e9060edf7a4063a
                  • Instruction ID: 705474394c914199550c23bc0cacf20d47ff7b262d5d4d6d2dda95f8d1e63c40
                  • Opcode Fuzzy Hash: dbd23f55031ac0a013bbd3399b20094ebf9ac1a4033711b01e9060edf7a4063a
                  • Instruction Fuzzy Hash: 4241C831600104AFD710AF54C888BAEB7E9EF45358F14856BF9159B2E1C778AD42CBE9
                  APIs
                    • Part of subcall function 0046DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0046CF22,?), ref: 0046DDFD
                    • Part of subcall function 0046DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0046CF22,?), ref: 0046DE16
                  • lstrcmpiW.KERNEL32(?,?), ref: 0046CF45
                  • MoveFileW.KERNEL32(?,?), ref: 0046CF7F
                  • _wcslen.LIBCMT ref: 0046D005
                  • _wcslen.LIBCMT ref: 0046D01B
                  • SHFileOperationW.SHELL32(?), ref: 0046D061
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                  • String ID: \*.*
                  • API String ID: 3164238972-1173974218
                  • Opcode ID: 46f710d8293719b9c6cfa25800096bd3e801fa08a52bb9c5e2e18d91c6c6bf5f
                  • Instruction ID: 30fb1ba172d36164f734a964d5767b00f9f23bd7893fd7b2338ade8b969c747b
                  • Opcode Fuzzy Hash: 46f710d8293719b9c6cfa25800096bd3e801fa08a52bb9c5e2e18d91c6c6bf5f
                  • Instruction Fuzzy Hash: 7F416771D051189FDF16EBA5D981AEEB7B8AF08384F0000EBE545E7141FA38A684CB59
                  APIs
                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00492E1C
                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00492E4F
                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00492E84
                  • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00492EB6
                  • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00492EE0
                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00492EF1
                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00492F0B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LongWindow$MessageSend
                  • String ID:
                  • API String ID: 2178440468-0
                  • Opcode ID: fe423517453c25fbcdae921af8a04fbdf3df099c7ed61434985df7eec3b91bed
                  • Instruction ID: 89252755f0c39dde2eed47c772f1032802557b1e9df75e8823ace49cd181d258
                  • Opcode Fuzzy Hash: fe423517453c25fbcdae921af8a04fbdf3df099c7ed61434985df7eec3b91bed
                  • Instruction Fuzzy Hash: AF310035605250AFEF21CF18DED4F663BA0EB9A710F1501B6F9048B2B2CBA5AC40DB59
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00467769
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0046778F
                  • SysAllocString.OLEAUT32(00000000), ref: 00467792
                  • SysAllocString.OLEAUT32(?), ref: 004677B0
                  • SysFreeString.OLEAUT32(?), ref: 004677B9
                  • StringFromGUID2.OLE32(?,?,00000028), ref: 004677DE
                  • SysAllocString.OLEAUT32(?), ref: 004677EC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                  • String ID:
                  • API String ID: 3761583154-0
                  • Opcode ID: a6c9bd8fc0098c0aa2ac031152d4c288d08c39061c019954cd450baa0328975b
                  • Instruction ID: 1347edb73164e8fdaf58e89a1e73af5f76d8f2b3629143057cc2d6e93ba64612
                  • Opcode Fuzzy Hash: a6c9bd8fc0098c0aa2ac031152d4c288d08c39061c019954cd450baa0328975b
                  • Instruction Fuzzy Hash: 1121C476604219AFDF10DFA8CD88CBB77ACEB093697048037F904DB250E678EC418B69
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00467842
                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00467868
                  • SysAllocString.OLEAUT32(00000000), ref: 0046786B
                  • SysAllocString.OLEAUT32 ref: 0046788C
                  • SysFreeString.OLEAUT32 ref: 00467895
                  • StringFromGUID2.OLE32(?,?,00000028), ref: 004678AF
                  • SysAllocString.OLEAUT32(?), ref: 004678BD
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                  • String ID:
                  • API String ID: 3761583154-0
                  • Opcode ID: 707ae9666ae7516db46652daa0f733c5e2dfba58e96e26974dc6f4f3f5fdd8d4
                  • Instruction ID: 65347bf14241952f6fe516d953df497e863d0a2c9858df12de4266c5492117f8
                  • Opcode Fuzzy Hash: 707ae9666ae7516db46652daa0f733c5e2dfba58e96e26974dc6f4f3f5fdd8d4
                  • Instruction Fuzzy Hash: E4217471608204AFDB10AFB8DC88DAB77ECEB097647108136F915CB2A1E674DC85CB6D
                  APIs
                  • GetStdHandle.KERNEL32(0000000C), ref: 004704F2
                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0047052E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateHandlePipe
                  • String ID: nul
                  • API String ID: 1424370930-2873401336
                  • Opcode ID: 6a902a1a203d2ba6554c9156c2122f106e0b0ece3aef374871c2a7a7205a7d7c
                  • Instruction ID: 37ebc47a503473eab46a6a662aa34668f64f5ef64e3e21c44b32a32161578eff
                  • Opcode Fuzzy Hash: 6a902a1a203d2ba6554c9156c2122f106e0b0ece3aef374871c2a7a7205a7d7c
                  • Instruction Fuzzy Hash: 58216D75501305EBDB20DF29DC45ADA7BA8AF54724F208A2AF8A9D62E0D7749940CF28
                  APIs
                  • GetStdHandle.KERNEL32(000000F6), ref: 004705C6
                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00470601
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateHandlePipe
                  • String ID: nul
                  • API String ID: 1424370930-2873401336
                  • Opcode ID: 7a4e311930e80124f8ce9cad65942f1111aa2e8cf77577d7e27b56d82681dd65
                  • Instruction ID: d6020922c6df84973a4937718467039e5c324196057f4af472b7a3e10f2118b5
                  • Opcode Fuzzy Hash: 7a4e311930e80124f8ce9cad65942f1111aa2e8cf77577d7e27b56d82681dd65
                  • Instruction Fuzzy Hash: 3521D375501301DBDB208F698C54ADB77E8AF91724F208A2BF8A5E33D0D7749860CB28
                  APIs
                    • Part of subcall function 0040600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0040604C
                    • Part of subcall function 0040600E: GetStockObject.GDI32(00000011), ref: 00406060
                    • Part of subcall function 0040600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0040606A
                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00494112
                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0049411F
                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0049412A
                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00494139
                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00494145
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$CreateObjectStockWindow
                  • String ID: Msctls_Progress32
                  • API String ID: 1025951953-3636473452
                  • Opcode ID: c50fb4c64ff722785e59701b13b36032d6ebc45d8e81b9d85d95dbe7338d2343
                  • Instruction ID: 7e299372ae2737e93466ee5066a8a0b4e73a7db95b0c4324f016d70e89fb52b2
                  • Opcode Fuzzy Hash: c50fb4c64ff722785e59701b13b36032d6ebc45d8e81b9d85d95dbe7338d2343
                  • Instruction Fuzzy Hash: 4C11B6B21401197EEF119F64CC86EE77F5DEF08798F014121BA18A2150C7769C21DBA8
                  APIs
                    • Part of subcall function 0043D7A3: _free.LIBCMT ref: 0043D7CC
                  • _free.LIBCMT ref: 0043D82D
                    • Part of subcall function 004329C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000), ref: 004329DE
                    • Part of subcall function 004329C8: GetLastError.KERNEL32(00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000,00000000), ref: 004329F0
                  • _free.LIBCMT ref: 0043D838
                  • _free.LIBCMT ref: 0043D843
                  • _free.LIBCMT ref: 0043D897
                  • _free.LIBCMT ref: 0043D8A2
                  • _free.LIBCMT ref: 0043D8AD
                  • _free.LIBCMT ref: 0043D8B8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                  • Instruction ID: 9628da1ed74816b1ddcfb1054e77e28d2c59f3be18865d584421ffa251c1dadf
                  • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                  • Instruction Fuzzy Hash: 1D1181B1E40B14AAD521BFB2EC07FCB7BDC6F08714F40182EB699A6292DB6CB5054654
                  APIs
                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0046DA74
                  • LoadStringW.USER32(00000000), ref: 0046DA7B
                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0046DA91
                  • LoadStringW.USER32(00000000), ref: 0046DA98
                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0046DADC
                  Strings
                  • %s (%d) : ==> %s: %s %s, xrefs: 0046DAB9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: HandleLoadModuleString$Message
                  • String ID: %s (%d) : ==> %s: %s %s
                  • API String ID: 4072794657-3128320259
                  • Opcode ID: a664e4c0c5d0b2bfc634795dffc340d7692c6f5ea088f5bb81d31c5d349e3951
                  • Instruction ID: cb2a43e863df41e6e3ad7029f784b5340023d8d1d8bc7ce810eda679f6cd2114
                  • Opcode Fuzzy Hash: a664e4c0c5d0b2bfc634795dffc340d7692c6f5ea088f5bb81d31c5d349e3951
                  • Instruction Fuzzy Hash: 39012CF69042087FEB109BA09D89EE6366CE708701F4044B7B706E2041E6749E844F79
                  APIs
                  • InterlockedExchange.KERNEL32(00C8DD68,00C8DD68), ref: 0047097B
                  • EnterCriticalSection.KERNEL32(00C8DD48,00000000), ref: 0047098D
                  • TerminateThread.KERNEL32(00540050,000001F6), ref: 0047099B
                  • WaitForSingleObject.KERNEL32(00540050,000003E8), ref: 004709A9
                  • CloseHandle.KERNEL32(00540050), ref: 004709B8
                  • InterlockedExchange.KERNEL32(00C8DD68,000001F6), ref: 004709C8
                  • LeaveCriticalSection.KERNEL32(00C8DD48), ref: 004709CF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                  • String ID:
                  • API String ID: 3495660284-0
                  • Opcode ID: c272fcceccc6d7f61d08d54095e9131f7c27ba34da8304be91edf383ae243266
                  • Instruction ID: e7a7eacf21cf0797fa893d880d775a5ec980312bda4ea9f6b004330434e4aea7
                  • Opcode Fuzzy Hash: c272fcceccc6d7f61d08d54095e9131f7c27ba34da8304be91edf383ae243266
                  • Instruction Fuzzy Hash: ADF01D71442902EBD7515BA4EEC9AD67A25BF51702F801037F201508A0C775A465CFA8
                  APIs
                  • __allrem.LIBCMT ref: 004300BA
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004300D6
                  • __allrem.LIBCMT ref: 004300ED
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043010B
                  • __allrem.LIBCMT ref: 00430122
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00430140
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                  • String ID:
                  • API String ID: 1992179935-0
                  • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                  • Instruction ID: 082c97b854335830c01b3ff9a8a46d3891636cb8aaeecd51a324f571a9ad5372
                  • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                  • Instruction Fuzzy Hash: 19813472B00B169BEB249A29DC51B6B73F8AF49328F64423FF550D7781E778D9008798
                  APIs
                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,004282D9,004282D9,?,?,?,0043644F,00000001,00000001,8BE85006), ref: 00436258
                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0043644F,00000001,00000001,8BE85006,?,?,?), ref: 004362DE
                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004363D8
                  • __freea.LIBCMT ref: 004363E5
                    • Part of subcall function 00433820: RtlAllocateHeap.NTDLL(00000000,?,004D1444,?,0041FDF5,?,?,0040A976,00000010,004D1440,004013FC,?,004013C6,?,00401129), ref: 00433852
                  • __freea.LIBCMT ref: 004363EE
                  • __freea.LIBCMT ref: 00436413
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                  • String ID:
                  • API String ID: 1414292761-0
                  • Opcode ID: 1209449369a141f218ea762d0ca84d0722408024e3814443191bd0c5c44e8fa8
                  • Instruction ID: 00415eec5666cb23733ad8e989fef993a8383569e9390185dd5525917ea16664
                  • Opcode Fuzzy Hash: 1209449369a141f218ea762d0ca84d0722408024e3814443191bd0c5c44e8fa8
                  • Instruction Fuzzy Hash: 4151F472A00217BBEB259F64CC81EBF77A9EF48714F16962AFC05D6241DB38DC40C668
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                    • Part of subcall function 0048C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0048B6AE,?,?), ref: 0048C9B5
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048C9F1
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048CA68
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048CA9E
                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0048BCCA
                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0048BD25
                  • RegCloseKey.ADVAPI32(00000000), ref: 0048BD6A
                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0048BD99
                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0048BDF3
                  • RegCloseKey.ADVAPI32(?), ref: 0048BDFF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                  • String ID:
                  • API String ID: 1120388591-0
                  • Opcode ID: 52879733c9f91df2255d09af2a88d47b29303882c72c53975a58d404b4cabe8e
                  • Instruction ID: 66867387895693e3d3c5b46cb5408c9a4ea2bc678d8421b78e890b6d7f12048b
                  • Opcode Fuzzy Hash: 52879733c9f91df2255d09af2a88d47b29303882c72c53975a58d404b4cabe8e
                  • Instruction Fuzzy Hash: B4818D70208241AFD714EF24C891E2BBBE5FF84308F14896EF4594B2A2DB35ED45CB96
                  APIs
                  • VariantInit.OLEAUT32(00000035), ref: 0045F7B9
                  • SysAllocString.OLEAUT32(00000001), ref: 0045F860
                  • VariantCopy.OLEAUT32(0045FA64,00000000), ref: 0045F889
                  • VariantClear.OLEAUT32(0045FA64), ref: 0045F8AD
                  • VariantCopy.OLEAUT32(0045FA64,00000000), ref: 0045F8B1
                  • VariantClear.OLEAUT32(?), ref: 0045F8BB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$ClearCopy$AllocInitString
                  • String ID:
                  • API String ID: 3859894641-0
                  • Opcode ID: 8464a39d859a127f84f550e53cba53dc195430a0e78e7046eea1524d95f52ba1
                  • Instruction ID: fad3531c477c6a02c86f7eb964f9f53b5c2f0619bb92a20d51ab317aa8b873ef
                  • Opcode Fuzzy Hash: 8464a39d859a127f84f550e53cba53dc195430a0e78e7046eea1524d95f52ba1
                  • Instruction Fuzzy Hash: 5E51A371600310ABCF106B66D895B29B3A8EF45315B24847BED06DF293DB789C8D879F
                  APIs
                    • Part of subcall function 00407620: _wcslen.LIBCMT ref: 00407625
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                  • GetOpenFileNameW.COMDLG32(00000058), ref: 004794E5
                  • _wcslen.LIBCMT ref: 00479506
                  • _wcslen.LIBCMT ref: 0047952D
                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00479585
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$FileName$OpenSave
                  • String ID: X
                  • API String ID: 83654149-3081909835
                  • Opcode ID: 28146a6108c27a045355e57ec61a2cdf085534550efc8881065475766990f8e9
                  • Instruction ID: f9c8aca44ffe02e8de6b54035f4c347787dd5f254e66c9c0782f12f4ab8f18d5
                  • Opcode Fuzzy Hash: 28146a6108c27a045355e57ec61a2cdf085534550efc8881065475766990f8e9
                  • Instruction Fuzzy Hash: 48E1A5315083109FD714EF25C881AAAB7E4FF85318F04896EF8899B392DB34DD05CB9A
                  APIs
                    • Part of subcall function 00419BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00419BB2
                  • BeginPaint.USER32(?,?,?), ref: 00419241
                  • GetWindowRect.USER32(?,?), ref: 004192A5
                  • ScreenToClient.USER32(?,?), ref: 004192C2
                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 004192D3
                  • EndPaint.USER32(?,?,?,?,?), ref: 00419321
                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004571EA
                    • Part of subcall function 00419339: BeginPath.GDI32(00000000), ref: 00419357
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                  • String ID:
                  • API String ID: 3050599898-0
                  • Opcode ID: e5d6b84a52f782b2fb308e5e2c2c967a2313def70907e618fda16057d2da507d
                  • Instruction ID: 4f764ae9922d03d679b2e388ac5059885de830c2255333fd05545b5e445d6b2d
                  • Opcode Fuzzy Hash: e5d6b84a52f782b2fb308e5e2c2c967a2313def70907e618fda16057d2da507d
                  • Instruction Fuzzy Hash: 7941AF70105200AFD710DF65DCA4FAA7BA8EB59325F04067BFD64872B2C7349C85DB6A
                  APIs
                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 0047080C
                  • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00470847
                  • EnterCriticalSection.KERNEL32(?), ref: 00470863
                  • LeaveCriticalSection.KERNEL32(?), ref: 004708DC
                  • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 004708F3
                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00470921
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                  • String ID:
                  • API String ID: 3368777196-0
                  • Opcode ID: 51f080702d34bee41d72098e715618b13328fb2921cff1416bc148081afd3483
                  • Instruction ID: 2bf16e88385f0d526a50965f8e6b83eeec02fa5b23a39e33bc05af52056d0848
                  • Opcode Fuzzy Hash: 51f080702d34bee41d72098e715618b13328fb2921cff1416bc148081afd3483
                  • Instruction Fuzzy Hash: 63416B71A00205EFDF14AF55DC85AAA77B8FF04304F1480BAED049A297DB34DE65DBA8
                  APIs
                  • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0045F3AB,00000000,?,?,00000000,?,0045682C,00000004,00000000,00000000), ref: 0049824C
                  • EnableWindow.USER32(00000000,00000000), ref: 00498272
                  • ShowWindow.USER32(FFFFFFFF,00000000), ref: 004982D1
                  • ShowWindow.USER32(00000000,00000004), ref: 004982E5
                  • EnableWindow.USER32(00000000,00000001), ref: 0049830B
                  • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0049832F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Show$Enable$MessageSend
                  • String ID:
                  • API String ID: 642888154-0
                  • Opcode ID: 42e7f4963a8afe54bfbb12e54d65d3cc8dc09abdcee0118ae871e9cfb65851b4
                  • Instruction ID: dc6b8b90b41af4a5bb97c5c9f48c87ff949981370308f279306f208454a512ee
                  • Opcode Fuzzy Hash: 42e7f4963a8afe54bfbb12e54d65d3cc8dc09abdcee0118ae871e9cfb65851b4
                  • Instruction Fuzzy Hash: 52417074601644AFDF21CF19C899BA57FE0BB4B714F1841FEE9084B272CB36A841CB58
                  APIs
                  • IsWindowVisible.USER32(?), ref: 00464C95
                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00464CB2
                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00464CEA
                  • _wcslen.LIBCMT ref: 00464D08
                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00464D10
                  • _wcsstr.LIBVCRUNTIME ref: 00464D1A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                  • String ID:
                  • API String ID: 72514467-0
                  • Opcode ID: ce908e871c3622259a0b6e1049d3f041aff0f8789e6fb882f6a6a7032b497339
                  • Instruction ID: 464251b75fc9d2c55dfd6984dfe7a6015da58f2d422b8e3497c08f751bee6539
                  • Opcode Fuzzy Hash: ce908e871c3622259a0b6e1049d3f041aff0f8789e6fb882f6a6a7032b497339
                  • Instruction Fuzzy Hash: 7E212972604210BBEF155B36AC49E7B7B9CDF95750F10403FF805CA291EA69CC4192A9
                  APIs
                    • Part of subcall function 00403AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00403A97,?,?,00402E7F,?,?,?,00000000), ref: 00403AC2
                  • _wcslen.LIBCMT ref: 0047587B
                  • CoInitialize.OLE32(00000000), ref: 00475995
                  • CoCreateInstance.OLE32(0049FCF8,00000000,00000001,0049FB68,?), ref: 004759AE
                  • CoUninitialize.OLE32 ref: 004759CC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                  • String ID: .lnk
                  • API String ID: 3172280962-24824748
                  • Opcode ID: 14366bc2929af0f7973c6ac102d43ed3d529afee1c66802db9191eb9b24067af
                  • Instruction ID: 936ccbb4a6bc0a7597216a995219925d773478aa535829475d81f68a9eda2d51
                  • Opcode Fuzzy Hash: 14366bc2929af0f7973c6ac102d43ed3d529afee1c66802db9191eb9b24067af
                  • Instruction Fuzzy Hash: B3D166B06047019FC704DF25C480A6ABBE5FF89718F14886EF8899B3A1D779EC45CB96
                  APIs
                    • Part of subcall function 00460FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00460FCA
                    • Part of subcall function 00460FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00460FD6
                    • Part of subcall function 00460FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00460FE5
                    • Part of subcall function 00460FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00460FEC
                    • Part of subcall function 00460FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00461002
                  • GetLengthSid.ADVAPI32(?,00000000,00461335), ref: 004617AE
                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004617BA
                  • HeapAlloc.KERNEL32(00000000), ref: 004617C1
                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 004617DA
                  • GetProcessHeap.KERNEL32(00000000,00000000,00461335), ref: 004617EE
                  • HeapFree.KERNEL32(00000000), ref: 004617F5
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                  • String ID:
                  • API String ID: 3008561057-0
                  • Opcode ID: 0217f33d3a09f36f6fd57d8d795c311aac87a1b448ea70626e62691d88011ea3
                  • Instruction ID: f7763e6a00078c504dd556e881d6e2e8fceb37f6314b3f51a0856c51d334f811
                  • Opcode Fuzzy Hash: 0217f33d3a09f36f6fd57d8d795c311aac87a1b448ea70626e62691d88011ea3
                  • Instruction Fuzzy Hash: D611D031500205FFDB109FA4CC89BAFBBB9EF42356F18402AF44197220E739AA40CB69
                  APIs
                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004614FF
                  • OpenProcessToken.ADVAPI32(00000000), ref: 00461506
                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00461515
                  • CloseHandle.KERNEL32(00000004), ref: 00461520
                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0046154F
                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00461563
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                  • String ID:
                  • API String ID: 1413079979-0
                  • Opcode ID: 0004ec5b68ba4ca5e08fe2f58a29e972c16729a28a51e0587da2401d2513db42
                  • Instruction ID: 8ad008c533a390392ba9902b6fce0b931663af64d2e56dd3b277a9d789bafa8b
                  • Opcode Fuzzy Hash: 0004ec5b68ba4ca5e08fe2f58a29e972c16729a28a51e0587da2401d2513db42
                  • Instruction Fuzzy Hash: DB115972501209BBDF118FA8EE89BDE7BA9EF48744F084026FA05A2160D3758E60DB65
                  APIs
                  • GetLastError.KERNEL32(?,?,00423379,00422FE5), ref: 00423390
                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0042339E
                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004233B7
                  • SetLastError.KERNEL32(00000000,?,00423379,00422FE5), ref: 00423409
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLastValue___vcrt_
                  • String ID:
                  • API String ID: 3852720340-0
                  • Opcode ID: a32605ef527eaa469144d2134be0da9f5a51a31bd8af4ba380e7972ee934d743
                  • Instruction ID: e20225832f620dfe49ce4b56b4c60c5507e4676c0e6068a5d99a8cdab85c0515
                  • Opcode Fuzzy Hash: a32605ef527eaa469144d2134be0da9f5a51a31bd8af4ba380e7972ee934d743
                  • Instruction Fuzzy Hash: 4201D232308331AAA6242BB67CC5A272AA8EB1577A7A0027FF810802F1EE1D4E02514C
                  APIs
                  • GetLastError.KERNEL32(?,?,00435686,00443CD6,?,00000000,?,00435B6A,?,?,?,?,?,0042E6D1,?,004C8A48), ref: 00432D78
                  • _free.LIBCMT ref: 00432DAB
                  • _free.LIBCMT ref: 00432DD3
                  • SetLastError.KERNEL32(00000000,?,?,?,?,0042E6D1,?,004C8A48,00000010,00404F4A,?,?,00000000,00443CD6), ref: 00432DE0
                  • SetLastError.KERNEL32(00000000,?,?,?,?,0042E6D1,?,004C8A48,00000010,00404F4A,?,?,00000000,00443CD6), ref: 00432DEC
                  • _abort.LIBCMT ref: 00432DF2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLast$_free$_abort
                  • String ID:
                  • API String ID: 3160817290-0
                  • Opcode ID: 5e0add9b765b87a898494888a9c51f6034469cae76b700c4ba7ec96355a0c39e
                  • Instruction ID: bc5def4ff60a7aec5a6b9e7cc89536806b7c65568b5938bd00be58f42aabd56c
                  • Opcode Fuzzy Hash: 5e0add9b765b87a898494888a9c51f6034469cae76b700c4ba7ec96355a0c39e
                  • Instruction Fuzzy Hash: 3EF028355456102BC2623736BE06F5B3559AFCE7B5F24203FF824922D2EEEC8802516C
                  APIs
                    • Part of subcall function 00419639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00419693
                    • Part of subcall function 00419639: SelectObject.GDI32(?,00000000), ref: 004196A2
                    • Part of subcall function 00419639: BeginPath.GDI32(?), ref: 004196B9
                    • Part of subcall function 00419639: SelectObject.GDI32(?,00000000), ref: 004196E2
                  • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00498A4E
                  • LineTo.GDI32(?,00000003,00000000), ref: 00498A62
                  • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00498A70
                  • LineTo.GDI32(?,00000000,00000003), ref: 00498A80
                  • EndPath.GDI32(?), ref: 00498A90
                  • StrokePath.GDI32(?), ref: 00498AA0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                  • String ID:
                  • API String ID: 43455801-0
                  • Opcode ID: 7546945f018009c9331fba3f7a2bb4d016bfd2e7c7688a7605cf59210c7cd9fc
                  • Instruction ID: fbe2cd0df6ce29d36aa60cb89ce8f05a0eb0660468d66753ff6b58e60e770502
                  • Opcode Fuzzy Hash: 7546945f018009c9331fba3f7a2bb4d016bfd2e7c7688a7605cf59210c7cd9fc
                  • Instruction Fuzzy Hash: C1110976000108FFDF129F94DC88EAA7F6DEB08354F008076FA199A1A1C7719D55DFA4
                  APIs
                  • GetDC.USER32(00000000), ref: 00465218
                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00465229
                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00465230
                  • ReleaseDC.USER32(00000000,00000000), ref: 00465238
                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0046524F
                  • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00465261
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CapsDevice$Release
                  • String ID:
                  • API String ID: 1035833867-0
                  • Opcode ID: 8faba0ee30be5cb13a1b2ecbb04910e715b6cec58ab827c338ca8977ae4f2e7f
                  • Instruction ID: b580059f6be7f40f5b932cc52e30610f12d628495f3ea0f87bdd437489a17fc3
                  • Opcode Fuzzy Hash: 8faba0ee30be5cb13a1b2ecbb04910e715b6cec58ab827c338ca8977ae4f2e7f
                  • Instruction Fuzzy Hash: 3B014F75A00718BBEB109BA69C89A5EBFB8EB58751F044076FA04A7381D6709C05CFA5
                  APIs
                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00401BF4
                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00401BFC
                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00401C07
                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00401C12
                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00401C1A
                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00401C22
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Virtual
                  • String ID:
                  • API String ID: 4278518827-0
                  • Opcode ID: 1a522003fa8669d509f293f71d3ce78c7a9fdbd6614cce04aed6fde4746875c8
                  • Instruction ID: bde655c877d2c08a540512c5fbf9159b657977c32e8b628f088c8e44422960a5
                  • Opcode Fuzzy Hash: 1a522003fa8669d509f293f71d3ce78c7a9fdbd6614cce04aed6fde4746875c8
                  • Instruction Fuzzy Hash: D30167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5AC64CBE5
                  APIs
                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0046EB30
                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0046EB46
                  • GetWindowThreadProcessId.USER32(?,?), ref: 0046EB55
                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046EB64
                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046EB6E
                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046EB75
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                  • String ID:
                  • API String ID: 839392675-0
                  • Opcode ID: 006adf219d05379228fd92673f0820b1abaf0f8004913cab913325fb14eb15e3
                  • Instruction ID: f5e88bd126d4b4a45c055c34ca32b052b60c6e081341237e67be9e8f7f9e4ade
                  • Opcode Fuzzy Hash: 006adf219d05379228fd92673f0820b1abaf0f8004913cab913325fb14eb15e3
                  • Instruction Fuzzy Hash: 55F03072140158BBE72157529C4EEEF3A7CEFDAB11F00017AF601D1191D7A05E01CABD
                  APIs
                  • GetClientRect.USER32(?), ref: 00457452
                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00457469
                  • GetWindowDC.USER32(?), ref: 00457475
                  • GetPixel.GDI32(00000000,?,?), ref: 00457484
                  • ReleaseDC.USER32(?,00000000), ref: 00457496
                  • GetSysColor.USER32(00000005), ref: 004574B0
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ClientColorMessagePixelRectReleaseSendWindow
                  • String ID:
                  • API String ID: 272304278-0
                  • Opcode ID: 13767dde9905c331695c021f44ed15c71d7cf84250aa2b4c85453f6a2abbb232
                  • Instruction ID: 6ab9d80463e99b87d734b7b9dcd57c73bb02452364882ca98cfe7d1e246d3b82
                  • Opcode Fuzzy Hash: 13767dde9905c331695c021f44ed15c71d7cf84250aa2b4c85453f6a2abbb232
                  • Instruction Fuzzy Hash: CB018B31400215FFEB105FA4EC48BAA7BB5FB14322F510072FD16A21A1CB311E42AB59
                  APIs
                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0046187F
                  • UnloadUserProfile.USERENV(?,?), ref: 0046188B
                  • CloseHandle.KERNEL32(?), ref: 00461894
                  • CloseHandle.KERNEL32(?), ref: 0046189C
                  • GetProcessHeap.KERNEL32(00000000,?), ref: 004618A5
                  • HeapFree.KERNEL32(00000000), ref: 004618AC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                  • String ID:
                  • API String ID: 146765662-0
                  • Opcode ID: 43ec2971e1f8e2b585ea47eb38944aec25349c450572c3fa8a85bc44f1bb437f
                  • Instruction ID: 93ed99ab83d3086ca9a7d7f977fc2ab570087ad659e0d6fe9bbd6d734ea77bf3
                  • Opcode Fuzzy Hash: 43ec2971e1f8e2b585ea47eb38944aec25349c450572c3fa8a85bc44f1bb437f
                  • Instruction Fuzzy Hash: B6E0E536004101BBDB016FA1EE4D90ABF39FFA9B22B108232F22581070CB329420DF68
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 0040BEB3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Init_thread_footer
                  • String ID: D%M$D%M$D%M$D%MD%M
                  • API String ID: 1385522511-4071987705
                  • Opcode ID: 45be36f2c31fd68d13b3661d6e4058314b6040ef6306753e818845e7dda3d8e9
                  • Instruction ID: b7ac573a61b6c86a4bc46bfd2286d2af8bebba7c614699f93cceb1e50d544b9f
                  • Opcode Fuzzy Hash: 45be36f2c31fd68d13b3661d6e4058314b6040ef6306753e818845e7dda3d8e9
                  • Instruction Fuzzy Hash: 94915A75A04206DFCB14CF58C090AAAB7F1FF59310B24816FD945AB390D779AD82CBD8
                  APIs
                    • Part of subcall function 00420242: EnterCriticalSection.KERNEL32(004D070C,004D1884,?,?,0041198B,004D2518,?,?,?,004012F9,00000000), ref: 0042024D
                    • Part of subcall function 00420242: LeaveCriticalSection.KERNEL32(004D070C,?,0041198B,004D2518,?,?,?,004012F9,00000000), ref: 0042028A
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                    • Part of subcall function 004200A3: __onexit.LIBCMT ref: 004200A9
                  • __Init_thread_footer.LIBCMT ref: 00487BFB
                    • Part of subcall function 004201F8: EnterCriticalSection.KERNEL32(004D070C,?,?,00418747,004D2514), ref: 00420202
                    • Part of subcall function 004201F8: LeaveCriticalSection.KERNEL32(004D070C,?,00418747,004D2514), ref: 00420235
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                  • String ID: +TE$5$G$Variable must be of type 'Object'.
                  • API String ID: 535116098-3584180923
                  • Opcode ID: 61b466c14dfb940eef884533cbb4b5b3314c8a87026b490e5ab9facc96b5f4a2
                  • Instruction ID: 0825d4067c9ae755b982dfb175b1a2eaf4d05ac682f8bd9bb84b6976c6d4baab
                  • Opcode Fuzzy Hash: 61b466c14dfb940eef884533cbb4b5b3314c8a87026b490e5ab9facc96b5f4a2
                  • Instruction Fuzzy Hash: 60916E70604209EFCB14EF55D8A19AEB7B2BF44304F24845EF805AB392DB79EE41CB59
                  APIs
                    • Part of subcall function 00407620: _wcslen.LIBCMT ref: 00407625
                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0046C6EE
                  • _wcslen.LIBCMT ref: 0046C735
                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0046C79C
                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0046C7CA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ItemMenu$Info_wcslen$Default
                  • String ID: 0
                  • API String ID: 1227352736-4108050209
                  • Opcode ID: 05698d32134d5ed1081ea2a04b4bc6ecc20893da183934df637c20565854ea89
                  • Instruction ID: 02c39af64d605911332feec9c2f910ed825ee2d27519ab025def179ed8ccc1ac
                  • Opcode Fuzzy Hash: 05698d32134d5ed1081ea2a04b4bc6ecc20893da183934df637c20565854ea89
                  • Instruction Fuzzy Hash: E451BD71604302ABD710AF29C8C5A7B77E4AB49315F040A2FF9D5E32A0EB78D8058A5F
                  APIs
                  • ShellExecuteExW.SHELL32(0000003C), ref: 0048AEA3
                    • Part of subcall function 00407620: _wcslen.LIBCMT ref: 00407625
                  • GetProcessId.KERNEL32(00000000), ref: 0048AF38
                  • CloseHandle.KERNEL32(00000000), ref: 0048AF67
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CloseExecuteHandleProcessShell_wcslen
                  • String ID: <$@
                  • API String ID: 146682121-1426351568
                  • Opcode ID: 3e4878397791d2b0ad18a58e04d706da771af16a5a8456b09464ed2045acdf63
                  • Instruction ID: 3a9d9222576e1ac9a23f032ea787e2e7f4163c939ef43f311c18500ddff8749b
                  • Opcode Fuzzy Hash: 3e4878397791d2b0ad18a58e04d706da771af16a5a8456b09464ed2045acdf63
                  • Instruction Fuzzy Hash: FB716D71A00615DFDB14EF55C484A9EBBF0BF08318F0488AEE816AB391C778ED55CB99
                  APIs
                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00467206
                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0046723C
                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0046724D
                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 004672CF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorMode$AddressCreateInstanceProc
                  • String ID: DllGetClassObject
                  • API String ID: 753597075-1075368562
                  • Opcode ID: b35b2fabb8949c64e64443875823b8b72f8e25cef496698fd7594227b97294f6
                  • Instruction ID: e332de68a8d26745d51daefcd21ff4a8066250c0fbc8ee4667deaac8a0dfb549
                  • Opcode Fuzzy Hash: b35b2fabb8949c64e64443875823b8b72f8e25cef496698fd7594227b97294f6
                  • Instruction Fuzzy Hash: B841AFB1604204EFDB15CF54C895B9A7BA9EF44318F1080AFFD059F20AE7B8D945CBA9
                  APIs
                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00492F8D
                  • LoadLibraryW.KERNEL32(?), ref: 00492F94
                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00492FA9
                  • DestroyWindow.USER32(?), ref: 00492FB1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$DestroyLibraryLoadWindow
                  • String ID: SysAnimate32
                  • API String ID: 3529120543-1011021900
                  • Opcode ID: 0b89f4972ad498b70bc2a1595c0db3748fec38cd1bba60b0f3d8d84754f06fab
                  • Instruction ID: 722834eff0a5930c05746b20bfc6279012394e2664c96d2ac67a4f5f0b34f9ae
                  • Opcode Fuzzy Hash: 0b89f4972ad498b70bc2a1595c0db3748fec38cd1bba60b0f3d8d84754f06fab
                  • Instruction Fuzzy Hash: 3C219D72200205BFEF108F64DD80EBB3BB9EB59368F10063AF954D2298D7B5DC51A768
                  APIs
                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00424D1E,004328E9,?,00424CBE,004328E9,004C88B8,0000000C,00424E15,004328E9,00000002), ref: 00424D8D
                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00424DA0
                  • FreeLibrary.KERNEL32(00000000,?,?,?,00424D1E,004328E9,?,00424CBE,004328E9,004C88B8,0000000C,00424E15,004328E9,00000002,00000000), ref: 00424DC3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AddressFreeHandleLibraryModuleProc
                  • String ID: CorExitProcess$mscoree.dll
                  • API String ID: 4061214504-1276376045
                  • Opcode ID: 6173fefeb2ea5d8578249e17750bc1ca4379ae90663aaee229e0e61f51f9ce41
                  • Instruction ID: f8f4e9972e8aaa3044dd575916bf8a37e8c474ed8185850f22b2ae15484a8ef3
                  • Opcode Fuzzy Hash: 6173fefeb2ea5d8578249e17750bc1ca4379ae90663aaee229e0e61f51f9ce41
                  • Instruction Fuzzy Hash: A4F04F34A50218BBDB119F91EC89BAEBBB5EF54752F4001BAF809A2260CB345D40CE98
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00404EDD,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404E9C
                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00404EAE
                  • FreeLibrary.KERNEL32(00000000,?,?,00404EDD,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404EC0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Library$AddressFreeLoadProc
                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                  • API String ID: 145871493-3689287502
                  • Opcode ID: 1f0daf08137303d123905fa1aea4dff68d5910ed260024f2cdacfbd315a855e4
                  • Instruction ID: df5f97fde00aa5c7b11bf10d08503bc6e97474995ffea749878bf06e9095efd0
                  • Opcode Fuzzy Hash: 1f0daf08137303d123905fa1aea4dff68d5910ed260024f2cdacfbd315a855e4
                  • Instruction Fuzzy Hash: 7CE08635A015229BD2211B25BC59B5B6554AFD1B637050137FD04E2254DB78CD0244EC
                  APIs
                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00443CDE,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404E62
                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00404E74
                  • FreeLibrary.KERNEL32(00000000,?,?,00443CDE,?,004D1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00404E87
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Library$AddressFreeLoadProc
                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                  • API String ID: 145871493-1355242751
                  • Opcode ID: bbfd422d7dd054d629010c3565ecda1d64402e91b67eb59358e1197e0cf7697b
                  • Instruction ID: 14aa215812f609d35427a445d5e1ed10e05d1ccd2edaed2236f54676345637d1
                  • Opcode Fuzzy Hash: bbfd422d7dd054d629010c3565ecda1d64402e91b67eb59358e1197e0cf7697b
                  • Instruction Fuzzy Hash: A0D0C235502621678A221B24BC0DE8B2A18AFC1B21305023BBE08B2294CF38CD01C9DC
                  APIs
                  • GetCurrentProcessId.KERNEL32 ref: 0048A427
                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0048A435
                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0048A468
                  • CloseHandle.KERNEL32(?), ref: 0048A63D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$CloseCountersCurrentHandleOpen
                  • String ID:
                  • API String ID: 3488606520-0
                  • Opcode ID: 4aa8b961cf7c8c97729d537c6dc630005a7dc650bf3d033bfd094493a9189ec0
                  • Instruction ID: b8088afb9398ffb554eda8f2aa8979eea9f31ae81038faa3cf482018adcea7df
                  • Opcode Fuzzy Hash: 4aa8b961cf7c8c97729d537c6dc630005a7dc650bf3d033bfd094493a9189ec0
                  • Instruction Fuzzy Hash: ADA1C771604301AFE720DF15C881F2AB7E1AF44718F14882EF5599B3D2D7B4EC418B96
                  APIs
                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,004A3700), ref: 0043BB91
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004D121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0043BC09
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004D1270,000000FF,?,0000003F,00000000,?), ref: 0043BC36
                  • _free.LIBCMT ref: 0043BB7F
                    • Part of subcall function 004329C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000), ref: 004329DE
                    • Part of subcall function 004329C8: GetLastError.KERNEL32(00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000,00000000), ref: 004329F0
                  • _free.LIBCMT ref: 0043BD4B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                  • String ID:
                  • API String ID: 1286116820-0
                  • Opcode ID: d9a96ea48cdbbf13f63fef2db02cf8a3c601fb532a01f61efdb8b8ef442142ca
                  • Instruction ID: 1486fbc8524c102181353447770aa1bc8541d8fa981ba0c70f9e98c7ed156765
                  • Opcode Fuzzy Hash: d9a96ea48cdbbf13f63fef2db02cf8a3c601fb532a01f61efdb8b8ef442142ca
                  • Instruction Fuzzy Hash: AC51EA71900219AFC720DFA59C81A6AB7BCEF49314F1052AFEA54E72A1DB345E41CBDC
                  APIs
                    • Part of subcall function 0046DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0046CF22,?), ref: 0046DDFD
                    • Part of subcall function 0046DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0046CF22,?), ref: 0046DE16
                    • Part of subcall function 0046E199: GetFileAttributesW.KERNEL32(?,0046CF95), ref: 0046E19A
                  • lstrcmpiW.KERNEL32(?,?), ref: 0046E473
                  • MoveFileW.KERNEL32(?,?), ref: 0046E4AC
                  • _wcslen.LIBCMT ref: 0046E5EB
                  • _wcslen.LIBCMT ref: 0046E603
                  • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0046E650
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                  • String ID:
                  • API String ID: 3183298772-0
                  • Opcode ID: 8b7d12b8691a708a898bce109f04a875d45e2539b377ddf33cb02cb9f38f5ea5
                  • Instruction ID: 51a687a1a71a7dd90ec3e01b8a2bce827e6d680ca17c8134330d861f6370ce1f
                  • Opcode Fuzzy Hash: 8b7d12b8691a708a898bce109f04a875d45e2539b377ddf33cb02cb9f38f5ea5
                  • Instruction Fuzzy Hash: B15160B25083845BC724EBA1DC819DBB3DCAF84344F40492FE68993191EE78A588876F
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                    • Part of subcall function 0048C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0048B6AE,?,?), ref: 0048C9B5
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048C9F1
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048CA68
                    • Part of subcall function 0048C998: _wcslen.LIBCMT ref: 0048CA9E
                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0048BAA5
                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0048BB00
                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0048BB63
                  • RegCloseKey.ADVAPI32(?,?), ref: 0048BBA6
                  • RegCloseKey.ADVAPI32(00000000), ref: 0048BBB3
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                  • String ID:
                  • API String ID: 826366716-0
                  • Opcode ID: ceacbbcad2e4a5d2eb6636eafa7dd984fa30c071b71a42c25ca71737bd75d141
                  • Instruction ID: bbc1d49f96498461f84a1a740cbd438427599bca2e1a62366f813ffdbb4a339f
                  • Opcode Fuzzy Hash: ceacbbcad2e4a5d2eb6636eafa7dd984fa30c071b71a42c25ca71737bd75d141
                  • Instruction Fuzzy Hash: FE619431208241AFD714EF24C490E2BBBE5FF84348F54896EF4954B2A2DB35ED45CB96
                  APIs
                  • VariantInit.OLEAUT32(?), ref: 00468BCD
                  • VariantClear.OLEAUT32 ref: 00468C3E
                  • VariantClear.OLEAUT32 ref: 00468C9D
                  • VariantClear.OLEAUT32(?), ref: 00468D10
                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00468D3B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$Clear$ChangeInitType
                  • String ID:
                  • API String ID: 4136290138-0
                  • Opcode ID: c7c37afbe69f97956fb0d19e3569aca77d964282cb29c84af807d412189997f9
                  • Instruction ID: fb2819b933547efb8b736eec217633f92c801ebe2c35394c71980d4cfd1bf812
                  • Opcode Fuzzy Hash: c7c37afbe69f97956fb0d19e3569aca77d964282cb29c84af807d412189997f9
                  • Instruction Fuzzy Hash: BC516CB5A00219EFCB10CF58D884AAAB7F4FF89314B15856AE905DB350E734E911CFA5
                  APIs
                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00478BAE
                  • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00478BDA
                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00478C32
                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00478C57
                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00478C5F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: PrivateProfile$SectionWrite$String
                  • String ID:
                  • API String ID: 2832842796-0
                  • Opcode ID: 728680a72fa174cd7059497f7fed40c0db7ca31686114da75e079c42b1a6d8d3
                  • Instruction ID: 4d3a7ff44322516b370283d61508f10edc917193a6e632f242b3c5bb2232e36f
                  • Opcode Fuzzy Hash: 728680a72fa174cd7059497f7fed40c0db7ca31686114da75e079c42b1a6d8d3
                  • Instruction Fuzzy Hash: B0515135A00215AFCB01DF55C885AAABBF5FF48318F04C46DE8496B3A2DB39ED41CB95
                  APIs
                  • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00488F40
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00488FD0
                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00488FEC
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00489032
                  • FreeLibrary.KERNEL32(00000000), ref: 00489052
                    • Part of subcall function 0041F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00471043,?,7735E610), ref: 0041F6E6
                    • Part of subcall function 0041F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0045FA64,00000000,00000000,?,?,00471043,?,7735E610,?,0045FA64), ref: 0041F70D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                  • String ID:
                  • API String ID: 666041331-0
                  • Opcode ID: 546b2b00c22c815be91eca14af110e08e7a0377f3c93c43b65a39d16e1c97e2b
                  • Instruction ID: 47ad584446a521801eb7e26ec9ff8de19ac0ca89c07e0ae45e5f1aee28304d75
                  • Opcode Fuzzy Hash: 546b2b00c22c815be91eca14af110e08e7a0377f3c93c43b65a39d16e1c97e2b
                  • Instruction Fuzzy Hash: E8516335600205DFC711EF54C4848ADBBF1FF49318B4884AAE905AB362DB35ED86CF99
                  APIs
                  • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00496C33
                  • SetWindowLongW.USER32(?,000000EC,?), ref: 00496C4A
                  • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00496C73
                  • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0047AB79,00000000,00000000), ref: 00496C98
                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00496CC7
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Long$MessageSendShow
                  • String ID:
                  • API String ID: 3688381893-0
                  • Opcode ID: 2f03cd997b35680eb01586d1af4fe9623681f8ac33562b8ad328c65bcacae72e
                  • Instruction ID: 12a0e0884739766fa0dfcc0b1bcbf13c14a553a95f9ce1c143211c00233c5ce9
                  • Opcode Fuzzy Hash: 2f03cd997b35680eb01586d1af4fe9623681f8ac33562b8ad328c65bcacae72e
                  • Instruction Fuzzy Hash: 7541A135604114AFDF24CF28CC98FA67FA5EB09350F16027AF999A73A0D375ED41CA58
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free
                  • String ID:
                  • API String ID: 269201875-0
                  • Opcode ID: 3890d703f7ea146fcb4efc749df72bd74b23163155a5f2f9b3b7e357d1c9b5e8
                  • Instruction ID: 6dd859aa5b34bf1fef1704294b8be7e7265d224a6742f6dcd311402aa10f32ba
                  • Opcode Fuzzy Hash: 3890d703f7ea146fcb4efc749df72bd74b23163155a5f2f9b3b7e357d1c9b5e8
                  • Instruction Fuzzy Hash: 9A411372A00200AFCB24DF79CA80A5EB3F1EF88314F1541AEE615EB391D775AD01CB84
                  APIs
                  • GetCursorPos.USER32(?), ref: 00419141
                  • ScreenToClient.USER32(00000000,?), ref: 0041915E
                  • GetAsyncKeyState.USER32(00000001), ref: 00419183
                  • GetAsyncKeyState.USER32(00000002), ref: 0041919D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AsyncState$ClientCursorScreen
                  • String ID:
                  • API String ID: 4210589936-0
                  • Opcode ID: 1f4b99ddf7770994000e2e752fd0c50b56e37b570bdab3736163e39e4edf255d
                  • Instruction ID: 4ec9162a1520e967818a38ef5d3125694897c688c06126800f407b15a9c0efab
                  • Opcode Fuzzy Hash: 1f4b99ddf7770994000e2e752fd0c50b56e37b570bdab3736163e39e4edf255d
                  • Instruction Fuzzy Hash: 97417071A0851ABBDF059F64D858BEEB774FB05324F20822BE825A33D1C7386D94CB55
                  APIs
                  • GetInputState.USER32 ref: 004738CB
                  • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00473922
                  • TranslateMessage.USER32(?), ref: 0047394B
                  • DispatchMessageW.USER32(?), ref: 00473955
                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00473966
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                  • String ID:
                  • API String ID: 2256411358-0
                  • Opcode ID: 1d263d90fd72d112a53c6766bf6d8848523db5564669c37401054b8c419d30da
                  • Instruction ID: 84eaa786b2387123832bc19ae6b818a3c20a250c8b8cc06f73be85a0076670e9
                  • Opcode Fuzzy Hash: 1d263d90fd72d112a53c6766bf6d8848523db5564669c37401054b8c419d30da
                  • Instruction Fuzzy Hash: F831EAF0505341AEEB35DF349848BF737E49B15305F04857FE95A822A0D3B89685EB1A
                  APIs
                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0047CF38
                  • InternetReadFile.WININET(?,00000000,?,?), ref: 0047CF6F
                  • GetLastError.KERNEL32(?,00000000,?,?,?,0047C21E,00000000), ref: 0047CFB4
                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0047C21E,00000000), ref: 0047CFC8
                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,0047C21E,00000000), ref: 0047CFF2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                  • String ID:
                  • API String ID: 3191363074-0
                  • Opcode ID: 267ec784030a460f0f79f0dbc3477c0f95e7639c4a5d52a357bb912ea80ac7eb
                  • Instruction ID: e2ddae2e016a7532fe7ae0336facecb5f043aa575c99eebf64ce95ba0d683efb
                  • Opcode Fuzzy Hash: 267ec784030a460f0f79f0dbc3477c0f95e7639c4a5d52a357bb912ea80ac7eb
                  • Instruction Fuzzy Hash: 59314F71500605EFDB20DFA5D8C49EBBBF9EB14354B10846FF50AD2281D738AE459B68
                  APIs
                  • GetWindowRect.USER32(?,?), ref: 00461915
                  • PostMessageW.USER32(00000001,00000201,00000001), ref: 004619C1
                  • Sleep.KERNEL32(00000000,?,?,?), ref: 004619C9
                  • PostMessageW.USER32(00000001,00000202,00000000), ref: 004619DA
                  • Sleep.KERNEL32(00000000,?,?,?,?), ref: 004619E2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessagePostSleep$RectWindow
                  • String ID:
                  • API String ID: 3382505437-0
                  • Opcode ID: afe3dbb1c1b5812c924d18584f98d9909dfe25e6880b22c06b7a4c40ae944cbe
                  • Instruction ID: 829d82280daac0add66571c4e3e0d920b35c3f5cad5351cfb82f8dd034f1eba3
                  • Opcode Fuzzy Hash: afe3dbb1c1b5812c924d18584f98d9909dfe25e6880b22c06b7a4c40ae944cbe
                  • Instruction Fuzzy Hash: D331E0B1A00219EFCB00CFA8CD99ADE3BB5EB44314F04422AF921A72E0D3749D48CB95
                  APIs
                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00495745
                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 0049579D
                  • _wcslen.LIBCMT ref: 004957AF
                  • _wcslen.LIBCMT ref: 004957BA
                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00495816
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$_wcslen
                  • String ID:
                  • API String ID: 763830540-0
                  • Opcode ID: f224cb674ae0583935b1f03869fe9fea8b63ee289ff83acd55362933cbc49a42
                  • Instruction ID: 6ec0d0b2a114a538478c386fa1c3cfc577435f3482bce6752ac6046d20e967aa
                  • Opcode Fuzzy Hash: f224cb674ae0583935b1f03869fe9fea8b63ee289ff83acd55362933cbc49a42
                  • Instruction Fuzzy Hash: CE21A7719046189ADF21DFA0DC84AEE7B78FF04724F204177F929DA280D7788A85CF58
                  APIs
                  • IsWindow.USER32(00000000), ref: 00480951
                  • GetForegroundWindow.USER32 ref: 00480968
                  • GetDC.USER32(00000000), ref: 004809A4
                  • GetPixel.GDI32(00000000,?,00000003), ref: 004809B0
                  • ReleaseDC.USER32(00000000,00000003), ref: 004809E8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$ForegroundPixelRelease
                  • String ID:
                  • API String ID: 4156661090-0
                  • Opcode ID: 195a483edd1dcdf039cd03fe6396345472f5f2d478cf678d7b6da44833dd45c7
                  • Instruction ID: 11ced2f4e029b84405b50d312216b8a40d09f6c875fef5a9ce50f43728bdad74
                  • Opcode Fuzzy Hash: 195a483edd1dcdf039cd03fe6396345472f5f2d478cf678d7b6da44833dd45c7
                  • Instruction Fuzzy Hash: 1A21A175600204AFD714EF69C884EAEBBE5EF48704F00847EE84AA7362DB34AC04CB94
                  APIs
                  • GetEnvironmentStringsW.KERNEL32 ref: 0043CDC6
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0043CDE9
                    • Part of subcall function 00433820: RtlAllocateHeap.NTDLL(00000000,?,004D1444,?,0041FDF5,?,?,0040A976,00000010,004D1440,004013FC,?,004013C6,?,00401129), ref: 00433852
                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0043CE0F
                  • _free.LIBCMT ref: 0043CE22
                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0043CE31
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                  • String ID:
                  • API String ID: 336800556-0
                  • Opcode ID: e06f20c93cc601861fa5ce633177da756fed3fc3e672f577b81ff098bf774a86
                  • Instruction ID: 1197e6e1fe02c4a0703ab6cd5735b10ecee6a660b31c68c5b12b274b31b6dad2
                  • Opcode Fuzzy Hash: e06f20c93cc601861fa5ce633177da756fed3fc3e672f577b81ff098bf774a86
                  • Instruction Fuzzy Hash: AC01D8726012157F232126766CCED7B796DDECABA1715113FFD05E7201DA698D0182BC
                  APIs
                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00419693
                  • SelectObject.GDI32(?,00000000), ref: 004196A2
                  • BeginPath.GDI32(?), ref: 004196B9
                  • SelectObject.GDI32(?,00000000), ref: 004196E2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ObjectSelect$BeginCreatePath
                  • String ID:
                  • API String ID: 3225163088-0
                  • Opcode ID: ff3afd791bfa64476153b784ca82cb3eb3b91a5e99644b880ad6adea22e2ed25
                  • Instruction ID: 78f1d194d7aedd34a2b77dd1bb53a5becfdc778ea9d24743b2e18ad0daeb6eef
                  • Opcode Fuzzy Hash: ff3afd791bfa64476153b784ca82cb3eb3b91a5e99644b880ad6adea22e2ed25
                  • Instruction Fuzzy Hash: 6C213DB0902305EBDB119F64EC657EA3BA9BB50365F100277F810A62B1D3785C95CFAD
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _memcmp
                  • String ID:
                  • API String ID: 2931989736-0
                  • Opcode ID: b3e1830291eea80dcf21e65ab2d8b536b7e6a0cb8c488699daa5d9a5a3874387
                  • Instruction ID: 87b03ce543656566d8abf010f9e260a5a793b331451bb8d5a0ee2648b4f9f092
                  • Opcode Fuzzy Hash: b3e1830291eea80dcf21e65ab2d8b536b7e6a0cb8c488699daa5d9a5a3874387
                  • Instruction Fuzzy Hash: 6601F971341615BBE60895119D42FBB734D9B313A9F504037FD04AAA41F72DED2582EE
                  APIs
                  • GetLastError.KERNEL32(?,?,?,0042F2DE,00433863,004D1444,?,0041FDF5,?,?,0040A976,00000010,004D1440,004013FC,?,004013C6), ref: 00432DFD
                  • _free.LIBCMT ref: 00432E32
                  • _free.LIBCMT ref: 00432E59
                  • SetLastError.KERNEL32(00000000,00401129), ref: 00432E66
                  • SetLastError.KERNEL32(00000000,00401129), ref: 00432E6F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLast$_free
                  • String ID:
                  • API String ID: 3170660625-0
                  • Opcode ID: 1814151eca9aff72ff2c93c6ccbc5fcea9cb8c04b5e3c10e8124efd733df63a3
                  • Instruction ID: c0694638e7792851092fa5cd03291216858c210ee132d495a6d0c21532e8c229
                  • Opcode Fuzzy Hash: 1814151eca9aff72ff2c93c6ccbc5fcea9cb8c04b5e3c10e8124efd733df63a3
                  • Instruction Fuzzy Hash: 8301F9762456006BD61227766E87E2B3559AFDD369F25203FF825A2292EEFC8C02506C
                  APIs
                  • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?,?,?,0046035E), ref: 0046002B
                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?,?), ref: 00460046
                  • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?,?), ref: 00460054
                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?), ref: 00460064
                  • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0045FF41,80070057,?,?), ref: 00460070
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: From$Prog$FreeStringTasklstrcmpi
                  • String ID:
                  • API String ID: 3897988419-0
                  • Opcode ID: 2ef6ad04a1427489c6d2ad9b1713ed0c4ec6fe18a998b475bd347fdebb59028a
                  • Instruction ID: 4ed6cdf9d6976c148567e7f9fd8ca272fe3e0bd2c1d752201ac9e38fb47a593a
                  • Opcode Fuzzy Hash: 2ef6ad04a1427489c6d2ad9b1713ed0c4ec6fe18a998b475bd347fdebb59028a
                  • Instruction Fuzzy Hash: 8B01AD72600204BFDB109F68EC88BAB7AEDEF44792F144136F905E2210E7B9DD408BA4
                  APIs
                  • QueryPerformanceCounter.KERNEL32(?), ref: 0046E997
                  • QueryPerformanceFrequency.KERNEL32(?), ref: 0046E9A5
                  • Sleep.KERNEL32(00000000), ref: 0046E9AD
                  • QueryPerformanceCounter.KERNEL32(?), ref: 0046E9B7
                  • Sleep.KERNEL32 ref: 0046E9F3
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: PerformanceQuery$CounterSleep$Frequency
                  • String ID:
                  • API String ID: 2833360925-0
                  • Opcode ID: 2aeaa79d5672aed6268297b647a7432b7ce9414ded8618e8230f64fce08111e6
                  • Instruction ID: e8df75264cfc46d5542beadfd56f5430bc66c85ba3907fffc5f89a1a7ce3f043
                  • Opcode Fuzzy Hash: 2aeaa79d5672aed6268297b647a7432b7ce9414ded8618e8230f64fce08111e6
                  • Instruction Fuzzy Hash: 08015B75C01529DBCF00AFE6D9996DEBBB8BF09700F000567E502B2240DB3895598BAA
                  APIs
                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00461114
                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 00461120
                  • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 0046112F
                  • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00460B9B,?,?,?), ref: 00461136
                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0046114D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                  • String ID:
                  • API String ID: 842720411-0
                  • Opcode ID: ce014c5868846d7c8cbeb970d1f65daabd8744abfde489563efd0793294f8ce4
                  • Instruction ID: 905019f768625a34e11d31e15c1025594aaff330f26edc8ff24bb3a527f57659
                  • Opcode Fuzzy Hash: ce014c5868846d7c8cbeb970d1f65daabd8744abfde489563efd0793294f8ce4
                  • Instruction Fuzzy Hash: 53011D75100205BFDB114FA5DC89AAB3B6EEF8A360B544476FA45D7360EA31DC009A68
                  APIs
                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00460FCA
                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00460FD6
                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00460FE5
                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00460FEC
                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00461002
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: HeapInformationToken$AllocErrorLastProcess
                  • String ID:
                  • API String ID: 44706859-0
                  • Opcode ID: 80b7b46aa13c80867e1358b9b29a91cb199ce5f3faa2ad2d12c0a4ab802f4a79
                  • Instruction ID: 19f58f7f2ef5baa3176ae181a887f72838396cd1930da02c92509eb2eca7197d
                  • Opcode Fuzzy Hash: 80b7b46aa13c80867e1358b9b29a91cb199ce5f3faa2ad2d12c0a4ab802f4a79
                  • Instruction Fuzzy Hash: 9EF0A935200301ABDB210FA49C8AF5B3BADEF99762F200436FA05D6260DA30DC408A78
                  APIs
                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0046102A
                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00461036
                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00461045
                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0046104C
                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00461062
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: HeapInformationToken$AllocErrorLastProcess
                  • String ID:
                  • API String ID: 44706859-0
                  • Opcode ID: 56d3426fd5648950043470301933ab3bbbda605344f19258b7462d08cd539152
                  • Instruction ID: 7a717aa150d4942d0c10e89215848741cb31b7faf8bb8dd1e0430935280b2535
                  • Opcode Fuzzy Hash: 56d3426fd5648950043470301933ab3bbbda605344f19258b7462d08cd539152
                  • Instruction Fuzzy Hash: 95F06D35240311EBDB215FA4EC89F5B3BADEF99761F240436FA45E7260DA74D8408AB8
                  APIs
                  • CloseHandle.KERNEL32(?,?,?,?,0047017D,?,004732FC,?,00000001,00442592,?), ref: 00470324
                  • CloseHandle.KERNEL32(?,?,?,?,0047017D,?,004732FC,?,00000001,00442592,?), ref: 00470331
                  • CloseHandle.KERNEL32(?,?,?,?,0047017D,?,004732FC,?,00000001,00442592,?), ref: 0047033E
                  • CloseHandle.KERNEL32(?,?,?,?,0047017D,?,004732FC,?,00000001,00442592,?), ref: 0047034B
                  • CloseHandle.KERNEL32(?,?,?,?,0047017D,?,004732FC,?,00000001,00442592,?), ref: 00470358
                  • CloseHandle.KERNEL32(?,?,?,?,0047017D,?,004732FC,?,00000001,00442592,?), ref: 00470365
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CloseHandle
                  • String ID:
                  • API String ID: 2962429428-0
                  • Opcode ID: c0b52786944a190897126378818267e3c41e3c129c4972858b0d9542f89387ea
                  • Instruction ID: 15ace0418df84187642c2314bf566344365291e49933a4038b0db5ea42340f64
                  • Opcode Fuzzy Hash: c0b52786944a190897126378818267e3c41e3c129c4972858b0d9542f89387ea
                  • Instruction Fuzzy Hash: 56019072801B15DFC7309F66D880453F7F5BE602153158A3FD59A52A31C375A954CE84
                  APIs
                  • _free.LIBCMT ref: 0043D752
                    • Part of subcall function 004329C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000), ref: 004329DE
                    • Part of subcall function 004329C8: GetLastError.KERNEL32(00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000,00000000), ref: 004329F0
                  • _free.LIBCMT ref: 0043D764
                  • _free.LIBCMT ref: 0043D776
                  • _free.LIBCMT ref: 0043D788
                  • _free.LIBCMT ref: 0043D79A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 80a46d3f4cdf48cc1f4cb3fd7009116c9b0e75df3a7578b7af18df310060968e
                  • Instruction ID: f5ce886cc1531f6a28f8f015eef13142195b22a627306931412e56b56f15fa43
                  • Opcode Fuzzy Hash: 80a46d3f4cdf48cc1f4cb3fd7009116c9b0e75df3a7578b7af18df310060968e
                  • Instruction Fuzzy Hash: 64F03CB2A00214AB8661FB65FAC2D1777DDBB08310F94281AF048D7601C738FC808A6C
                  APIs
                  • GetDlgItem.USER32(?,000003E9), ref: 00465C58
                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00465C6F
                  • MessageBeep.USER32(00000000), ref: 00465C87
                  • KillTimer.USER32(?,0000040A), ref: 00465CA3
                  • EndDialog.USER32(?,00000001), ref: 00465CBD
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                  • String ID:
                  • API String ID: 3741023627-0
                  • Opcode ID: 99409bf667dfd5146e04d6ca95f67e3c88710ae28e4330c26662dce5bcfe50df
                  • Instruction ID: d2f2f99a99c3866907f2b8e9e78720351076807077f306acab77195a7e7bd78d
                  • Opcode Fuzzy Hash: 99409bf667dfd5146e04d6ca95f67e3c88710ae28e4330c26662dce5bcfe50df
                  • Instruction Fuzzy Hash: 99018670500B04AFFB205B10DD8EFA67BB8BB10B05F00057BA583A10E1EBF4AD848B99
                  APIs
                  • _free.LIBCMT ref: 004322BE
                    • Part of subcall function 004329C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000), ref: 004329DE
                    • Part of subcall function 004329C8: GetLastError.KERNEL32(00000000,?,0043D7D1,00000000,00000000,00000000,00000000,?,0043D7F8,00000000,00000007,00000000,?,0043DBF5,00000000,00000000), ref: 004329F0
                  • _free.LIBCMT ref: 004322D0
                  • _free.LIBCMT ref: 004322E3
                  • _free.LIBCMT ref: 004322F4
                  • _free.LIBCMT ref: 00432305
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$ErrorFreeHeapLast
                  • String ID:
                  • API String ID: 776569668-0
                  • Opcode ID: 4123fa34cb97fe27cc116b7268a18f97c13ccf456534f8fabfb79b2512b9f43b
                  • Instruction ID: 89911822197d56008bbfa5947ace786dcece450e15fc45a2089b3a214c72ff9d
                  • Opcode Fuzzy Hash: 4123fa34cb97fe27cc116b7268a18f97c13ccf456534f8fabfb79b2512b9f43b
                  • Instruction Fuzzy Hash: 4EF03AF89021309B8612BF55BD41A0E3B64FB1C761F1115AFF814E32B1C7B90812ABAC
                  APIs
                  • EndPath.GDI32(?), ref: 004195D4
                  • StrokeAndFillPath.GDI32(?,?,004571F7,00000000,?,?,?), ref: 004195F0
                  • SelectObject.GDI32(?,00000000), ref: 00419603
                  • DeleteObject.GDI32 ref: 00419616
                  • StrokePath.GDI32(?), ref: 00419631
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Path$ObjectStroke$DeleteFillSelect
                  • String ID:
                  • API String ID: 2625713937-0
                  • Opcode ID: 1fa8cac9b5671377a88cd9069445daa392776c05a8e75c04debd9cfbfa3f9ee5
                  • Instruction ID: 238536ff26761e07678ffaf61f955209fe333ea733f2b2e557bdad333fde91c8
                  • Opcode Fuzzy Hash: 1fa8cac9b5671377a88cd9069445daa392776c05a8e75c04debd9cfbfa3f9ee5
                  • Instruction Fuzzy Hash: 6EF03771007208FBDB265F69ED6CBA93B61AB10322F048276F825651F1C7348992DF3C
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: __freea$_free
                  • String ID: a/p$am/pm
                  • API String ID: 3432400110-3206640213
                  • Opcode ID: ea3ff1d5b773863d711455d32771d517fa4c043961c4b2310e599dbe605c66e5
                  • Instruction ID: e7f55f0000d1cb7e47c77de890cae059c8a33d49be9b46a5649e7d8ef9c59423
                  • Opcode Fuzzy Hash: ea3ff1d5b773863d711455d32771d517fa4c043961c4b2310e599dbe605c66e5
                  • Instruction Fuzzy Hash: 9CD1D331900205DAEB289F68C855BFBB7B1EF0D300F24615BE941ABB61D37D9D81CB5A
                  APIs
                    • Part of subcall function 00420242: EnterCriticalSection.KERNEL32(004D070C,004D1884,?,?,0041198B,004D2518,?,?,?,004012F9,00000000), ref: 0042024D
                    • Part of subcall function 00420242: LeaveCriticalSection.KERNEL32(004D070C,?,0041198B,004D2518,?,?,?,004012F9,00000000), ref: 0042028A
                    • Part of subcall function 004200A3: __onexit.LIBCMT ref: 004200A9
                  • __Init_thread_footer.LIBCMT ref: 00486238
                    • Part of subcall function 004201F8: EnterCriticalSection.KERNEL32(004D070C,?,?,00418747,004D2514), ref: 00420202
                    • Part of subcall function 004201F8: LeaveCriticalSection.KERNEL32(004D070C,?,00418747,004D2514), ref: 00420235
                    • Part of subcall function 0047359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 004735E4
                    • Part of subcall function 0047359C: LoadStringW.USER32(004D2390,?,00000FFF,?), ref: 0047360A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                  • String ID: x#M$x#M$x#M
                  • API String ID: 1072379062-3829861524
                  • Opcode ID: 3df73f709b3f556fbaefde3115f804a6d6e55e6488ed90262b3a3554c009390c
                  • Instruction ID: ad22d8bb0a2c6c26de9bbcbdc3a22a2ffba9b188311ff05807625ef18eb72349
                  • Opcode Fuzzy Hash: 3df73f709b3f556fbaefde3115f804a6d6e55e6488ed90262b3a3554c009390c
                  • Instruction Fuzzy Hash: 1FC17C71A00105AFCB14EF58D890EBEB7B9EF48304F11846EE905AB391DB78ED45CB99
                  APIs
                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00438B6E
                  • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00438B7A
                  • __dosmaperr.LIBCMT ref: 00438B81
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ByteCharErrorLastMultiWide__dosmaperr
                  • String ID: .B
                  • API String ID: 2434981716-829718130
                  • Opcode ID: 70e0843d2617bb1ac96e5cc782c8146a09cdeed1e6b94f01a2576126441d1abf
                  • Instruction ID: d9a944dd131fce4de3f862138ce5449590071cef698f36b4de1b46f389f44ad8
                  • Opcode Fuzzy Hash: 70e0843d2617bb1ac96e5cc782c8146a09cdeed1e6b94f01a2576126441d1abf
                  • Instruction Fuzzy Hash: 8D418070604246AFDB249F24CC81A7AFFA5DB8E304F2855AFF45487252DE399C03875C
                  APIs
                    • Part of subcall function 0046B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004621D0,?,?,00000034,00000800,?,00000034), ref: 0046B42D
                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00462760
                    • Part of subcall function 0046B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004621FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0046B3F8
                    • Part of subcall function 0046B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0046B355
                    • Part of subcall function 0046B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00462194,00000034,?,?,00001004,00000000,00000000), ref: 0046B365
                    • Part of subcall function 0046B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00462194,00000034,?,?,00001004,00000000,00000000), ref: 0046B37B
                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004627CD
                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0046281A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                  • String ID: @
                  • API String ID: 4150878124-2766056989
                  • Opcode ID: e39cb11c52d900d99a61f6393d528a1cc770f9b1bdda61df4e84e090e70b983a
                  • Instruction ID: ff5d13f5b86c1eaaf45520e5384042095ddc4846ce58a2d293a81ddafc3f8c7f
                  • Opcode Fuzzy Hash: e39cb11c52d900d99a61f6393d528a1cc770f9b1bdda61df4e84e090e70b983a
                  • Instruction Fuzzy Hash: 82412E72900218BFDB10DBA4CD41EDEBBB8EF05304F00405AFA55B7181EB746E85CBA5
                  APIs
                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe,00000104), ref: 00431769
                  • _free.LIBCMT ref: 00431834
                  • _free.LIBCMT ref: 0043183E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free$FileModuleName
                  • String ID: C:\Users\user\Desktop\COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.exe
                  • API String ID: 2506810119-3025384112
                  • Opcode ID: e9c9499fd060a66b16600f024b2810deb7c0494803fa76e7a6b1ded376093660
                  • Instruction ID: e674aad6335fce6784df1a39a9e93ca8c5f84d3287671f514f1e0804a55ea8d6
                  • Opcode Fuzzy Hash: e9c9499fd060a66b16600f024b2810deb7c0494803fa76e7a6b1ded376093660
                  • Instruction Fuzzy Hash: 28318375A00218BBDB25DB9A9C85D9FBBBCEB89314F1451ABE804D7221D7744A40CB98
                  APIs
                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0046C306
                  • DeleteMenu.USER32(?,00000007,00000000), ref: 0046C34C
                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004D1990,00C96118), ref: 0046C395
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Menu$Delete$InfoItem
                  • String ID: 0
                  • API String ID: 135850232-4108050209
                  • Opcode ID: 06fa2ef0e1f7f7ce18e9ba52c077ddcba619eddbc0651f459a18e64a4b6f570c
                  • Instruction ID: a5a26f86fb8e3f621b5e9a31252ed0baa9d5e6f3d5edcb6defe443f1a9038187
                  • Opcode Fuzzy Hash: 06fa2ef0e1f7f7ce18e9ba52c077ddcba619eddbc0651f459a18e64a4b6f570c
                  • Instruction Fuzzy Hash: 454180712043019FD720DF25D884B2ABBE4AB85324F04862EEDA5973D1E738E944CB6B
                  APIs
                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0049CC08,00000000,?,?,?,?), ref: 004944AA
                  • GetWindowLongW.USER32 ref: 004944C7
                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004944D7
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Long
                  • String ID: SysTreeView32
                  • API String ID: 847901565-1698111956
                  • Opcode ID: 5ff1c83aa0963029c2266391b6556a35f8a62dd241e8c66bd42430d1a9326bf5
                  • Instruction ID: 0728479a3b8ee182e928d7310ced60abdb22f450be0063cda04d8313c87d6beb
                  • Opcode Fuzzy Hash: 5ff1c83aa0963029c2266391b6556a35f8a62dd241e8c66bd42430d1a9326bf5
                  • Instruction Fuzzy Hash: 0E317031210205AFDF209E78DC45FEB7BA9EB48338F21472AF975922D0D778AC519754
                  APIs
                  • SysReAllocString.OLEAUT32(?,?), ref: 00466EED
                  • VariantCopyInd.OLEAUT32(?,?), ref: 00466F08
                  • VariantClear.OLEAUT32(?), ref: 00466F12
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$AllocClearCopyString
                  • String ID: *jF
                  • API String ID: 2173805711-3392568748
                  • Opcode ID: cd5f1077f9571672e8d588c471ce99e63cf3dc401fc2dbd5dd48f9f92d3b6613
                  • Instruction ID: 6de2da9f0326b4a2041103a222ed4b69bcdc90237033d5b8759724ce627c219a
                  • Opcode Fuzzy Hash: cd5f1077f9571672e8d588c471ce99e63cf3dc401fc2dbd5dd48f9f92d3b6613
                  • Instruction Fuzzy Hash: 6F31B371704205DFCB08AF65E8909BE3775EF84308B1104AEF8065B2A1D7389D12DBDE
                  APIs
                    • Part of subcall function 0048335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00483077,?,?), ref: 00483378
                  • inet_addr.WSOCK32(?), ref: 0048307A
                  • _wcslen.LIBCMT ref: 0048309B
                  • htons.WSOCK32(00000000), ref: 00483106
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                  • String ID: 255.255.255.255
                  • API String ID: 946324512-2422070025
                  • Opcode ID: 2c70b04d5355e2bc115ce831f308f78862127d5d93b64bd96f75ea30fc539669
                  • Instruction ID: 285a93b77c3d3ed3e9b560691309ecfd3242912dfdeec0dd63436009f81c7906
                  • Opcode Fuzzy Hash: 2c70b04d5355e2bc115ce831f308f78862127d5d93b64bd96f75ea30fc539669
                  • Instruction Fuzzy Hash: 9731F535600201DFCB10EF28C485EAE77E0EF15B19F24886AE8158B392C779EE42C765
                  APIs
                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00494705
                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00494713
                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0049471A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$DestroyWindow
                  • String ID: msctls_updown32
                  • API String ID: 4014797782-2298589950
                  • Opcode ID: 23c8b7b152fe75fdfc6467790956a04e644075744727a90ad01813c248414afc
                  • Instruction ID: cb52790c497286f8ce5b7de91d627fe49a0464525d65d285891c7fb7f9937efc
                  • Opcode Fuzzy Hash: 23c8b7b152fe75fdfc6467790956a04e644075744727a90ad01813c248414afc
                  • Instruction Fuzzy Hash: 8A2165B5600208AFDB10DF55DCD1D773BADEB9A358B14006AFA0097351D774EC12CA64
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen
                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                  • API String ID: 176396367-2734436370
                  • Opcode ID: 7a96940abab752c814026ea6ab9c19e312172e8975e6ac360b44ee6ae35ca431
                  • Instruction ID: 92db3e0312e131ddcc12d84735b0dd0389c407085b613a7ecae2ca61b574a9db
                  • Opcode Fuzzy Hash: 7a96940abab752c814026ea6ab9c19e312172e8975e6ac360b44ee6ae35ca431
                  • Instruction Fuzzy Hash: D221F57220461066C721AA25D802FAB739C9F61314F54442BF94AE6181FBBDAD46C29F
                  APIs
                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00493840
                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00493850
                  • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00493876
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend$MoveWindow
                  • String ID: Listbox
                  • API String ID: 3315199576-2633736733
                  • Opcode ID: cfacaf523655fb328c9910c8f2b0a9c2e74fedc94336a99e1fd67e23fffc4f95
                  • Instruction ID: 8a9d39a12ed8b5cfa55d7752aa31a57177e4c8dd589084ff0fe160f21cf9084d
                  • Opcode Fuzzy Hash: cfacaf523655fb328c9910c8f2b0a9c2e74fedc94336a99e1fd67e23fffc4f95
                  • Instruction Fuzzy Hash: D821B072600118BBEF21DF95CC85FBB3BAAEF8A754F108136F9059B290C675DC5287A4
                  APIs
                  • SetErrorMode.KERNEL32(00000001), ref: 00474A08
                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00474A5C
                  • SetErrorMode.KERNEL32(00000000,?,?,0049CC08), ref: 00474AD0
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorMode$InformationVolume
                  • String ID: %lu
                  • API String ID: 2507767853-685833217
                  • Opcode ID: 73af92db0b0559782d0fd6770a86a142ab82f764216e87a1e769cef45a771675
                  • Instruction ID: df530c5760f7171ec6f3d07ee33d6c9139ef3a859cd9b124a1ee9dc24f4d8152
                  • Opcode Fuzzy Hash: 73af92db0b0559782d0fd6770a86a142ab82f764216e87a1e769cef45a771675
                  • Instruction Fuzzy Hash: 4F316575A00109AFDB10DF64C885EAA7BF8EF44308F1480AAF909EB352D775ED45CB69
                  APIs
                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0049424F
                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00494264
                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00494271
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID: msctls_trackbar32
                  • API String ID: 3850602802-1010561917
                  • Opcode ID: 78864fb44d737ef458aedb5c933010a09097bc0162def24c59e60035a9a0217b
                  • Instruction ID: 9d8991d74e836ef3985734061df2e246540610c0161d576e753d19c50584e58e
                  • Opcode Fuzzy Hash: 78864fb44d737ef458aedb5c933010a09097bc0162def24c59e60035a9a0217b
                  • Instruction Fuzzy Hash: 0611E7312402087EEF205F29CC06FAB3BACEFD5764F11053AFA55E2190D275DC529B28
                  APIs
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                    • Part of subcall function 00462DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00462DC5
                    • Part of subcall function 00462DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00462DD6
                    • Part of subcall function 00462DA7: GetCurrentThreadId.KERNEL32 ref: 00462DDD
                    • Part of subcall function 00462DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00462DE4
                  • GetFocus.USER32 ref: 00462F78
                    • Part of subcall function 00462DEE: GetParent.USER32(00000000), ref: 00462DF9
                  • GetClassNameW.USER32(?,?,00000100), ref: 00462FC3
                  • EnumChildWindows.USER32(?,0046303B), ref: 00462FEB
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                  • String ID: %s%d
                  • API String ID: 1272988791-1110647743
                  • Opcode ID: 0c9f119176b258418091c11ee237925fe53c672ad50993792245eb1f5b0aa3bf
                  • Instruction ID: 82fd7fc501bf372943fdddc3cc937b3277276978e4ba8ad9e090773954ace8d1
                  • Opcode Fuzzy Hash: 0c9f119176b258418091c11ee237925fe53c672ad50993792245eb1f5b0aa3bf
                  • Instruction Fuzzy Hash: D011D8B520020577CF007F61CCC5FED376A9F94308F14407BB9099B196EE7859498B65
                  APIs
                  • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004958C1
                  • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004958EE
                  • DrawMenuBar.USER32(?), ref: 004958FD
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Menu$InfoItem$Draw
                  • String ID: 0
                  • API String ID: 3227129158-4108050209
                  • Opcode ID: cf91324502480a384da169d06e6fe36429412dfe7c5f6ccbaa3cfa1c8aa34896
                  • Instruction ID: 83e1dcf050c05643123abd945a2fa757dd178eb3db84fdade57d0b8e2d2bd318
                  • Opcode Fuzzy Hash: cf91324502480a384da169d06e6fe36429412dfe7c5f6ccbaa3cfa1c8aa34896
                  • Instruction Fuzzy Hash: 07013971500218EFDF229F21D844BAABBB4BB45760F2080AAE849D6251DB348A859F29
                  APIs
                  • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0045D3BF
                  • FreeLibrary.KERNEL32 ref: 0045D3E5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: AddressFreeLibraryProc
                  • String ID: GetSystemWow64DirectoryW$X64
                  • API String ID: 3013587201-2590602151
                  • Opcode ID: b6adb67ee163d7f37e6dd4a9f7452c879603423033646fc8a4f5558c059358cf
                  • Instruction ID: 43432f940e0e203114d8ebc562b75f107543d3eb8a764d1fb67787ffffe4334a
                  • Opcode Fuzzy Hash: b6adb67ee163d7f37e6dd4a9f7452c879603423033646fc8a4f5558c059358cf
                  • Instruction Fuzzy Hash: CCF05531C06A209BD73143109C94AAA3710AF10703F9481BBFC02E221BDB2CCD8D8E8F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ecade4058146d6d35f781e3e606741af9ad73b5b9492593b64386777867617e7
                  • Instruction ID: 94c9c41509d1e4c5a8e08a38e1b7b6842f61b44e81293f867b60021e2a4278a4
                  • Opcode Fuzzy Hash: ecade4058146d6d35f781e3e606741af9ad73b5b9492593b64386777867617e7
                  • Instruction Fuzzy Hash: 0FC15B75A00206EFDB14CFA4C894AAFB7B5FF48304F10859AE905EB251E735ED82CB95
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Variant$ClearInitInitializeUninitialize
                  • String ID:
                  • API String ID: 1998397398-0
                  • Opcode ID: f60410ebaf799f575a0272eb71a9a30e4949b2f0c76ac615891a0c8e177dbc7e
                  • Instruction ID: 570cbaaab2342c233ebb97c5c5b9c444c4d80ccb1daae5e6e76c48cb97dd4743
                  • Opcode Fuzzy Hash: f60410ebaf799f575a0272eb71a9a30e4949b2f0c76ac615891a0c8e177dbc7e
                  • Instruction Fuzzy Hash: 17A16F75604200AFC710EF29C485A5EB7E5FF88719F04885EF949AB3A1DB38ED41CB5A
                  APIs
                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0049FC08,?), ref: 004605F0
                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0049FC08,?), ref: 00460608
                  • CLSIDFromProgID.OLE32(?,?,00000000,0049CC40,000000FF,?,00000000,00000800,00000000,?,0049FC08,?), ref: 0046062D
                  • _memcmp.LIBVCRUNTIME ref: 0046064E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FromProg$FreeTask_memcmp
                  • String ID:
                  • API String ID: 314563124-0
                  • Opcode ID: cbd5f666aa106cea6d9603c1148a75860384156e2eb44ce4e541e376e2cfc3ea
                  • Instruction ID: f9a59b8346efa6e10ba7795abcb0c6171adc659268d755ba3f0ce48382549377
                  • Opcode Fuzzy Hash: cbd5f666aa106cea6d9603c1148a75860384156e2eb44ce4e541e376e2cfc3ea
                  • Instruction Fuzzy Hash: E4815971A00209EFCB04DF94C984EEFB7B9FF89315F204169E506AB250DB75AE06CB65
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _free
                  • String ID:
                  • API String ID: 269201875-0
                  • Opcode ID: 6dd62e419302532069c506016c626128008f7196fd3326eb196f11de1745a17c
                  • Instruction ID: 02eb6fbf82337425a1bdca52d7c6f1392c4afccab4a99a9cb4b0804c59c437be
                  • Opcode Fuzzy Hash: 6dd62e419302532069c506016c626128008f7196fd3326eb196f11de1745a17c
                  • Instruction Fuzzy Hash: E9415031A00510ABFB257BBA9C466AF3AB4EF46374F14027BF418D22E1E67C4881567E
                  APIs
                  • GetWindowRect.USER32(00C9FC08,?), ref: 004962E2
                  • ScreenToClient.USER32(?,?), ref: 00496315
                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00496382
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$ClientMoveRectScreen
                  • String ID:
                  • API String ID: 3880355969-0
                  • Opcode ID: 8ff6126bd4dbe2165df318716aaafbe08c161f45f1ee59df23545c50577d147b
                  • Instruction ID: acd17833047793f661cc75963ab42a23303c6dd3afac53a11c8f06da8abf5692
                  • Opcode Fuzzy Hash: 8ff6126bd4dbe2165df318716aaafbe08c161f45f1ee59df23545c50577d147b
                  • Instruction Fuzzy Hash: 05512974A00209AFDF20DF68D890AAE7BB5EF55364F11817AF8159B3A0D734ED81CB54
                  APIs
                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00481AFD
                  • WSAGetLastError.WSOCK32 ref: 00481B0B
                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00481B8A
                  • WSAGetLastError.WSOCK32 ref: 00481B94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorLast$socket
                  • String ID:
                  • API String ID: 1881357543-0
                  • Opcode ID: 357181b83124c342bd93e3bae6cd8245922a1b3b9e689de9a9f956bcb3892dc8
                  • Instruction ID: 27d5f7e5e0494daf054d57574bee0fb3d261d84db41f2ed9cb4e1c6f7c1bcb7e
                  • Opcode Fuzzy Hash: 357181b83124c342bd93e3bae6cd8245922a1b3b9e689de9a9f956bcb3892dc8
                  • Instruction Fuzzy Hash: 93410734600200AFD720AF25C886F6A77E5AB4471CF5484AEF5169F3D2D779ED82CB94
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 92300467f74a8ce655cf74ca6bdaee5cc0430d91273f78a41d58d6439cffd922
                  • Instruction ID: e7627aa7255900311f934eb1525651e43d661f0787cc4fdac451f9efa051cafa
                  • Opcode Fuzzy Hash: 92300467f74a8ce655cf74ca6bdaee5cc0430d91273f78a41d58d6439cffd922
                  • Instruction Fuzzy Hash: 82413875A00304BFE7249F39CC41B6ABBA9EB9C714F20952FF201DB291D379990187D8
                  APIs
                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00475783
                  • GetLastError.KERNEL32(?,00000000), ref: 004757A9
                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 004757CE
                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 004757FA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateHardLink$DeleteErrorFileLast
                  • String ID:
                  • API String ID: 3321077145-0
                  • Opcode ID: 92ca9afd8fe41bba47b12c9aa4ef774f677980ddcb92bd2aed9e314b4f82b91b
                  • Instruction ID: f13808aea30b6ca16b11c775e8dbcf1b0d9e98dbc966274dcfaaa9eae21a4d25
                  • Opcode Fuzzy Hash: 92ca9afd8fe41bba47b12c9aa4ef774f677980ddcb92bd2aed9e314b4f82b91b
                  • Instruction Fuzzy Hash: 95412035600610DFCB11EF15C484A5EBBE1EF89318B15C499E84A6F3A1CB78FD40CB9A
                  APIs
                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00426D71,00000000,00000000,004282D9,?,004282D9,?,00000001,00426D71,?,00000001,004282D9,004282D9), ref: 0043D910
                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0043D999
                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0043D9AB
                  • __freea.LIBCMT ref: 0043D9B4
                    • Part of subcall function 00433820: RtlAllocateHeap.NTDLL(00000000,?,004D1444,?,0041FDF5,?,?,0040A976,00000010,004D1440,004013FC,?,004013C6,?,00401129), ref: 00433852
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                  • String ID:
                  • API String ID: 2652629310-0
                  • Opcode ID: 9ca8838d67c80da80add7f0228582bfa6c55ad9ab9b7d5d82d1829862c59d564
                  • Instruction ID: a53e0f3f1ef5dc868c73918eac7b199a89ae92d9bee37d62cdb11fb19589dfe8
                  • Opcode Fuzzy Hash: 9ca8838d67c80da80add7f0228582bfa6c55ad9ab9b7d5d82d1829862c59d564
                  • Instruction Fuzzy Hash: F8319FB2E0021AABDB259F65EC81EAF7BA5EF48310F05416AFC04D6251E739DD50CB94
                  APIs
                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00495352
                  • GetWindowLongW.USER32(?,000000F0), ref: 00495375
                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00495382
                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004953A8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LongWindow$InvalidateMessageRectSend
                  • String ID:
                  • API String ID: 3340791633-0
                  • Opcode ID: 511d5fb108f8a9e0f4715d13bedb196e9b3d0666c99cb93b483389f7228505c9
                  • Instruction ID: 0ba8443947eaa0b957b328e53b3c9f677e901b32d7279b64616371192311d226
                  • Opcode Fuzzy Hash: 511d5fb108f8a9e0f4715d13bedb196e9b3d0666c99cb93b483389f7228505c9
                  • Instruction Fuzzy Hash: C931F430A55A08EFEF329E54CC55BEA3F61AB04390F684133FE00962E0C3B89D40974A
                  APIs
                  • GetKeyboardState.USER32(?,76C1C0D0,?,00008000), ref: 0046ABF1
                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 0046AC0D
                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 0046AC74
                  • SendInput.USER32(00000001,?,0000001C,76C1C0D0,?,00008000), ref: 0046ACC6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: KeyboardState$InputMessagePostSend
                  • String ID:
                  • API String ID: 432972143-0
                  • Opcode ID: da4e50ac3e50fd23d4db430a3597b4f20b680fab065b9ad7b9561f43606702b3
                  • Instruction ID: 6b5f9ad4c50b4a72a5369b585876ced4ef989ed1503ca5ba201891c5ba0d6f35
                  • Opcode Fuzzy Hash: da4e50ac3e50fd23d4db430a3597b4f20b680fab065b9ad7b9561f43606702b3
                  • Instruction Fuzzy Hash: 5B312830A00B186FEF34CB658C087FB7BA5AB45310F04422BE485A22D0E37D9DA19B5B
                  APIs
                  • ClientToScreen.USER32(?,?), ref: 0049769A
                  • GetWindowRect.USER32(?,?), ref: 00497710
                  • PtInRect.USER32(?,?,00498B89), ref: 00497720
                  • MessageBeep.USER32(00000000), ref: 0049778C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Rect$BeepClientMessageScreenWindow
                  • String ID:
                  • API String ID: 1352109105-0
                  • Opcode ID: fe15a9e217fd7bcb431764799ed8c7dc07bd2885b048f42fb569177d8cc43f4a
                  • Instruction ID: 3148850e934442bae9ab9e8f245fa14f7965a9a10bb23296050446444e877a0a
                  • Opcode Fuzzy Hash: fe15a9e217fd7bcb431764799ed8c7dc07bd2885b048f42fb569177d8cc43f4a
                  • Instruction Fuzzy Hash: D3414A74619214EFCF11CF98C894EA97BF5BB49314F1941FAE8149B361C738A941CB98
                  APIs
                  • GetForegroundWindow.USER32 ref: 004916EB
                    • Part of subcall function 00463A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00463A57
                    • Part of subcall function 00463A3D: GetCurrentThreadId.KERNEL32 ref: 00463A5E
                    • Part of subcall function 00463A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004625B3), ref: 00463A65
                  • GetCaretPos.USER32(?), ref: 004916FF
                  • ClientToScreen.USER32(00000000,?), ref: 0049174C
                  • GetForegroundWindow.USER32 ref: 00491752
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                  • String ID:
                  • API String ID: 2759813231-0
                  • Opcode ID: 11bec0e1d696e26015cd59d74202ba3a32b375971c8823a83a654b90efd21bfd
                  • Instruction ID: 5366e923fa50b84878cb882f274bea31430ab8f9376de0b384123f59fd705def
                  • Opcode Fuzzy Hash: 11bec0e1d696e26015cd59d74202ba3a32b375971c8823a83a654b90efd21bfd
                  • Instruction Fuzzy Hash: 99311275D00149AFDB00EFA6C8C1CAEBBF9EF48308B5480BEE415E7251D6359E45CBA5
                  APIs
                  • CreateToolhelp32Snapshot.KERNEL32 ref: 0046D501
                  • Process32FirstW.KERNEL32(00000000,?), ref: 0046D50F
                  • Process32NextW.KERNEL32(00000000,?), ref: 0046D52F
                  • CloseHandle.KERNEL32(00000000), ref: 0046D5DC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                  • String ID:
                  • API String ID: 420147892-0
                  • Opcode ID: e68adc7a23f85812f23babb59a56f3755b6430aae0afbbbe77a2191eb9b5aaa7
                  • Instruction ID: 1e1dc077c6455b88d8ec1c9876a89db7f789963d91dc58c9a99f723df26bd887
                  • Opcode Fuzzy Hash: e68adc7a23f85812f23babb59a56f3755b6430aae0afbbbe77a2191eb9b5aaa7
                  • Instruction Fuzzy Hash: 5331B571508300AFD300EF55C881AAFBBF8EF99348F14093EF582922A1EB759944CB97
                  APIs
                    • Part of subcall function 00419BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00419BB2
                  • GetCursorPos.USER32(?), ref: 00499001
                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00457711,?,?,?,?,?), ref: 00499016
                  • GetCursorPos.USER32(?), ref: 0049905E
                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00457711,?,?,?), ref: 00499094
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                  • String ID:
                  • API String ID: 2864067406-0
                  • Opcode ID: 99250d01f5c890f46d6bf173303ea69ace29be20169c62719047dd2fe6ac5d5c
                  • Instruction ID: cec915663ca2c8bb586f83bcaca78c357c621a7dc6f8ca8e30b19da9d674b97e
                  • Opcode Fuzzy Hash: 99250d01f5c890f46d6bf173303ea69ace29be20169c62719047dd2fe6ac5d5c
                  • Instruction Fuzzy Hash: BE217E35600018BFCF258F99C898EEA7FB9EB49360F04407AF91547261C33A9DA0DB64
                  APIs
                  • GetFileAttributesW.KERNEL32(?,0049CB68), ref: 0046D2FB
                  • GetLastError.KERNEL32 ref: 0046D30A
                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 0046D319
                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0049CB68), ref: 0046D376
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateDirectory$AttributesErrorFileLast
                  • String ID:
                  • API String ID: 2267087916-0
                  • Opcode ID: a328578aa3fa1b59e8181e21dfa356f2da495c5afe57d429407714ed93bcf902
                  • Instruction ID: f89fce8798b4be60d35f4643ff900d9e52ff374399ac8a38389119623698ce0a
                  • Opcode Fuzzy Hash: a328578aa3fa1b59e8181e21dfa356f2da495c5afe57d429407714ed93bcf902
                  • Instruction Fuzzy Hash: AE218070E042019FC710DF24C88186B77E4AE55368F504A2FF899D73E1E7349986CB9B
                  APIs
                    • Part of subcall function 00461014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0046102A
                    • Part of subcall function 00461014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00461036
                    • Part of subcall function 00461014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00461045
                    • Part of subcall function 00461014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0046104C
                    • Part of subcall function 00461014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00461062
                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004615BE
                  • _memcmp.LIBVCRUNTIME ref: 004615E1
                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00461617
                  • HeapFree.KERNEL32(00000000), ref: 0046161E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                  • String ID:
                  • API String ID: 1592001646-0
                  • Opcode ID: c087934f54d4d3e469edce298c60a4ada1a724d013764d94ebe7646084812df3
                  • Instruction ID: 50c26a26040ff8dbda8b13f57dc9cd37f0013f6c500579c25d0b33cfc995a18a
                  • Opcode Fuzzy Hash: c087934f54d4d3e469edce298c60a4ada1a724d013764d94ebe7646084812df3
                  • Instruction Fuzzy Hash: B921A131E40108EFDF00DFA4C945BEFB7B8EF54354F08445AE441A7261E734AA05CBA9
                  APIs
                  • GetWindowLongW.USER32(?,000000EC), ref: 0049280A
                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00492824
                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00492832
                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00492840
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$Long$AttributesLayered
                  • String ID:
                  • API String ID: 2169480361-0
                  • Opcode ID: 39fd758a179dc2ddbf1195088ef25f8f6464044508af12ce5d3231460d8967c5
                  • Instruction ID: 8f022e8f9d96002622f07904c5b1bdddc3a109718bdd758345d8f015df80652a
                  • Opcode Fuzzy Hash: 39fd758a179dc2ddbf1195088ef25f8f6464044508af12ce5d3231460d8967c5
                  • Instruction Fuzzy Hash: 6B21B231204511BFDB14DB24CD84FAA7B95AF45328F14827AF4169B6E2C7B9EC42C7D8
                  APIs
                    • Part of subcall function 00468D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0046790A,?,000000FF,?,00468754,00000000,?,0000001C,?,?), ref: 00468D8C
                    • Part of subcall function 00468D7D: lstrcpyW.KERNEL32(00000000,?), ref: 00468DB2
                    • Part of subcall function 00468D7D: lstrcmpiW.KERNEL32(00000000,?,0046790A,?,000000FF,?,00468754,00000000,?,0000001C,?,?), ref: 00468DE3
                  • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00468754,00000000,?,0000001C,?,?,00000000), ref: 00467923
                  • lstrcpyW.KERNEL32(00000000,?), ref: 00467949
                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00468754,00000000,?,0000001C,?,?,00000000), ref: 00467984
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: lstrcmpilstrcpylstrlen
                  • String ID: cdecl
                  • API String ID: 4031866154-3896280584
                  • Opcode ID: cbd1a0a332b3244c1b25662a51b67cbdce4ae0660113ca5e4c182404778c95be
                  • Instruction ID: 53f48bd44cf00279fb8665855dee4d1e5cccdd5f11d70974a3dc63400054e2da
                  • Opcode Fuzzy Hash: cbd1a0a332b3244c1b25662a51b67cbdce4ae0660113ca5e4c182404778c95be
                  • Instruction Fuzzy Hash: A511E47A200301ABDB159F39C845E7B77E5EF55354B50402FE802C7364FB359805C76A
                  APIs
                  • SendMessageW.USER32(?,00001060,?,00000004), ref: 004956BB
                  • _wcslen.LIBCMT ref: 004956CD
                  • _wcslen.LIBCMT ref: 004956D8
                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00495816
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend_wcslen
                  • String ID:
                  • API String ID: 455545452-0
                  • Opcode ID: 82f448525df5596a1c6b9b3e414411d84ac42887d1fbcc34259e459b6fa5f1bd
                  • Instruction ID: 8c45eedf7b365e18674649eb3225455f92985a3dc9cc18e629b01723ff380147
                  • Opcode Fuzzy Hash: 82f448525df5596a1c6b9b3e414411d84ac42887d1fbcc34259e459b6fa5f1bd
                  • Instruction Fuzzy Hash: 9411E471600614A6DF21DF61DC81AEF3B7CEF11764B60403BF915D6181E7788984CB68
                  APIs
                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00461A47
                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00461A59
                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00461A6F
                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00461A8A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID:
                  • API String ID: 3850602802-0
                  • Opcode ID: ecb82eb4b60301f1cc60a35434cffae2a92b3d6cde291a4d691fbdf649d211d8
                  • Instruction ID: e331da36a062e35d37fa976fa192a343b57a296fe21c17f286506a53c3623515
                  • Opcode Fuzzy Hash: ecb82eb4b60301f1cc60a35434cffae2a92b3d6cde291a4d691fbdf649d211d8
                  • Instruction Fuzzy Hash: E4113C3AD01219FFEB10DBE5CD85FADBB78EB04750F2404A2E604B7290D6716E50DB98
                  APIs
                  • GetCurrentThreadId.KERNEL32 ref: 0046E1FD
                  • MessageBoxW.USER32(?,?,?,?), ref: 0046E230
                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0046E246
                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0046E24D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                  • String ID:
                  • API String ID: 2880819207-0
                  • Opcode ID: 39a9744079d8c27fbf30827386d6fa972f428657d55f2c39bc6967969ff0ae50
                  • Instruction ID: ed460d70f0ccfbd7bd935a062b0e4119e6a50dfc0c374fbaf66538ad3b79bcf8
                  • Opcode Fuzzy Hash: 39a9744079d8c27fbf30827386d6fa972f428657d55f2c39bc6967969ff0ae50
                  • Instruction Fuzzy Hash: 98110876A04214BBD7019BA99C49A9F7FADAB45310F004277FC14D3291E2748D0487A9
                  APIs
                  • CreateThread.KERNEL32(00000000,?,0042CFF9,00000000,00000004,00000000), ref: 0042D218
                  • GetLastError.KERNEL32 ref: 0042D224
                  • __dosmaperr.LIBCMT ref: 0042D22B
                  • ResumeThread.KERNEL32(00000000), ref: 0042D249
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Thread$CreateErrorLastResume__dosmaperr
                  • String ID:
                  • API String ID: 173952441-0
                  • Opcode ID: d71c01c8223f455c691f7a2305e40d5149a69b7bc07c5e8b9ca6ecbc1125fc43
                  • Instruction ID: db17610a689030999de63ba8fcbc3e52e12f0af083c40483d8da24f3cba52d70
                  • Opcode Fuzzy Hash: d71c01c8223f455c691f7a2305e40d5149a69b7bc07c5e8b9ca6ecbc1125fc43
                  • Instruction Fuzzy Hash: 7D012632E04124BBCB205BA6EC09BAF7A68DF81334F90026BF824921D0CF758801C6B9
                  APIs
                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0040604C
                  • GetStockObject.GDI32(00000011), ref: 00406060
                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 0040606A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CreateMessageObjectSendStockWindow
                  • String ID:
                  • API String ID: 3970641297-0
                  • Opcode ID: 74a43f8d5f4b6556e27c767d339bd78e9a4df1997d438f21f7593aeb8d606bea
                  • Instruction ID: fd46379a06a9b4beca9d1fcf9947322c6b43099cf34201dfad0d32ce35ad4846
                  • Opcode Fuzzy Hash: 74a43f8d5f4b6556e27c767d339bd78e9a4df1997d438f21f7593aeb8d606bea
                  • Instruction Fuzzy Hash: 7F11A172501509BFEF128FA4CC44EEB7B69EF18354F010127FA0562150C7369C60DBA8
                  APIs
                  • ___BuildCatchObject.LIBVCRUNTIME ref: 00423B56
                    • Part of subcall function 00423AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00423AD2
                    • Part of subcall function 00423AA3: ___AdjustPointer.LIBCMT ref: 00423AED
                  • _UnwindNestedFrames.LIBCMT ref: 00423B6B
                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00423B7C
                  • CallCatchBlock.LIBVCRUNTIME ref: 00423BA4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                  • String ID:
                  • API String ID: 737400349-0
                  • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                  • Instruction ID: cba2e192927fabe95338e8f2681ba899014443c4ece5666d716a894a48ca39e4
                  • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                  • Instruction Fuzzy Hash: 70018032200158BBCF116E96DC42EEB7F7DEF88759F44401AFE0856121C33AE961DBA4
                  APIs
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,004013C6,00000000,00000000,?,0043301A,004013C6,00000000,00000000,00000000,?,0043328B,00000006,FlsSetValue), ref: 004330A5
                  • GetLastError.KERNEL32(?,0043301A,004013C6,00000000,00000000,00000000,?,0043328B,00000006,FlsSetValue,004A2290,FlsSetValue,00000000,00000364,?,00432E46), ref: 004330B1
                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0043301A,004013C6,00000000,00000000,00000000,?,0043328B,00000006,FlsSetValue,004A2290,FlsSetValue,00000000), ref: 004330BF
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LibraryLoad$ErrorLast
                  • String ID:
                  • API String ID: 3177248105-0
                  • Opcode ID: ac4e29826eddcbdc6b1d3ee23073d414a3116961cdf09809dc0df61eea881cc1
                  • Instruction ID: 928eb022ac10566a03ecd672be19be6db230cea969cd428a119e7f46e4e38b1b
                  • Opcode Fuzzy Hash: ac4e29826eddcbdc6b1d3ee23073d414a3116961cdf09809dc0df61eea881cc1
                  • Instruction Fuzzy Hash: E4012032742622ABCB354F789C84A577BA89F49B73F100632F905D7294C725D901C6E8
                  APIs
                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0046747F
                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00467497
                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 004674AC
                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 004674CA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Type$Register$FileLoadModuleNameUser
                  • String ID:
                  • API String ID: 1352324309-0
                  • Opcode ID: 7944630ef19536910aee981060a8da3353241e127b9519e7ef58df84406ec64f
                  • Instruction ID: beb988d59e00a62ee2ce3875196cc7b0ebf39a15ac90f3719256e2de0d627e3a
                  • Opcode Fuzzy Hash: 7944630ef19536910aee981060a8da3353241e127b9519e7ef58df84406ec64f
                  • Instruction Fuzzy Hash: 1D11A1B5205310ABE7208F14DD4DB927BFCEB40B08F10856BE616D6151EB78E904DFA6
                  APIs
                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0046ACD3,?,00008000), ref: 0046B0C4
                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0046ACD3,?,00008000), ref: 0046B0E9
                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0046ACD3,?,00008000), ref: 0046B0F3
                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0046ACD3,?,00008000), ref: 0046B126
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CounterPerformanceQuerySleep
                  • String ID:
                  • API String ID: 2875609808-0
                  • Opcode ID: c75bb97d45f2952945b32a975a796f0114d2e7ce6c5e78c3969ed1c5ee721cc8
                  • Instruction ID: 390784155f30ae1bbc1060f16be08973ec1ab4dc5c89e85098efdbc7250ea085
                  • Opcode Fuzzy Hash: c75bb97d45f2952945b32a975a796f0114d2e7ce6c5e78c3969ed1c5ee721cc8
                  • Instruction Fuzzy Hash: B8118E30C0051CEBCF009FE4D9996EEBF78FF5A310F0040A7D941B2245DB3485918B9A
                  APIs
                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00462DC5
                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00462DD6
                  • GetCurrentThreadId.KERNEL32 ref: 00462DDD
                  • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00462DE4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                  • String ID:
                  • API String ID: 2710830443-0
                  • Opcode ID: 59508c552e3cc7491b23046f1937814a2dca9f13bfeb44d5ad3e72d8d76b17d0
                  • Instruction ID: c59a90da35369f06fa3de70585eb304e511b357d78ff98191718303dcb8779a5
                  • Opcode Fuzzy Hash: 59508c552e3cc7491b23046f1937814a2dca9f13bfeb44d5ad3e72d8d76b17d0
                  • Instruction Fuzzy Hash: C1E092711416247BDB201B729D4EFEB3E6CEFA2BA1F400437F105D1090AAE5C841C6BA
                  APIs
                    • Part of subcall function 00419639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00419693
                    • Part of subcall function 00419639: SelectObject.GDI32(?,00000000), ref: 004196A2
                    • Part of subcall function 00419639: BeginPath.GDI32(?), ref: 004196B9
                    • Part of subcall function 00419639: SelectObject.GDI32(?,00000000), ref: 004196E2
                  • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00498887
                  • LineTo.GDI32(?,?,?), ref: 00498894
                  • EndPath.GDI32(?), ref: 004988A4
                  • StrokePath.GDI32(?), ref: 004988B2
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                  • String ID:
                  • API String ID: 1539411459-0
                  • Opcode ID: 7bc6e9994dd55fd8f7022c5eb541b94d13f54f74bed9d9188e9eeb692abb72c1
                  • Instruction ID: eb68587b9d3d583e4183ff923d5e6d3c68104ba52187840049a69319356bc4ea
                  • Opcode Fuzzy Hash: 7bc6e9994dd55fd8f7022c5eb541b94d13f54f74bed9d9188e9eeb692abb72c1
                  • Instruction Fuzzy Hash: 2BF03A36042258FADB126F94AC0EFCA3F59AF16310F048066FA11651E1C7795551CFBD
                  APIs
                  • GetSysColor.USER32(00000008), ref: 004198CC
                  • SetTextColor.GDI32(?,?), ref: 004198D6
                  • SetBkMode.GDI32(?,00000001), ref: 004198E9
                  • GetStockObject.GDI32(00000005), ref: 004198F1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Color$ModeObjectStockText
                  • String ID:
                  • API String ID: 4037423528-0
                  • Opcode ID: 11c5f26b568b1e63640573b31119633356310989e2e78dd41cfbb696616d4c47
                  • Instruction ID: ac45f2cb34c74f59573de4f4a4e1fc36368f674dfcfe5289bf1e9ed062af58a6
                  • Opcode Fuzzy Hash: 11c5f26b568b1e63640573b31119633356310989e2e78dd41cfbb696616d4c47
                  • Instruction Fuzzy Hash: CCE06531244244BBDB215B74BC49BD93F10AB22336F04823BF6FA541E2C77546449F18
                  APIs
                  • GetCurrentThread.KERNEL32 ref: 00461634
                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,004611D9), ref: 0046163B
                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004611D9), ref: 00461648
                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,004611D9), ref: 0046164F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CurrentOpenProcessThreadToken
                  • String ID:
                  • API String ID: 3974789173-0
                  • Opcode ID: 8df5ca83e93e752b04bd363793e9e7352183de52f3d8b77dce073e3b21016991
                  • Instruction ID: 411b68ab35329f549b658a19f561e1be6e4162bf62ad0a2b59965ea8ee78cb1b
                  • Opcode Fuzzy Hash: 8df5ca83e93e752b04bd363793e9e7352183de52f3d8b77dce073e3b21016991
                  • Instruction Fuzzy Hash: 06E08635601211EBD7201FE09E4DB473B7CAF64791F18883AF646C9090E6384440C7A9
                  APIs
                  • GetDesktopWindow.USER32 ref: 0045D858
                  • GetDC.USER32(00000000), ref: 0045D862
                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0045D882
                  • ReleaseDC.USER32(?), ref: 0045D8A3
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CapsDesktopDeviceReleaseWindow
                  • String ID:
                  • API String ID: 2889604237-0
                  • Opcode ID: 4ea8d5ce215699fcaba80896e02c5fb2d702ccddd7793033bb46af41cf8c6fe7
                  • Instruction ID: 14c8cf753dd7c871a1456890bbb6bf6f828af7fb0b92da75c78c6187f48285f7
                  • Opcode Fuzzy Hash: 4ea8d5ce215699fcaba80896e02c5fb2d702ccddd7793033bb46af41cf8c6fe7
                  • Instruction Fuzzy Hash: 9FE01AB1C00205DFCF41AFA1D88866DBBB2FB18311F14803AE806E7250CB399942AF59
                  APIs
                  • GetDesktopWindow.USER32 ref: 0045D86C
                  • GetDC.USER32(00000000), ref: 0045D876
                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0045D882
                  • ReleaseDC.USER32(?), ref: 0045D8A3
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CapsDesktopDeviceReleaseWindow
                  • String ID:
                  • API String ID: 2889604237-0
                  • Opcode ID: a5986440429c24ebaa17a80c779d8c3fae3533a4e75e0991a34354b205f4686e
                  • Instruction ID: 241a95357ab9049e6a5c98e18df3fa8369b260ced04cdedd243e354f444b0b92
                  • Opcode Fuzzy Hash: a5986440429c24ebaa17a80c779d8c3fae3533a4e75e0991a34354b205f4686e
                  • Instruction Fuzzy Hash: 3BE01AB1C00200DFCF409FA0D88866DBBB1BB18310F14802AE806E7250CB3859029F58
                  APIs
                    • Part of subcall function 00407620: _wcslen.LIBCMT ref: 00407625
                  • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00474ED4
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Connection_wcslen
                  • String ID: *$LPT
                  • API String ID: 1725874428-3443410124
                  • Opcode ID: 0f2de4cef1c92e406f45c7d7bfb68dc7079078a50d24ac693f08300b2e3a752f
                  • Instruction ID: 049d17bd669cf1602bf8e65d896af253228af9f88d60f18a8b1b7b90b9fbb2ad
                  • Opcode Fuzzy Hash: 0f2de4cef1c92e406f45c7d7bfb68dc7079078a50d24ac693f08300b2e3a752f
                  • Instruction Fuzzy Hash: 0D915075A002149FCB14DF54C484EEABBF1AF84318F19C09AE40A9F392D739ED86CB95
                  APIs
                  • __startOneArgErrorHandling.LIBCMT ref: 0042E30D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ErrorHandling__start
                  • String ID: pow
                  • API String ID: 3213639722-2276729525
                  • Opcode ID: b7cb9af4af866a8c42950cd0739b5cf10434c4bccb06c92a1e51be8634eb1266
                  • Instruction ID: 2821bb0f82b8bdc5c553cb181ba7bf057006bf9471061ee984d9b40e4d5b8bc7
                  • Opcode Fuzzy Hash: b7cb9af4af866a8c42950cd0739b5cf10434c4bccb06c92a1e51be8634eb1266
                  • Instruction Fuzzy Hash: 47517EA1B0C10296DB31B719E94237B3B94AF44741F7099ABE4D6423E9DB3D8C819A4E
                  APIs
                  • CharUpperBuffW.USER32(0045569E,00000000,?,0049CC08,?,00000000,00000000), ref: 004878DD
                    • Part of subcall function 00406B57: _wcslen.LIBCMT ref: 00406B6A
                  • CharUpperBuffW.USER32(0045569E,00000000,?,0049CC08,00000000,?,00000000,00000000), ref: 0048783B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: BuffCharUpper$_wcslen
                  • String ID: <sL
                  • API String ID: 3544283678-2840126056
                  • Opcode ID: 5748959d27f900664ddc78cb2de64b8d31efa6dc2385487def3a1804e03c8f01
                  • Instruction ID: 8b3ffcb8c07145f5c2d773d2e34e2ba3481769b4097090b6d640319bd0ba8491
                  • Opcode Fuzzy Hash: 5748959d27f900664ddc78cb2de64b8d31efa6dc2385487def3a1804e03c8f01
                  • Instruction Fuzzy Hash: F4615172914118AACF04FBA5CCA1DFEB378BF14704B54453BE542B3191EF389A05CBA9
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID:
                  • String ID: #
                  • API String ID: 0-1885708031
                  • Opcode ID: 7c07d687d0d344e73f2dfd5cb023900affe16d9ffcc76a2759b3c5057d0788e8
                  • Instruction ID: bbf735d9ad7b58113628b44a8e7decb8f79f59637d8e95e5a96792833a3e29c1
                  • Opcode Fuzzy Hash: 7c07d687d0d344e73f2dfd5cb023900affe16d9ffcc76a2759b3c5057d0788e8
                  • Instruction Fuzzy Hash: AA513339900206DFDB18DF2AC090AFA7BA8EF19311F24405BEC519B3C1D6389E87CB58
                  APIs
                  • Sleep.KERNEL32(00000000), ref: 0041F2A2
                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041F2BB
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: GlobalMemorySleepStatus
                  • String ID: @
                  • API String ID: 2783356886-2766056989
                  • Opcode ID: f90ac7e9df806ae8e8400d4f6093d91cfacfe7719c73916ef53f5c2671a71f02
                  • Instruction ID: e3e0bbd6b779b80f1574f1121f07a00789148acc9043f5faf18348846043bd1c
                  • Opcode Fuzzy Hash: f90ac7e9df806ae8e8400d4f6093d91cfacfe7719c73916ef53f5c2671a71f02
                  • Instruction Fuzzy Hash: C45168714087459BD320AF11DC86BABBBF8FB84304F81896EF1D9510A5EB349529CB6B
                  APIs
                  • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 004857E0
                  • _wcslen.LIBCMT ref: 004857EC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: BuffCharUpper_wcslen
                  • String ID: CALLARGARRAY
                  • API String ID: 157775604-1150593374
                  • Opcode ID: b6498c42b7b24083c7318223b762d88d00d8191bc09e7c8628ee91f01136799a
                  • Instruction ID: b902548b1097622b2b007de64ea02a7a2c39ba15d2589f4f2ea8c250aefa9038
                  • Opcode Fuzzy Hash: b6498c42b7b24083c7318223b762d88d00d8191bc09e7c8628ee91f01136799a
                  • Instruction Fuzzy Hash: 2C41B131E002059FCB14FFAAC8818AEBBB5EF59354F10442FE505A7391E7389D81CB98
                  APIs
                  • _wcslen.LIBCMT ref: 0047D130
                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0047D13A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CrackInternet_wcslen
                  • String ID: |
                  • API String ID: 596671847-2343686810
                  • Opcode ID: ba85e0ec0627377281ecdcaabcc0fed5c30b1968579b691c4cdeacdacddbf4ec
                  • Instruction ID: 877ede918cba692cdcd5a11f51ef432f6379ab5f4c14447815848413bd8f36df
                  • Opcode Fuzzy Hash: ba85e0ec0627377281ecdcaabcc0fed5c30b1968579b691c4cdeacdacddbf4ec
                  • Instruction Fuzzy Hash: 78311E71D10219ABCF15EFA5CC85AEE7FB9FF04304F40402AF819B6261D7359956CBA4
                  APIs
                  • DestroyWindow.USER32(?,?,?,?), ref: 00493621
                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0049365C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$DestroyMove
                  • String ID: static
                  • API String ID: 2139405536-2160076837
                  • Opcode ID: fa237b25923d0265f40b8663ab38f2609312e88f27b505557785ea2994667bfe
                  • Instruction ID: 13b23a05629a1c422e1ebffbf61b2ca35784a7eaad30f15237478ec74bdf463b
                  • Opcode Fuzzy Hash: fa237b25923d0265f40b8663ab38f2609312e88f27b505557785ea2994667bfe
                  • Instruction Fuzzy Hash: 2231A171100204AADB20DF68DC80EFB77A9FF49724F00862EF855D7280DA39AD81C768
                  APIs
                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0049461F
                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00494634
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID: '
                  • API String ID: 3850602802-1997036262
                  • Opcode ID: f9aac446b699ccde0d962463543365e2f8ff15e65cc60a94f0a32b8828f95919
                  • Instruction ID: b670a6df3bfb36399edf79c3a21aa4b452bd0c69e87ca9b6b1efca1536d34c0b
                  • Opcode Fuzzy Hash: f9aac446b699ccde0d962463543365e2f8ff15e65cc60a94f0a32b8828f95919
                  • Instruction Fuzzy Hash: 803137B4A01209AFDF14CFA9C990BDA7BB5FB49310F11407AEA04AB391D734A942CF94
                  APIs
                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0049327C
                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00493287
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID: Combobox
                  • API String ID: 3850602802-2096851135
                  • Opcode ID: b2e6bd7bde28a5fca05dee674e077ab900e0af6054f5d2a78211b50724a9ec20
                  • Instruction ID: 53c26a8419a2af9500000f2e8faa10e46a2095fa3473df88d3b17126a3616a67
                  • Opcode Fuzzy Hash: b2e6bd7bde28a5fca05dee674e077ab900e0af6054f5d2a78211b50724a9ec20
                  • Instruction Fuzzy Hash: 1A11E2713002087FFF21DF94DC80EBB3B6AEB953A9F10013AF918A7290D6399D518764
                  APIs
                    • Part of subcall function 0040600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0040604C
                    • Part of subcall function 0040600E: GetStockObject.GDI32(00000011), ref: 00406060
                    • Part of subcall function 0040600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0040606A
                  • GetWindowRect.USER32(00000000,?), ref: 0049377A
                  • GetSysColor.USER32(00000012), ref: 00493794
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                  • String ID: static
                  • API String ID: 1983116058-2160076837
                  • Opcode ID: abd42e7da819cb3714455c727f5ce1a7d6fb2b90bfbab7ca4dd80a61a0709472
                  • Instruction ID: b11262674f5e18e9993189c4d7777c52fd53b031a25f2c3957537cd78a81b65d
                  • Opcode Fuzzy Hash: abd42e7da819cb3714455c727f5ce1a7d6fb2b90bfbab7ca4dd80a61a0709472
                  • Instruction Fuzzy Hash: F0113AB2610209AFDF00DFA8CC46EEA7BB8FB09315F01496AFD55E2250D739E8619B54
                  APIs
                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0047CD7D
                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0047CDA6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Internet$OpenOption
                  • String ID: <local>
                  • API String ID: 942729171-4266983199
                  • Opcode ID: d89e58862155fc217246a4b1e07bb642df3261dbfdeb7b68bd711acd35ac8a90
                  • Instruction ID: 8339a9b9194697649c21a59ed4a72e8ab03c1194750d865b6d1bcbb7212598fa
                  • Opcode Fuzzy Hash: d89e58862155fc217246a4b1e07bb642df3261dbfdeb7b68bd711acd35ac8a90
                  • Instruction Fuzzy Hash: 6B11A371245632BAD7344A668CC5FE7BEACEB527A4F00823FB10D92180D6689841D6F4
                  APIs
                  • GetWindowTextLengthW.USER32(00000000), ref: 004934AB
                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004934BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LengthMessageSendTextWindow
                  • String ID: edit
                  • API String ID: 2978978980-2167791130
                  • Opcode ID: 665bea3e8908f2a30d1b24ab1824d2e4a124b83566d2ed456025cb0841e0e1cb
                  • Instruction ID: 99ad80856f2139ecd37a81d857a61cbe63f5ec37252cfc98367f74baf7ca364f
                  • Opcode Fuzzy Hash: 665bea3e8908f2a30d1b24ab1824d2e4a124b83566d2ed456025cb0841e0e1cb
                  • Instruction Fuzzy Hash: 4E11BF71100108ABEF118F64DC84AAB3BAAEB16379F514336F961932E0C739EC519B68
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  • CharUpperBuffW.USER32(?,?,?), ref: 00466CB6
                  • _wcslen.LIBCMT ref: 00466CC2
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen$BuffCharUpper
                  • String ID: STOP
                  • API String ID: 1256254125-2411985666
                  • Opcode ID: dc70c5d4ee27dc69aa86e32f5615b99e17181f250a9658c833637702a8fd888e
                  • Instruction ID: 2fdac53f4e714fa6a7d542c033d70be5027df1260e0617ae96c54ed08d1e7e48
                  • Opcode Fuzzy Hash: dc70c5d4ee27dc69aa86e32f5615b99e17181f250a9658c833637702a8fd888e
                  • Instruction Fuzzy Hash: 33010432A109268ACB20AFBDDC809BF73A4EE60714702053BE86292291FB39DC40C659
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                    • Part of subcall function 00463CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00463CCA
                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00461C46
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ClassMessageNameSend_wcslen
                  • String ID: ComboBox$ListBox
                  • API String ID: 624084870-1403004172
                  • Opcode ID: cb895c6372d0d6fae9861d0dd1e860a741e0e1362341cb1efa1fda6e7dfd6e9a
                  • Instruction ID: 0597a438504da59e00f8abc4464d5a247d5c7bee5e0e142cd15731590097fbc9
                  • Opcode Fuzzy Hash: cb895c6372d0d6fae9861d0dd1e860a741e0e1362341cb1efa1fda6e7dfd6e9a
                  • Instruction Fuzzy Hash: B601A776A8110466DB14EB91C952EFF77A89B11344F14002FB906772D2FA38AE18D6BB
                  APIs
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                    • Part of subcall function 00463CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00463CCA
                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00461CC8
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: ClassMessageNameSend_wcslen
                  • String ID: ComboBox$ListBox
                  • API String ID: 624084870-1403004172
                  • Opcode ID: c2a5318a73241cc1dc5b1058b879896892afc14fe025959285147d941a2474ba
                  • Instruction ID: a10a4e44750d24e2bdb598702259e0ba1e539dbd7a79f56e067323db74a2a14c
                  • Opcode Fuzzy Hash: c2a5318a73241cc1dc5b1058b879896892afc14fe025959285147d941a2474ba
                  • Instruction Fuzzy Hash: 0D01A7B6A4015466DB04EB91CA01EFF77A89B11344F14002BB801732D2FA389F08D67B
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 0041A529
                    • Part of subcall function 00409CB3: _wcslen.LIBCMT ref: 00409CBD
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Init_thread_footer_wcslen
                  • String ID: ,%M$3yE
                  • API String ID: 2551934079-2470809835
                  • Opcode ID: b56e633070973a4b0827c1245d19bcaa9b428485a07fc54579d19c4242eef372
                  • Instruction ID: 137d309c537f08a502bcebdcbeb51410c9490a45075ad08a3231cdcb7726ddd3
                  • Opcode Fuzzy Hash: b56e633070973a4b0827c1245d19bcaa9b428485a07fc54579d19c4242eef372
                  • Instruction Fuzzy Hash: 08014731706210A7CA00F769B96BAAE33659B05754F90006FF501272C3DE6C6D81869F
                  APIs
                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004D3018,004D305C), ref: 004981BF
                  • CloseHandle.KERNEL32 ref: 004981D1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CloseCreateHandleProcess
                  • String ID: \0M
                  • API String ID: 3712363035-1305216280
                  • Opcode ID: ad4302e00514b246930092051f5da298722bef87b003d669d467c42e53d20b61
                  • Instruction ID: bf647492967352d073276b5a149b0e9915153a0acee9f49ac13f981fa327f8bf
                  • Opcode Fuzzy Hash: ad4302e00514b246930092051f5da298722bef87b003d669d467c42e53d20b61
                  • Instruction Fuzzy Hash: 41F03AB1641310BAE3216F65AC4AFB73A9CDB05756F004437BE08D51A2D6798E0082BE
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: _wcslen
                  • String ID: 3, 3, 16, 1
                  • API String ID: 176396367-3042988571
                  • Opcode ID: fa268ca0598650fcfac9f8558f63851eae8667f213d71d306bccb0f27b7f2969
                  • Instruction ID: 3b9cbf0cfa78f0638a43922b0814ada425af960758d9d1aa3e1598ca11300ed7
                  • Opcode Fuzzy Hash: fa268ca0598650fcfac9f8558f63851eae8667f213d71d306bccb0f27b7f2969
                  • Instruction Fuzzy Hash: F7E02B46304230119271327BACD1A7F5689CFC5BA07741C2FF985C2366EADCCDD193A8
                  APIs
                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00460B23
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Message
                  • String ID: AutoIt$Error allocating memory.
                  • API String ID: 2030045667-4017498283
                  • Opcode ID: 21ea5055e0a6e1223d389dae4784e278c60b93e1c97d0d9558bb0c8107320035
                  • Instruction ID: ec9470fa480f97f4df7d426a9cae74e88c48e8a23ce6c9b125831f8114b73b7b
                  • Opcode Fuzzy Hash: 21ea5055e0a6e1223d389dae4784e278c60b93e1c97d0d9558bb0c8107320035
                  • Instruction Fuzzy Hash: F4E0483124431836D61437957C43FD97E848F05F55F20447FF758555C39BE9649046ED
                  APIs
                    • Part of subcall function 0041F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00420D71,?,?,?,0040100A), ref: 0041F7CE
                  • IsDebuggerPresent.KERNEL32(?,?,?,0040100A), ref: 00420D75
                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0040100A), ref: 00420D84
                  Strings
                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00420D7F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                  • API String ID: 55579361-631824599
                  • Opcode ID: 065a4c9dbba9de95bf4742d6beed35bc68529f956b744a891e42663b2337a4be
                  • Instruction ID: c5d4853c5c1b1fce94aee53896b707ea2e933c2cfdf6354c90a1adcc212809e9
                  • Opcode Fuzzy Hash: 065a4c9dbba9de95bf4742d6beed35bc68529f956b744a891e42663b2337a4be
                  • Instruction Fuzzy Hash: 7AE092703013118BDB309FB9E4447427BE0AF10744F40897FE886C6652DBB8E4488B99
                  APIs
                  • __Init_thread_footer.LIBCMT ref: 0041E3D5
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: Init_thread_footer
                  • String ID: 0%M$8%M
                  • API String ID: 1385522511-666571738
                  • Opcode ID: 36b27be9e0a83e9aa98581938c918848fc8ca54e9c586360ab56cc84b83fe9f2
                  • Instruction ID: 74f85b7c586fbea48275e29b091cfe4ae65d2a14ce13d66fff79cd8f95e1413d
                  • Opcode Fuzzy Hash: 36b27be9e0a83e9aa98581938c918848fc8ca54e9c586360ab56cc84b83fe9f2
                  • Instruction Fuzzy Hash: 89E02035501924DBCE04971AB678DCA3351BB143247D002BBEC22C72D19BBC5881855D
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: LocalTime
                  • String ID: %.3d$X64
                  • API String ID: 481472006-1077770165
                  • Opcode ID: 2db8d864e82e9443b24b989cbfe5594a8cb9d6c2eec2c4614c7c7a76411d85fe
                  • Instruction ID: 38b857cef762aee038f24abea3c29ea6d50e0b75d9b6a8f5b8584eac959ee1e6
                  • Opcode Fuzzy Hash: 2db8d864e82e9443b24b989cbfe5594a8cb9d6c2eec2c4614c7c7a76411d85fe
                  • Instruction Fuzzy Hash: 35D012B5C08108EACBA097D0DC459F9B37CAF18302F6084A7FC0691042D62CD54EEB6B
                  APIs
                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0049236C
                  • PostMessageW.USER32(00000000), ref: 00492373
                    • Part of subcall function 0046E97B: Sleep.KERNEL32 ref: 0046E9F3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FindMessagePostSleepWindow
                  • String ID: Shell_TrayWnd
                  • API String ID: 529655941-2988720461
                  • Opcode ID: 9e1d063b7c62fc5eb741fb1641bc1c1ccf46c772bc3719f8f1f448acc4471665
                  • Instruction ID: 4fbe58dc7f34bcc61f3faa01408e30d6f80e66574df614ba2c414afb8f37d73a
                  • Opcode Fuzzy Hash: 9e1d063b7c62fc5eb741fb1641bc1c1ccf46c772bc3719f8f1f448acc4471665
                  • Instruction Fuzzy Hash: 92D0A936381310BAE6A4A3319C4FFC666249B10B10F01493B7201AA0D0C8A4A8008A0C
                  APIs
                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0049232C
                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0049233F
                    • Part of subcall function 0046E97B: Sleep.KERNEL32 ref: 0046E9F3
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1435555268.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1435509846.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1435656075.00000000004C2000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1436989591.00000000004CC000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1437019108.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_COMMERCAIL INVOICE AND DHL AWB TRACKING DETAILS.jbxd
                  Similarity
                  • API ID: FindMessagePostSleepWindow
                  • String ID: Shell_TrayWnd
                  • API String ID: 529655941-2988720461
                  • Opcode ID: e079d67999e0d67ae200226728b429cca74cceb1a253ffad2ffcc98b29bed123
                  • Instruction ID: 612e0c117d57113be67f559a3391629b3461a494fcf43874db1c798f2140144d
                  • Opcode Fuzzy Hash: e079d67999e0d67ae200226728b429cca74cceb1a253ffad2ffcc98b29bed123
                  • Instruction Fuzzy Hash: 53D0223A380310B7E6A4B331DC4FFC67A249F10B10F01493B7305AA0D0C8F4A800CA0C