Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe

Overview

General Information

Sample name:DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
Analysis ID:1585896
MD5:3aaa7d691a22ec1b7f9d03d63c7017a3
SHA1:b4a38d0c4b81a50fb40e407e4d439fd18cca89c2
SHA256:f214476db64248c82861c7b27fd55186beaf2e292cbe013d47f17305c3b2e95d
Tags:exeuser-threatcat_ch
Infos:

Detection

GuLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Sample has a suspicious name (potential lure to open the executable)
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4096311949.0000000003046000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeVirustotal: Detection: 23%Perma Link
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeReversingLabs: Detection: 13%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.7% probability
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeJoe Sandbox ML: detected
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_00405861
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004052FE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052FE

    System Summary

    barindex
    Source: initial sampleStatic PE information: Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
    Source: initial sampleStatic PE information: Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic file information: Suspicious name
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_033921E4 NtAllocateVirtualMemory,0_2_033921E4
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_0040330D
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004067250_2_00406725
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00404B3D0_2_00404B3D
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_033924040_2_03392404
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_033656670_2_03365667
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal76.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_0040330D
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004045CA GetDlgItem,SetWindowTextA,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,0_2_004045CA
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004020CB LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,0_2_004020CB
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernesJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsw8FA.tmpJump to behavior
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeVirustotal: Detection: 23%
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeReversingLabs: Detection: 13%
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile read: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
    Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.4096311949.0000000003046000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_10001A5D LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_03047594 push ds; retf 0_2_03047598
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0304A594 push ds; retf 0_2_0304A598
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsw94A.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeRDTSC instruction interceptor: First address: 3356176 second address: 3356176 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F19B0D3B691h 0x00000006 cmp bx, dx 0x00000009 cmp edx, 75070339h 0x0000000f inc ebp 0x00000010 inc ebx 0x00000011 rdtsc
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsw94A.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00405861 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_00405861
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040639C FindFirstFileA,FindClose,0_2_0040639C
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004026F8 FindFirstFileA,0_2_004026F8
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4578
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4407
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00401759 lstrcatA,CompareFileTime,LdrInitializeThunk,SetFileTime,CloseHandle,lstrcatA,0_2_00401759
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_10001A5D LdrInitializeThunk,GlobalAlloc,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,lstrcpyA,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,GlobalFree,GlobalFree,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,GlobalFree,LdrInitializeThunk,LdrInitializeThunk,lstrcpyA,LdrInitializeThunk,LdrInitializeThunk,GetModuleHandleA,LdrInitializeThunk,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
    Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040330D EntryPoint,SetErrorMode,GetVersion,lstrlenA,LdrInitializeThunk,#17,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,LdrInitializeThunk,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LdrInitializeThunk,ExitWindowsEx,ExitProcess,0_2_0040330D
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    11
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe24%VirustotalBrowse
    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe13%ReversingLabs
    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsw94A.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsw94A.tmp\System.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorDHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exefalse
      high
      http://nsis.sf.net/NSIS_ErrorErrorDHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exefalse
        high
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1585896
        Start date and time:2025-01-08 13:21:05 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 46s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:5
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
        Detection:MAL
        Classification:mal76.troj.evad.winEXE@1/8@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 99%
        • Number of executed functions: 45
        • Number of non-executed functions: 37
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240s for sample files taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded IPs from analysis (whitelisted): 4.175.87.197, 13.107.246.45
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        No simulations
        No context
        No context
        No context
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsw94A.tmp\System.dllasXlZG3aW6.exeGet hashmaliciousRemcos, GuLoaderBrowse
          asXlZG3aW6.exeGet hashmaliciousGuLoaderBrowse
            aMfizaMilo.exeGet hashmaliciousGuLoaderBrowse
              1ppvR5VRT6.exeGet hashmaliciousGuLoaderBrowse
                Ozb8aojWew.exeGet hashmaliciousGuLoaderBrowse
                  aMfizaMilo.exeGet hashmaliciousGuLoaderBrowse
                    1ppvR5VRT6.exeGet hashmaliciousGuLoaderBrowse
                      Ozb8aojWew.exeGet hashmaliciousGuLoaderBrowse
                        Documents.com.exeGet hashmaliciousGuLoaderBrowse
                          Documents.com.exeGet hashmaliciousGuLoaderBrowse
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):126219
                            Entropy (8bit):1.2476140630029537
                            Encrypted:false
                            SSDEEP:768:ypw+1R1HmrJqSpqHt8wu/Uc8A82XMK80Wnseb5duoe2njOg5X/G7:yEpmwKm
                            MD5:BE1AEA45CD04BE1806BE5777F6529ECE
                            SHA1:B3E4893ADB16D8677032B9B8C3B419FB6F9040D2
                            SHA-256:34DDE02E575CF514C32DF1108FB8D83E22831B5A13733793C7B00C1B119320DE
                            SHA-512:9649E9AB3AB9C3290E118E4E8F4354B067259B96E06753E9F1EC97AD4A5A41EE3438411D0166B7F390EA41489629D8338AF00FAB7964C5C91EEDE4978AFC7FC8
                            Malicious:false
                            Reputation:low
                            Preview:......@.......................................................=...................................J..............................................................+...v....U......S...+)..........................................................l...........................7.......l.h..................H...^...<....................................................8..................................................v..............................._..............X....>...................{...H.......................h.........................................[.............................Rh... ..................6..............................................^............................................u....a............T......|}............................................~..............S......v.........................................u......................................................................../.................................................l............................>..........3..
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):160111
                            Entropy (8bit):4.61177827745717
                            Encrypted:false
                            SSDEEP:1536:OCVoX8mo2OJSJ1Raq+jUcN07YmT8NIhUXhjTBZk/UlwxXOvo8xvC57V4:OCR2oSPsqE5N07KIejTBW/UlTnh0u
                            MD5:DAC8AD7A61DA75BF3FD4CFD961B59785
                            SHA1:E6ABF71F06625242C8A9C259432366CF157E80A1
                            SHA-256:2FF1149DAB333F24B706F052FEF92B2E1A10A83228581E4D299439C54C6873E5
                            SHA-512:6D561D2C74B045B65DE3BCE219E16A1EBDC04D5496E7C8C5978DBE2B7CF121AB6C4D28C71E046E07E992F7A72CB50D895E35548E796458EDC32125A8E2EBD4B3
                            Malicious:false
                            Reputation:low
                            Preview:.....A.......................555................O.e...9...........r..^^^....tt....).....__.ee...v.1.....i......FF........rrr.....R.RRR..aa..........9.AAAA..s.......... .............n...```......."".........kkk.`........44..................e................u...:.........}}."...$............+....Q.....dd............................qq.......................h..qq.DD........ccc.....AA.............77.PPP..................!...................o................................`..Q.K.1.[.......................i...7..........rrr.........SS....3....LLLL.)............}}...........E............88...............]..222....f.....!......cccccc.....K..M.....;..................GG....:.{{{{...........{{..!!.........J....................\........_.........................ppp.4......PP....(((............SSSS........................|||...#.[[.........,,."".........f.........BB......R..........................................M...........&&&&&&&&.....&&&&&&&............................;;.E.i.(.NN.F....^.......
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):297766
                            Entropy (8bit):7.644164061387471
                            Encrypted:false
                            SSDEEP:6144:lb1onEt4p7W93cV7+AyxJIF+0W8I1zP8BekEfy7BBb7AeceH5T:f1I7s3W411zP8Bekl7b7qiT
                            MD5:4D5E9D327B3D4081201FF7EC1187EEFE
                            SHA1:9DB6378CAC8481F34726E268B4EF7B56C2DEB488
                            SHA-256:DE01E2CF5805708FDFDD3EBE15D6ECBC3F455324CA014148D88893917A7B42F4
                            SHA-512:A6B695ADBD375C6A393145DD19FBB8703974FF8297274151AA683DB79938B244CECB4C400D914C96F4A06FCA3AB47E48E3E3FAD62086C4A79B06B4D170BBCB0B
                            Malicious:false
                            Reputation:low
                            Preview:............................jj......................2222.....ooooo......cc.}}.............2...(((((....................<...s..[[.............uu............~~~~~......R..............!........jjjj..........))))........u.l..........>>>>........................................OO..lll.............`...............u...VV....................................@............s......7.........+..........................L.l.............^......G.g.............RR..................nn.......................T.BBBB...........nn.....L.11.. .9...99...........B.....b.y.................".........E...............................???........P................................G................ ...........bb.~...<<..PP.....1111..WWW..............nn.{{....................''.j.EEEEE....TT...._......].............0.......&&.!!!!!.......{{.......Q................hh.....A..222...............................T.......i...c............1.....ggggg.................l........l.................................V.....AA......66.....
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):37896
                            Entropy (8bit):1.200616357643719
                            Encrypted:false
                            SSDEEP:192:GGByFFg5xUFtU4WnCLunXiPBK+34PvQ27JnTpFsxxa:GGByFFg5xU/U4WsunXiE+3gvQ2fFsxxa
                            MD5:0B216F5A8151B9C6EB9AD7F89A9BC030
                            SHA1:3F34D9DFA023843C1B66155ADD4E5C311F07DCA0
                            SHA-256:FD8DE6BF1B5A69687911C500A12D5BA3092569611844CDED241563AB9E611A32
                            SHA-512:EFB2C8919AF7A0D618085DF35557CDAA59C350FDFE617A5F18BFA449AD09B105DC3CA8F4467C69763CD2AEBB376F8122FF7116B9D3DE85391E3462C2FD59966A
                            Malicious:false
                            Reputation:low
                            Preview:.....J...................T......H......].....j..........@..............................?................................}.................................,.F...............n...............................*.....................a..........................................................................2......................................................................,.............................................._{.......................................t...................V.............................................V..............................................................;..........................}...]6..........O........T........oz.......................................................................cb.................................................................}b....................................i...........................................e.....&........................p..........................................................6..#................P.................
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):214335
                            Entropy (8bit):1.2476323095361204
                            Encrypted:false
                            SSDEEP:768:99C7iXwL7CwdtIlUUoJOtkhmD6bddfwlR6eng3tDfGXU41X8Kbfjl+f7KoZ3pkmY:eiRa7POSx67/L
                            MD5:59874EF8405969406DE4B3A1C90793D4
                            SHA1:C3A8B546FA78D9218E8355756B12921E6419E69E
                            SHA-256:24F7B3739548CFA16CB005CD467F26C369EBCA40B4867C197BF4A90DD8939079
                            SHA-512:F6BC59CC92DD6660662193A49D2C1023DC42141948E9361CB6FA122BA796FE2175C9A3CF68F4318BA728315DD1BCBAE0DB925C03D6EED8540C4FB5A961E7BEE9
                            Malicious:false
                            Reputation:low
                            Preview:.....................w.......].........................X..!.......p.....{................................t............................~...........................................j................................w..........L....................+.................................P...2T...........[.........................2..................................................................e...........................................................................P..............................}..........$..................................................... ....................................................................................M.............................................................a.......................................|..........=..............................................M.....!......g.........d................i...d...E................................................................................*..........................................................w.......
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):25
                            Entropy (8bit):4.0536606896881855
                            Encrypted:false
                            SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                            MD5:08CA75DA54EB4810D18796C97F510A55
                            SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                            SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                            SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                            Malicious:false
                            Reputation:moderate, very likely benign file
                            Preview:[Bus Clock]..Gats=Galse..
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):852876
                            Entropy (8bit):4.693141672071345
                            Encrypted:false
                            SSDEEP:6144:7Gb1onEt4p7W93cV7+AyxJIF+0W8I1zP8BekEfy7BBb7AeceH5yOoSBojTBTniPd:S1I7s3W411zP8Bekl7b7qit/Bo/eV3
                            MD5:3FD736680EDD9E357A6F72C5F3C6EE7C
                            SHA1:659E7F9DDE6374C99CA149A97CC8BC2A6F0A89B7
                            SHA-256:B2C02E3D580279A64FD5211B4C88D4990EECDACB59DE3855A49C33FC0DB8140E
                            SHA-512:A51F875657A5BAA36929E5E5E244EE58D5409439D5E0157FAC58E4721B86EC4A8A475AE6B96A67A4EBD35BAF7D1B6A6797B3F30C214BE26BC564A91AFB8F7506
                            Malicious:false
                            Reputation:low
                            Preview:........,...................V...,...........................................................................................................................................................................................................................................................J...Y...............j...............................................................................................................................k...................4...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                            Category:dropped
                            Size (bytes):11264
                            Entropy (8bit):5.76781505116372
                            Encrypted:false
                            SSDEEP:192:MPtkumJX7zBE2kGwfy9S9VkPsFQ1Mx1c:97O2k5q9wA1Mxa
                            MD5:55A26D7800446F1373056064C64C3CE8
                            SHA1:80256857E9A0A9C8897923B717F3435295A76002
                            SHA-256:904FD5481D72F4E03B01A455F848DEDD095D0FB17E33608E0D849F5196FB6FF8
                            SHA-512:04B8AB7A85C26F188C0A06F524488D6F2AC2884BF107C860C82E94AE12C3859F825133D78338FD2B594DFC48F7DC9888AE76FEE786C6252A5C77C88755128A5B
                            Malicious:false
                            Antivirus:
                            • Antivirus: ReversingLabs, Detection: 0%
                            • Antivirus: Virustotal, Detection: 0%, Browse
                            Joe Sandbox View:
                            • Filename: asXlZG3aW6.exe, Detection: malicious, Browse
                            • Filename: asXlZG3aW6.exe, Detection: malicious, Browse
                            • Filename: aMfizaMilo.exe, Detection: malicious, Browse
                            • Filename: 1ppvR5VRT6.exe, Detection: malicious, Browse
                            • Filename: Ozb8aojWew.exe, Detection: malicious, Browse
                            • Filename: aMfizaMilo.exe, Detection: malicious, Browse
                            • Filename: 1ppvR5VRT6.exe, Detection: malicious, Browse
                            • Filename: Ozb8aojWew.exe, Detection: malicious, Browse
                            • Filename: Documents.com.exe, Detection: malicious, Browse
                            • Filename: Documents.com.exe, Detection: malicious, Browse
                            Reputation:moderate, very likely benign file
                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L...R..Y...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..^....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                            Entropy (8bit):7.963084706950689
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            File size:429'842 bytes
                            MD5:3aaa7d691a22ec1b7f9d03d63c7017a3
                            SHA1:b4a38d0c4b81a50fb40e407e4d439fd18cca89c2
                            SHA256:f214476db64248c82861c7b27fd55186beaf2e292cbe013d47f17305c3b2e95d
                            SHA512:5612ae5dc8056f0fa61b6c6f25ab9eed002db9ffb5860dad3c47466c7530da7e6ba15841d5bd30ef3f53c3f86a9c9a2506bedcaaf013ee6eab45929f6deead3e
                            SSDEEP:12288:cAZO544z70HKziHbZj+7izkKLBH7+P2iO:cAY+XqeF+AkKd6P2iO
                            TLSH:4E94231A50F793D7E7F28B7034A3EE596B973C211108A64F7754BBCBAEB50C2C949062
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...s..Y.................b.........
                            Icon Hash:3d2e0f95332b3399
                            Entrypoint:0x40330d
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x597FCC73 [Tue Aug 1 00:33:55 2017 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:57e98d9a5a72c8d7ad8fb7a6a58b3daf
                            Instruction
                            sub esp, 00000184h
                            push ebx
                            push esi
                            push edi
                            xor ebx, ebx
                            push 00008001h
                            mov dword ptr [esp+18h], ebx
                            mov dword ptr [esp+10h], 0040A130h
                            mov dword ptr [esp+20h], ebx
                            mov byte ptr [esp+14h], 00000020h
                            call dword ptr [004080A8h]
                            call dword ptr [004080A4h]
                            and eax, BFFFFFFFh
                            cmp ax, 00000006h
                            mov dword ptr [0042472Ch], eax
                            je 00007F19B0802BA3h
                            push ebx
                            call 00007F19B0805C72h
                            cmp eax, ebx
                            je 00007F19B0802B99h
                            push 00000C00h
                            call eax
                            mov esi, 00408298h
                            push esi
                            call 00007F19B0805BEEh
                            push esi
                            call dword ptr [004080A0h]
                            lea esi, dword ptr [esi+eax+01h]
                            cmp byte ptr [esi], bl
                            jne 00007F19B0802B7Dh
                            push 0000000Ah
                            call 00007F19B0805C46h
                            push 00000008h
                            call 00007F19B0805C3Fh
                            push 00000006h
                            mov dword ptr [00424724h], eax
                            call 00007F19B0805C33h
                            cmp eax, ebx
                            je 00007F19B0802BA1h
                            push 0000001Eh
                            call eax
                            test eax, eax
                            je 00007F19B0802B99h
                            or byte ptr [0042472Fh], 00000040h
                            push ebp
                            call dword ptr [00408044h]
                            push ebx
                            call dword ptr [00408288h]
                            mov dword ptr [004247F8h], eax
                            push ebx
                            lea eax, dword ptr [esp+38h]
                            push 00000160h
                            push eax
                            push ebx
                            push 0041FCF0h
                            call dword ptr [00408178h]
                            push 0040A1ECh
                            Programming Language:
                            • [EXP] VC++ 6.0 SP5 build 8804
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x84280xa0.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x350000xa50.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x603c0x6200029c8031e2fb36630bb7ccb6d1d379b5False0.6572464923469388data6.39361655287636IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x80000x12480x1400421f9404c16c75fa4bc7d37da19b3076False0.4287109375data5.044261339836676IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xa0000x1a8380x400c93d53142ea782e156ddc6acebdf883dFalse0.6455078125data5.223134318413766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .ndata0x250000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x350000xa500xc001b99c5df5aaedc5b60aeacee8a24a0feFalse0.40234375data4.186971853013905IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x351900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                            RT_DIALOG0x354780x100dataEnglishUnited States0.5234375
                            RT_DIALOG0x355780x11cdataEnglishUnited States0.6056338028169014
                            RT_DIALOG0x356980x60dataEnglishUnited States0.7291666666666666
                            RT_GROUP_ICON0x356f80x14dataEnglishUnited States1.2
                            RT_MANIFEST0x357100x340XML 1.0 document, ASCII text, with very long lines (832), with no line terminatorsEnglishUnited States0.5540865384615384
                            DLLImport
                            KERNEL32.dllSetEnvironmentVariableA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, Sleep, GetTickCount, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, ExitProcess, SetCurrentDirectoryA, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, GlobalUnlock, GetDiskFreeSpaceA, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                            USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                            SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                            ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:07:21:53
                            Start date:08/01/2025
                            Path:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"
                            Imagebase:0x400000
                            File size:429'842 bytes
                            MD5 hash:3AAA7D691A22EC1B7F9D03D63C7017A3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4096311949.0000000003046000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:14.6%
                              Dynamic/Decrypted Code Coverage:15.5%
                              Signature Coverage:23.9%
                              Total number of Nodes:1545
                              Total number of Limit Nodes:36
                              execution_graph 5084 10001000 5087 1000101b 5084->5087 5094 100014bb 5087->5094 5089 10001020 5090 10001027 GlobalAlloc 5089->5090 5091 10001024 5089->5091 5090->5091 5092 100014e2 3 API calls 5091->5092 5093 10001019 5092->5093 5096 100014c1 5094->5096 5095 100014c7 5095->5089 5096->5095 5097 100014d3 GlobalFree 5096->5097 5097->5089 4257 4025c4 4258 402a9f 17 API calls 4257->4258 4263 4025ce 4258->4263 4259 40263c 4261 40263e 4268 405ff7 wsprintfA 4261->4268 4263->4259 4263->4261 4264 40264e 4263->4264 4266 405caa ReadFile 4263->4266 4264->4259 4265 402664 SetFilePointer 4264->4265 4265->4259 4267 405cc8 4266->4267 4267->4263 4268->4259 5098 402245 5099 402ac1 17 API calls 5098->5099 5100 40224b 5099->5100 5101 402ac1 17 API calls 5100->5101 5102 402254 5101->5102 5103 402ac1 17 API calls 5102->5103 5104 40225d 5103->5104 5105 40639c 2 API calls 5104->5105 5106 402266 5105->5106 5107 402277 lstrlenA lstrlenA 5106->5107 5111 40226a 5106->5111 5109 4051c0 24 API calls 5107->5109 5108 4051c0 24 API calls 5112 402272 5108->5112 5110 4022b3 SHFileOperationA 5109->5110 5110->5111 5110->5112 5111->5108 5619 4028c5 5620 402a9f 17 API calls 5619->5620 5621 4028cb 5620->5621 5622 402900 5621->5622 5623 402716 5621->5623 5625 4028dd 5621->5625 5622->5623 5624 4060bb 17 API calls 5622->5624 5624->5623 5625->5623 5627 405ff7 wsprintfA 5625->5627 5627->5623 4269 401746 4275 402ac1 4269->4275 4273 401754 4274 405c61 2 API calls 4273->4274 4274->4273 4276 402acd 4275->4276 4277 4060bb 17 API calls 4276->4277 4278 402aee 4277->4278 4279 40174d 4278->4279 4280 406303 5 API calls 4278->4280 4281 405c61 4279->4281 4280->4279 4282 405c6c GetTickCount GetTempFileNameA 4281->4282 4283 405c9d 4282->4283 4284 405c99 4282->4284 4283->4273 4284->4282 4284->4283 5113 401947 5114 402ac1 17 API calls 5113->5114 5115 40194e lstrlenA 5114->5115 5116 402577 5115->5116 5628 4022c7 5629 4022ce 5628->5629 5633 4022e1 5628->5633 5630 4060bb 17 API calls 5629->5630 5631 4022db 5630->5631 5632 4057b5 MessageBoxIndirectA 5631->5632 5632->5633 4285 10002709 4286 10002759 4285->4286 4287 10002719 VirtualProtect 4285->4287 4287->4286 4292 4015ca 4293 401624 4292->4293 4306 4015d0 4292->4306 4295 401652 4293->4295 4296 401629 4293->4296 4294 405a5c CharNextA 4294->4306 4298 401423 24 API calls 4295->4298 4316 401423 4296->4316 4304 40164a 4298->4304 4303 40163b SetCurrentDirectoryA 4303->4304 4305 40160c GetFileAttributesA 4305->4306 4306->4293 4306->4294 4306->4305 4308 405720 4306->4308 4311 405686 CreateDirectoryA 4306->4311 4320 405703 CreateDirectoryA 4306->4320 4323 406431 GetModuleHandleA 4308->4323 4312 4056d3 4311->4312 4313 4056d7 GetLastError 4311->4313 4312->4306 4313->4312 4314 4056e6 SetFileSecurityA 4313->4314 4314->4312 4315 4056fc GetLastError 4314->4315 4315->4312 4332 4051c0 4316->4332 4319 406099 lstrcpynA 4319->4303 4321 405713 4320->4321 4322 405717 GetLastError 4320->4322 4321->4306 4322->4321 4324 406457 GetProcAddress 4323->4324 4325 40644d 4323->4325 4327 405727 4324->4327 4329 4063c3 GetSystemDirectoryA 4325->4329 4327->4306 4328 406453 4328->4324 4328->4327 4330 4063e5 wsprintfA LoadLibraryExA 4329->4330 4330->4328 4333 401431 4332->4333 4334 4051db 4332->4334 4333->4319 4335 4051f8 lstrlenA 4334->4335 4336 4060bb 17 API calls 4334->4336 4337 405221 4335->4337 4338 405206 lstrlenA 4335->4338 4336->4335 4340 405234 4337->4340 4341 405227 SetWindowTextA 4337->4341 4338->4333 4339 405218 lstrcatA 4338->4339 4339->4337 4340->4333 4342 40523a SendMessageA SendMessageA SendMessageA 4340->4342 4341->4340 4342->4333 5637 4045ca 5638 4045f6 5637->5638 5639 404607 5637->5639 5698 405799 GetDlgItemTextA 5638->5698 5641 404613 GetDlgItem 5639->5641 5648 404672 5639->5648 5643 404627 5641->5643 5642 404601 5645 406303 5 API calls 5642->5645 5646 40463b SetWindowTextA 5643->5646 5654 405aca 4 API calls 5643->5654 5644 404756 5647 404900 5644->5647 5700 405799 GetDlgItemTextA 5644->5700 5645->5639 5650 40415a 18 API calls 5646->5650 5653 4041c1 8 API calls 5647->5653 5648->5644 5648->5647 5651 4060bb 17 API calls 5648->5651 5655 404657 5650->5655 5656 4046e6 SHBrowseForFolderA 5651->5656 5652 404786 5657 405b1f 18 API calls 5652->5657 5658 404914 5653->5658 5659 404631 5654->5659 5660 40415a 18 API calls 5655->5660 5656->5644 5661 4046fe CoTaskMemFree 5656->5661 5662 40478c 5657->5662 5659->5646 5665 405a31 3 API calls 5659->5665 5663 404665 5660->5663 5664 405a31 3 API calls 5661->5664 5701 406099 lstrcpynA 5662->5701 5699 40418f SendMessageA 5663->5699 5667 40470b 5664->5667 5665->5646 5670 404742 SetDlgItemTextA 5667->5670 5674 4060bb 17 API calls 5667->5674 5669 40466b 5672 406431 5 API calls 5669->5672 5670->5644 5671 4047a3 5673 406431 5 API calls 5671->5673 5672->5648 5681 4047aa 5673->5681 5675 40472a lstrcmpiA 5674->5675 5675->5670 5678 40473b lstrcatA 5675->5678 5676 4047e6 5702 406099 lstrcpynA 5676->5702 5678->5670 5679 4047ed 5680 405aca 4 API calls 5679->5680 5682 4047f3 GetDiskFreeSpaceA 5680->5682 5681->5676 5684 405a78 2 API calls 5681->5684 5686 40483e 5681->5686 5685 404817 MulDiv 5682->5685 5682->5686 5684->5681 5685->5686 5687 4048af 5686->5687 5688 404a46 20 API calls 5686->5688 5689 4048d2 5687->5689 5691 40140b 2 API calls 5687->5691 5690 40489c 5688->5690 5703 40417c EnableWindow 5689->5703 5693 4048b1 SetDlgItemTextA 5690->5693 5694 4048a1 5690->5694 5691->5689 5693->5687 5695 404981 20 API calls 5694->5695 5695->5687 5696 4048ee 5696->5647 5704 404523 5696->5704 5698->5642 5699->5669 5700->5652 5701->5671 5702->5679 5703->5696 5705 404531 5704->5705 5706 404536 SendMessageA 5704->5706 5705->5706 5706->5647 5707 4020cb 5708 402ac1 17 API calls 5707->5708 5709 4020d2 5708->5709 5710 402ac1 17 API calls 5709->5710 5711 4020dc 5710->5711 5712 402ac1 17 API calls 5711->5712 5713 4020e6 5712->5713 5714 402ac1 17 API calls 5713->5714 5715 4020f0 5714->5715 5716 402ac1 17 API calls 5715->5716 5717 4020fa 5716->5717 5718 40213c CoCreateInstance 5717->5718 5719 402ac1 17 API calls 5717->5719 5720 402206 5718->5720 5722 40215b 5718->5722 5719->5718 5721 401423 24 API calls 5720->5721 5723 40223c 5720->5723 5721->5723 5722->5720 5724 4021e6 MultiByteToWideChar 5722->5724 5724->5720 5117 1000180d 5118 10001830 5117->5118 5119 10001860 GlobalFree 5118->5119 5120 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5118->5120 5119->5120 5121 10001266 2 API calls 5120->5121 5122 100019e3 GlobalFree GlobalFree 5121->5122 5725 4026ce 5726 4026d4 5725->5726 5727 4026d8 FindNextFileA 5726->5727 5728 4026ea 5726->5728 5727->5728 5729 402729 5727->5729 5731 406099 lstrcpynA 5729->5731 5731->5728 4796 4023d0 4797 402ac1 17 API calls 4796->4797 4798 4023e2 4797->4798 4799 402ac1 17 API calls 4798->4799 4800 4023ec 4799->4800 4813 402b51 4800->4813 4803 402716 4804 402421 4806 40242d 4804->4806 4808 402a9f 17 API calls 4804->4808 4805 402ac1 17 API calls 4807 40241a lstrlenA 4805->4807 4809 40244c RegSetValueExA 4806->4809 4811 40303e 44 API calls 4806->4811 4807->4804 4808->4806 4810 402462 RegCloseKey 4809->4810 4810->4803 4811->4809 4814 402b6c 4813->4814 4817 405f4d 4814->4817 4818 405f5c 4817->4818 4819 4023fc 4818->4819 4820 405f67 RegCreateKeyExA 4818->4820 4819->4803 4819->4804 4819->4805 4820->4819 5732 401cd4 5733 402a9f 17 API calls 5732->5733 5734 401cda IsWindow 5733->5734 5735 401a0e 5734->5735 5736 4014d6 5737 402a9f 17 API calls 5736->5737 5738 4014dc Sleep 5737->5738 5740 402951 5738->5740 4837 401759 4838 402ac1 17 API calls 4837->4838 4839 401760 4838->4839 4840 401786 4839->4840 4841 40177e 4839->4841 4878 406099 lstrcpynA 4840->4878 4877 406099 lstrcpynA 4841->4877 4844 401784 4848 406303 5 API calls 4844->4848 4845 401791 4846 405a31 3 API calls 4845->4846 4847 401797 lstrcatA 4846->4847 4847->4844 4862 4017a3 4848->4862 4849 4017e4 4851 405c0d 2 API calls 4849->4851 4850 40639c 2 API calls 4850->4862 4851->4862 4853 4017ba CompareFileTime 4853->4862 4854 40187e 4855 4051c0 24 API calls 4854->4855 4858 401888 4855->4858 4856 4051c0 24 API calls 4875 40186a 4856->4875 4857 406099 lstrcpynA 4857->4862 4859 40303e 44 API calls 4858->4859 4860 40189b 4859->4860 4861 4018af SetFileTime 4860->4861 4863 4018c1 CloseHandle 4860->4863 4861->4863 4862->4849 4862->4850 4862->4853 4862->4854 4862->4857 4864 4060bb 17 API calls 4862->4864 4870 4057b5 MessageBoxIndirectA 4862->4870 4874 401855 4862->4874 4876 405c32 GetFileAttributesA CreateFileA 4862->4876 4865 4018d2 4863->4865 4863->4875 4864->4862 4866 4018d7 4865->4866 4867 4018ea 4865->4867 4868 4060bb 17 API calls 4866->4868 4869 4060bb 17 API calls 4867->4869 4871 4018df lstrcatA 4868->4871 4872 4018f2 4869->4872 4870->4862 4871->4872 4873 4057b5 MessageBoxIndirectA 4872->4873 4873->4875 4874->4856 4874->4875 4876->4862 4877->4844 4878->4845 5123 401659 5124 402ac1 17 API calls 5123->5124 5125 40165f 5124->5125 5126 40639c 2 API calls 5125->5126 5127 401665 5126->5127 5128 401959 5129 402a9f 17 API calls 5128->5129 5130 401960 5129->5130 5131 402a9f 17 API calls 5130->5131 5132 40196d 5131->5132 5133 402ac1 17 API calls 5132->5133 5134 401984 lstrlenA 5133->5134 5135 401994 5134->5135 5138 4019d4 5135->5138 5140 406099 lstrcpynA 5135->5140 5137 4019c4 5137->5138 5139 4019c9 lstrlenA 5137->5139 5139->5138 5140->5137 5141 1000161a 5142 10001649 5141->5142 5143 10001a5d 18 API calls 5142->5143 5144 10001650 5143->5144 5145 10001663 5144->5145 5146 10001657 5144->5146 5148 1000168a 5145->5148 5149 1000166d 5145->5149 5147 10001266 2 API calls 5146->5147 5155 10001661 5147->5155 5150 10001690 5148->5150 5151 100016b4 5148->5151 5152 100014e2 3 API calls 5149->5152 5153 10001559 3 API calls 5150->5153 5154 100014e2 3 API calls 5151->5154 5156 10001672 5152->5156 5157 10001695 5153->5157 5154->5155 5158 10001559 3 API calls 5156->5158 5159 10001266 2 API calls 5157->5159 5160 10001678 5158->5160 5161 1000169b GlobalFree 5159->5161 5162 10001266 2 API calls 5160->5162 5161->5155 5164 100016af GlobalFree 5161->5164 5163 1000167e GlobalFree 5162->5163 5163->5155 5164->5155 5172 401f5b 5173 402ac1 17 API calls 5172->5173 5174 401f62 5173->5174 5175 406431 5 API calls 5174->5175 5176 401f71 5175->5176 5177 401ff1 5176->5177 5178 401f89 GlobalAlloc 5176->5178 5178->5177 5179 401f9d 5178->5179 5180 406431 5 API calls 5179->5180 5181 401fa4 5180->5181 5182 406431 5 API calls 5181->5182 5183 401fae 5182->5183 5183->5177 5187 405ff7 wsprintfA 5183->5187 5185 401fe5 5188 405ff7 wsprintfA 5185->5188 5187->5185 5188->5177 5189 40255b 5190 402ac1 17 API calls 5189->5190 5191 402562 5190->5191 5194 405c32 GetFileAttributesA CreateFileA 5191->5194 5193 40256e 5194->5193 5202 401b5d 5203 401b6a 5202->5203 5204 401bae 5202->5204 5205 401bf2 5203->5205 5211 401b81 5203->5211 5206 401bb2 5204->5206 5207 401bd7 GlobalAlloc 5204->5207 5209 4060bb 17 API calls 5205->5209 5216 4022e1 5205->5216 5206->5216 5223 406099 lstrcpynA 5206->5223 5208 4060bb 17 API calls 5207->5208 5208->5205 5212 4022db 5209->5212 5221 406099 lstrcpynA 5211->5221 5215 4057b5 MessageBoxIndirectA 5212->5215 5213 401bc4 GlobalFree 5213->5216 5215->5216 5217 401b90 5222 406099 lstrcpynA 5217->5222 5219 401b9f 5224 406099 lstrcpynA 5219->5224 5221->5217 5222->5219 5223->5213 5224->5216 5225 401a5e 5226 402a9f 17 API calls 5225->5226 5227 401a64 5226->5227 5228 402a9f 17 API calls 5227->5228 5229 401a0e 5228->5229 5072 4024df 5073 402b01 17 API calls 5072->5073 5074 4024e9 5073->5074 5075 402a9f 17 API calls 5074->5075 5076 4024f2 5075->5076 5077 402500 5076->5077 5082 402716 5076->5082 5078 402519 RegEnumValueA 5077->5078 5079 40250d RegEnumKeyA 5077->5079 5080 402535 RegCloseKey 5078->5080 5081 40252e 5078->5081 5079->5080 5080->5082 5081->5080 5230 402c61 5231 402c70 SetTimer 5230->5231 5232 402c89 5230->5232 5231->5232 5233 402cd7 5232->5233 5234 402cdd MulDiv 5232->5234 5235 402c97 wsprintfA SetWindowTextA SetDlgItemTextA 5234->5235 5235->5233 5237 401563 5238 4028f9 5237->5238 5241 405ff7 wsprintfA 5238->5241 5240 4028fe 5241->5240 5242 402766 5264 405c32 GetFileAttributesA CreateFileA 5242->5264 5244 40276d 5245 402816 5244->5245 5246 402779 GlobalAlloc 5244->5246 5249 402831 5245->5249 5250 40281e DeleteFileA 5245->5250 5247 402792 5246->5247 5248 40280d CloseHandle 5246->5248 5265 4032c5 SetFilePointer 5247->5265 5248->5245 5250->5249 5252 402798 5253 4032af ReadFile 5252->5253 5254 4027a1 GlobalAlloc 5253->5254 5255 4027b1 5254->5255 5256 4027eb 5254->5256 5258 40303e 44 API calls 5255->5258 5257 405cd9 WriteFile 5256->5257 5259 4027f7 GlobalFree 5257->5259 5263 4027be 5258->5263 5260 40303e 44 API calls 5259->5260 5262 40280a 5260->5262 5261 4027e2 GlobalFree 5261->5256 5262->5248 5263->5261 5264->5244 5265->5252 5266 40166a 5267 402ac1 17 API calls 5266->5267 5268 401671 5267->5268 5269 402ac1 17 API calls 5268->5269 5270 40167a 5269->5270 5271 402ac1 17 API calls 5270->5271 5272 401683 MoveFileA 5271->5272 5273 401696 5272->5273 5274 40168f 5272->5274 5276 40639c 2 API calls 5273->5276 5278 40223c 5273->5278 5275 401423 24 API calls 5274->5275 5275->5278 5277 4016a5 5276->5277 5277->5278 5279 405e78 36 API calls 5277->5279 5279->5274 4343 40246d 4354 402b01 4343->4354 4346 402ac1 17 API calls 4347 402480 4346->4347 4348 40248a RegQueryValueExA 4347->4348 4350 402716 4347->4350 4349 4024aa 4348->4349 4351 4024b0 RegCloseKey 4348->4351 4349->4351 4359 405ff7 wsprintfA 4349->4359 4351->4350 4355 402ac1 17 API calls 4354->4355 4356 402b18 4355->4356 4357 405f1f RegOpenKeyExA 4356->4357 4358 402477 4357->4358 4358->4346 4359->4351 5748 4019ed 5749 402ac1 17 API calls 5748->5749 5750 4019f4 5749->5750 5751 402ac1 17 API calls 5750->5751 5752 4019fd 5751->5752 5753 401a04 lstrcmpiA 5752->5753 5754 401a16 lstrcmpA 5752->5754 5755 401a0a 5753->5755 5754->5755 5280 40426e lstrcpynA lstrlenA 5281 40156f 5282 401586 5281->5282 5283 40157f ShowWindow 5281->5283 5284 402951 5282->5284 5285 401594 ShowWindow 5282->5285 5283->5282 5285->5284 5756 100015b3 5757 100014bb GlobalFree 5756->5757 5759 100015cb 5757->5759 5758 10001611 GlobalFree 5759->5758 5760 100015e6 5759->5760 5761 100015fd VirtualFree 5759->5761 5760->5758 5761->5758 5762 4014f4 SetForegroundWindow 5763 402951 5762->5763 5764 401cf5 5765 402a9f 17 API calls 5764->5765 5766 401cfc 5765->5766 5767 402a9f 17 API calls 5766->5767 5768 401d08 GetDlgItem 5767->5768 5769 402577 5768->5769 4827 4022f6 4828 402304 4827->4828 4829 4022fe 4827->4829 4831 402ac1 17 API calls 4828->4831 4833 402314 4828->4833 4830 402ac1 17 API calls 4829->4830 4830->4828 4831->4833 4832 402ac1 17 API calls 4836 40232b WritePrivateProfileStringA 4832->4836 4834 402ac1 17 API calls 4833->4834 4835 402322 4833->4835 4834->4835 4835->4832 5770 4026f8 5771 402ac1 17 API calls 5770->5771 5772 4026ff FindFirstFileA 5771->5772 5773 402722 5772->5773 5774 402712 5772->5774 5775 402729 5773->5775 5778 405ff7 wsprintfA 5773->5778 5779 406099 lstrcpynA 5775->5779 5778->5775 5779->5774 5293 40237b 5294 402382 5293->5294 5295 4023ad 5293->5295 5297 402b01 17 API calls 5294->5297 5296 402ac1 17 API calls 5295->5296 5298 4023b4 5296->5298 5299 402389 5297->5299 5304 402b7f 5298->5304 5301 402ac1 17 API calls 5299->5301 5302 4023c1 5299->5302 5303 40239a RegDeleteValueA RegCloseKey 5301->5303 5303->5302 5305 402b95 5304->5305 5306 402bab 5305->5306 5308 402bb4 5305->5308 5306->5302 5309 405f1f RegOpenKeyExA 5308->5309 5310 402be2 5309->5310 5311 402c08 RegEnumKeyA 5310->5311 5312 402c1f RegCloseKey 5310->5312 5313 402c40 RegCloseKey 5310->5313 5315 402bb4 6 API calls 5310->5315 5317 402c33 5310->5317 5311->5310 5311->5312 5314 406431 5 API calls 5312->5314 5313->5317 5316 402c2f 5314->5316 5315->5310 5316->5317 5318 402c4e RegDeleteKeyA 5316->5318 5317->5306 5318->5317 4886 401ffd 4887 40200f 4886->4887 4897 4020bd 4886->4897 4888 402ac1 17 API calls 4887->4888 4890 402016 4888->4890 4889 401423 24 API calls 4891 40223c 4889->4891 4892 402ac1 17 API calls 4890->4892 4893 40201f 4892->4893 4894 402034 LoadLibraryExA 4893->4894 4895 402027 GetModuleHandleA 4893->4895 4896 402044 GetProcAddress 4894->4896 4894->4897 4895->4894 4895->4896 4898 402090 4896->4898 4899 402053 4896->4899 4897->4889 4902 4051c0 24 API calls 4898->4902 4900 402072 4899->4900 4901 40205b 4899->4901 4907 100016bd 4900->4907 4903 401423 24 API calls 4901->4903 4904 402063 4902->4904 4903->4904 4904->4891 4905 4020b1 FreeLibrary 4904->4905 4905->4891 4908 100016ed 4907->4908 4949 10001a5d 4908->4949 4910 100016f4 4911 1000180a 4910->4911 4912 10001705 4910->4912 4913 1000170c 4910->4913 4911->4904 4998 100021b0 4912->4998 4981 100021fa 4913->4981 4918 10001770 4924 100017b2 4918->4924 4925 10001776 4918->4925 4919 10001752 5011 100023d8 4919->5011 4920 10001722 4923 10001728 4920->4923 4928 10001733 4920->4928 4921 1000173b 4934 10001731 4921->4934 5008 10002a9f 4921->5008 4923->4934 4992 100027e4 4923->4992 4926 100023d8 11 API calls 4924->4926 4930 10001559 3 API calls 4925->4930 4932 100017a4 4926->4932 4927 10001758 5022 10001559 4927->5022 5002 10002587 4928->5002 4936 1000178c 4930->4936 4940 100017f9 4932->4940 5033 1000239e 4932->5033 4934->4918 4934->4919 4939 100023d8 11 API calls 4936->4939 4938 10001739 4938->4934 4939->4932 4940->4911 4944 10001803 GlobalFree 4940->4944 4944->4911 4946 100017e5 4946->4940 5037 100014e2 wsprintfA 4946->5037 4947 100017de FreeLibrary 4947->4946 5040 10001215 GlobalAlloc 4949->5040 4951 10001a81 5041 10001215 GlobalAlloc 4951->5041 4953 10001cbb GlobalFree GlobalFree GlobalFree 4954 10001cd8 4953->4954 4965 10001d22 4953->4965 4955 1000201a 4954->4955 4954->4965 4966 10001ced 4954->4966 4957 1000203c GetModuleHandleA 4955->4957 4955->4965 4956 10001b60 GlobalAlloc 4958 10001a8c 4956->4958 4960 10002062 4957->4960 4961 1000204d LoadLibraryA 4957->4961 4958->4953 4958->4956 4959 10001bc9 GlobalFree 4958->4959 4962 10001bab lstrcpyA 4958->4962 4963 10001bb5 lstrcpyA 4958->4963 4958->4965 4968 10001f7a 4958->4968 4975 10001e75 GlobalFree 4958->4975 4978 10001224 2 API calls 4958->4978 4979 10001c07 4958->4979 5047 10001215 GlobalAlloc 4958->5047 4959->4958 5048 100015a4 GetProcAddress 4960->5048 4961->4960 4961->4965 4962->4963 4963->4958 4965->4910 4966->4965 5044 10001224 4966->5044 4967 100020b3 4967->4965 4970 100020c0 lstrlenA 4967->4970 4968->4965 4974 10001fbe lstrcpyA 4968->4974 4969 10002074 4969->4967 4980 1000209d GetProcAddress 4969->4980 5049 100015a4 GetProcAddress 4970->5049 4974->4965 4975->4958 4976 100020d9 4976->4965 4978->4958 4979->4958 5042 10001534 GlobalSize GlobalAlloc 4979->5042 4980->4967 4982 10002212 4981->4982 4984 10002347 GlobalFree 4982->4984 4986 100022bb GlobalAlloc MultiByteToWideChar 4982->4986 4987 10001224 GlobalAlloc lstrcpynA 4982->4987 4989 10002306 4982->4989 5051 100012ad 4982->5051 4984->4982 4985 10001712 4984->4985 4985->4920 4985->4921 4985->4934 4988 100022e5 GlobalAlloc 4986->4988 4986->4989 4987->4982 4990 100022fd GlobalFree 4988->4990 4989->4984 5055 1000251b 4989->5055 4990->4984 4994 100027f6 4992->4994 4993 1000289b EnumWindows 4995 100028b9 4993->4995 4994->4993 4996 100029b5 4995->4996 4997 100029aa GetLastError 4995->4997 4996->4934 4997->4996 4999 100021c0 4998->4999 5000 1000170b 4998->5000 4999->5000 5001 100021d2 GlobalAlloc 4999->5001 5000->4913 5001->4999 5006 100025a3 5002->5006 5003 100025f4 GlobalAlloc 5007 10002616 5003->5007 5004 10002607 5005 1000260c GlobalSize 5004->5005 5004->5007 5005->5007 5006->5003 5006->5004 5007->4938 5009 10002aaa 5008->5009 5010 10002aea GlobalFree 5009->5010 5058 10001215 GlobalAlloc 5011->5058 5013 100023e4 5014 10002438 lstrcpynA 5013->5014 5015 10002449 StringFromGUID2 WideCharToMultiByte 5013->5015 5016 1000246d WideCharToMultiByte 5013->5016 5017 1000248e wsprintfA 5013->5017 5018 100024b2 GlobalFree 5013->5018 5019 100024ec GlobalFree 5013->5019 5020 10001266 2 API calls 5013->5020 5059 100012d1 5013->5059 5014->5013 5015->5013 5016->5013 5017->5013 5018->5013 5019->4927 5020->5013 5063 10001215 GlobalAlloc 5022->5063 5024 1000155f 5025 10001586 5024->5025 5026 1000156c lstrcpyA 5024->5026 5028 100015a0 5025->5028 5029 1000158b wsprintfA 5025->5029 5026->5028 5030 10001266 5028->5030 5029->5028 5031 100012a8 GlobalFree 5030->5031 5032 1000126f GlobalAlloc lstrcpynA 5030->5032 5031->4932 5032->5031 5034 100017c5 5033->5034 5035 100023ac 5033->5035 5034->4946 5034->4947 5035->5034 5036 100023c5 GlobalFree 5035->5036 5036->5035 5038 10001266 2 API calls 5037->5038 5039 10001503 5038->5039 5039->4940 5040->4951 5041->4958 5043 10001552 5042->5043 5043->4979 5050 10001215 GlobalAlloc 5044->5050 5046 10001233 lstrcpynA 5046->4965 5047->4958 5048->4969 5049->4976 5050->5046 5052 100012b4 5051->5052 5053 10001224 2 API calls 5052->5053 5054 100012cf 5053->5054 5054->4982 5056 10002529 VirtualAlloc 5055->5056 5057 1000257f 5055->5057 5056->5057 5057->4989 5058->5013 5060 100012f9 5059->5060 5061 100012da 5059->5061 5060->5013 5061->5060 5062 100012e0 lstrcpyA 5061->5062 5062->5060 5063->5024 5319 1000103d 5320 1000101b 5 API calls 5319->5320 5321 10001056 5320->5321 5322 40257d 5323 402582 5322->5323 5324 402596 5322->5324 5325 402a9f 17 API calls 5323->5325 5326 402ac1 17 API calls 5324->5326 5328 40258b 5325->5328 5327 40259d lstrlenA 5326->5327 5327->5328 5329 4025bf 5328->5329 5330 405cd9 WriteFile 5328->5330 5330->5329 5780 4018fd 5781 401934 5780->5781 5782 402ac1 17 API calls 5781->5782 5783 401939 5782->5783 5784 405861 67 API calls 5783->5784 5785 401942 5784->5785 5786 4052fe 5787 405320 GetDlgItem GetDlgItem GetDlgItem 5786->5787 5788 4054a9 5786->5788 5831 40418f SendMessageA 5787->5831 5790 4054b1 GetDlgItem CreateThread CloseHandle 5788->5790 5791 4054d9 5788->5791 5790->5791 5793 405507 5791->5793 5795 405528 5791->5795 5796 4054ef ShowWindow ShowWindow 5791->5796 5792 405390 5800 405397 GetClientRect GetSystemMetrics SendMessageA SendMessageA 5792->5800 5794 405562 5793->5794 5797 405517 5793->5797 5798 40553b ShowWindow 5793->5798 5794->5795 5808 40556f SendMessageA 5794->5808 5799 4041c1 8 API calls 5795->5799 5833 40418f SendMessageA 5796->5833 5834 404133 5797->5834 5804 40555b 5798->5804 5805 40554d 5798->5805 5803 405534 5799->5803 5806 405405 5800->5806 5807 4053e9 SendMessageA SendMessageA 5800->5807 5810 404133 SendMessageA 5804->5810 5809 4051c0 24 API calls 5805->5809 5811 405418 5806->5811 5812 40540a SendMessageA 5806->5812 5807->5806 5808->5803 5813 405588 CreatePopupMenu 5808->5813 5809->5804 5810->5794 5814 40415a 18 API calls 5811->5814 5812->5811 5815 4060bb 17 API calls 5813->5815 5817 405428 5814->5817 5816 405598 AppendMenuA 5815->5816 5818 4055b6 GetWindowRect 5816->5818 5819 4055c9 TrackPopupMenu 5816->5819 5820 405431 ShowWindow 5817->5820 5821 405465 GetDlgItem SendMessageA 5817->5821 5818->5819 5819->5803 5822 4055e5 5819->5822 5823 405454 5820->5823 5824 405447 ShowWindow 5820->5824 5821->5803 5825 40548c SendMessageA SendMessageA 5821->5825 5826 405604 SendMessageA 5822->5826 5832 40418f SendMessageA 5823->5832 5824->5823 5825->5803 5826->5826 5827 405621 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5826->5827 5829 405643 SendMessageA 5827->5829 5829->5829 5830 405665 GlobalUnlock SetClipboardData CloseClipboard 5829->5830 5830->5803 5831->5792 5832->5821 5833->5793 5835 404140 SendMessageA 5834->5835 5836 40413a 5834->5836 5835->5795 5836->5835 5837 100029bf 5838 100029d7 5837->5838 5839 10001534 2 API calls 5838->5839 5840 100029f2 5839->5840 5331 401000 5332 401037 BeginPaint GetClientRect 5331->5332 5333 40100c DefWindowProcA 5331->5333 5335 4010f3 5332->5335 5338 401179 5333->5338 5336 401073 CreateBrushIndirect FillRect DeleteObject 5335->5336 5337 4010fc 5335->5337 5336->5335 5339 401102 CreateFontIndirectA 5337->5339 5340 401167 EndPaint 5337->5340 5339->5340 5341 401112 6 API calls 5339->5341 5340->5338 5341->5340 5342 401900 5343 402ac1 17 API calls 5342->5343 5344 401907 5343->5344 5345 4057b5 MessageBoxIndirectA 5344->5345 5346 401910 5345->5346 4203 402682 4204 4028fe 4203->4204 4205 402689 4203->4205 4211 402a9f 4205->4211 4207 402690 4208 40269f SetFilePointer 4207->4208 4208->4204 4209 4026af 4208->4209 4214 405ff7 wsprintfA 4209->4214 4215 4060bb 4211->4215 4213 402ab4 4213->4207 4214->4204 4230 4060c8 4215->4230 4216 4062ea 4217 4062ff 4216->4217 4248 406099 lstrcpynA 4216->4248 4217->4213 4219 4062c4 lstrlenA 4219->4230 4222 4060bb 10 API calls 4222->4219 4224 4061e0 GetSystemDirectoryA 4224->4230 4225 4061f3 GetWindowsDirectoryA 4225->4230 4227 4060bb 10 API calls 4227->4230 4228 40626d lstrcatA 4228->4230 4229 406227 SHGetSpecialFolderLocation 4229->4230 4231 40623f SHGetPathFromIDListA CoTaskMemFree 4229->4231 4230->4216 4230->4219 4230->4222 4230->4224 4230->4225 4230->4227 4230->4228 4230->4229 4232 405f80 4230->4232 4237 406303 4230->4237 4246 405ff7 wsprintfA 4230->4246 4247 406099 lstrcpynA 4230->4247 4231->4230 4249 405f1f 4232->4249 4235 405fb4 RegQueryValueExA RegCloseKey 4236 405fe3 4235->4236 4236->4230 4243 40630f 4237->4243 4238 406377 4239 40637b CharPrevA 4238->4239 4241 406396 4238->4241 4239->4238 4240 40636c CharNextA 4240->4238 4240->4243 4241->4230 4243->4238 4243->4240 4244 40635a CharNextA 4243->4244 4245 406367 CharNextA 4243->4245 4253 405a5c 4243->4253 4244->4243 4245->4240 4246->4230 4247->4230 4248->4217 4250 405f2e 4249->4250 4251 405f32 4250->4251 4252 405f37 RegOpenKeyExA 4250->4252 4251->4235 4251->4236 4252->4251 4254 405a62 4253->4254 4255 405a75 4254->4255 4256 405a68 CharNextA 4254->4256 4255->4243 4256->4254 5347 401502 5348 40150a 5347->5348 5350 40151d 5347->5350 5349 402a9f 17 API calls 5348->5349 5349->5350 5841 404583 5842 404593 5841->5842 5843 4045b9 5841->5843 5845 40415a 18 API calls 5842->5845 5844 4041c1 8 API calls 5843->5844 5846 4045c5 5844->5846 5847 4045a0 SetDlgItemTextA 5845->5847 5847->5843 5351 401c04 5352 402a9f 17 API calls 5351->5352 5353 401c0b 5352->5353 5354 402a9f 17 API calls 5353->5354 5355 401c18 5354->5355 5356 401c2d 5355->5356 5357 402ac1 17 API calls 5355->5357 5358 401c3d 5356->5358 5359 402ac1 17 API calls 5356->5359 5357->5356 5360 401c94 5358->5360 5361 401c48 5358->5361 5359->5358 5363 402ac1 17 API calls 5360->5363 5362 402a9f 17 API calls 5361->5362 5364 401c4d 5362->5364 5365 401c99 5363->5365 5366 402a9f 17 API calls 5364->5366 5367 402ac1 17 API calls 5365->5367 5368 401c59 5366->5368 5369 401ca2 FindWindowExA 5367->5369 5370 401c84 SendMessageA 5368->5370 5371 401c66 SendMessageTimeoutA 5368->5371 5372 401cc0 5369->5372 5370->5372 5371->5372 5848 403c86 5849 403dd9 5848->5849 5850 403c9e 5848->5850 5852 403e2a 5849->5852 5853 403dea GetDlgItem GetDlgItem 5849->5853 5850->5849 5851 403caa 5850->5851 5855 403cb5 SetWindowPos 5851->5855 5856 403cc8 5851->5856 5854 403e84 5852->5854 5862 401389 2 API calls 5852->5862 5857 40415a 18 API calls 5853->5857 5858 4041a6 SendMessageA 5854->5858 5881 403dd4 5854->5881 5855->5856 5859 403ce5 5856->5859 5860 403ccd ShowWindow 5856->5860 5861 403e14 SetClassLongA 5857->5861 5878 403e96 5858->5878 5863 403d07 5859->5863 5864 403ced DestroyWindow 5859->5864 5860->5859 5865 40140b 2 API calls 5861->5865 5868 403e5c 5862->5868 5866 403d0c SetWindowLongA 5863->5866 5867 403d1d 5863->5867 5916 4040e3 5864->5916 5865->5852 5866->5881 5869 403d94 5867->5869 5870 403d29 GetDlgItem 5867->5870 5868->5854 5871 403e60 SendMessageA 5868->5871 5876 4041c1 8 API calls 5869->5876 5874 403d59 5870->5874 5875 403d3c SendMessageA IsWindowEnabled 5870->5875 5871->5881 5872 40140b 2 API calls 5872->5878 5873 4040e5 DestroyWindow EndDialog 5873->5916 5880 403d5e 5874->5880 5882 403d66 5874->5882 5884 403dad SendMessageA 5874->5884 5885 403d79 5874->5885 5875->5874 5875->5881 5876->5881 5877 404114 ShowWindow 5877->5881 5878->5872 5878->5873 5879 4060bb 17 API calls 5878->5879 5878->5881 5888 40415a 18 API calls 5878->5888 5891 40415a 18 API calls 5878->5891 5907 404025 DestroyWindow 5878->5907 5879->5878 5880->5869 5883 404133 SendMessageA 5880->5883 5882->5880 5882->5884 5883->5869 5884->5869 5886 403d81 5885->5886 5887 403d96 5885->5887 5890 40140b 2 API calls 5886->5890 5889 40140b 2 API calls 5887->5889 5888->5878 5889->5880 5890->5880 5892 403f11 GetDlgItem 5891->5892 5893 403f26 5892->5893 5894 403f2e ShowWindow EnableWindow 5892->5894 5893->5894 5917 40417c EnableWindow 5894->5917 5896 403f58 EnableWindow 5901 403f6c 5896->5901 5897 403f71 GetSystemMenu EnableMenuItem SendMessageA 5898 403fa1 SendMessageA 5897->5898 5897->5901 5898->5901 5900 403c67 18 API calls 5900->5901 5901->5897 5901->5900 5918 40418f SendMessageA 5901->5918 5919 406099 lstrcpynA 5901->5919 5903 403fd0 lstrlenA 5904 4060bb 17 API calls 5903->5904 5905 403fe1 SetWindowTextA 5904->5905 5906 401389 2 API calls 5905->5906 5906->5878 5908 40403f CreateDialogParamA 5907->5908 5907->5916 5909 404072 5908->5909 5908->5916 5910 40415a 18 API calls 5909->5910 5911 40407d GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5910->5911 5912 401389 2 API calls 5911->5912 5913 4040c3 5912->5913 5913->5881 5914 4040cb ShowWindow 5913->5914 5915 4041a6 SendMessageA 5914->5915 5915->5916 5916->5877 5916->5881 5917->5896 5918->5901 5919->5903 4288 401389 4290 401390 4288->4290 4289 4013fe 4290->4289 4291 4013cb MulDiv SendMessageA 4290->4291 4291->4290 4360 40330d SetErrorMode GetVersion 4361 40334e 4360->4361 4362 403354 4360->4362 4363 406431 5 API calls 4361->4363 4364 4063c3 3 API calls 4362->4364 4363->4362 4365 40336a lstrlenA 4364->4365 4365->4362 4366 403379 4365->4366 4367 406431 5 API calls 4366->4367 4368 403380 4367->4368 4369 406431 5 API calls 4368->4369 4370 403387 4369->4370 4371 406431 5 API calls 4370->4371 4372 403393 #17 OleInitialize SHGetFileInfoA 4371->4372 4451 406099 lstrcpynA 4372->4451 4375 4033df GetCommandLineA 4452 406099 lstrcpynA 4375->4452 4377 4033f1 GetModuleHandleA 4378 403408 4377->4378 4379 405a5c CharNextA 4378->4379 4380 40341c CharNextA 4379->4380 4389 40342c 4380->4389 4381 4034f6 4382 403509 GetTempPathA 4381->4382 4453 4032dc 4382->4453 4384 403521 4385 403525 GetWindowsDirectoryA lstrcatA 4384->4385 4386 40357b DeleteFileA 4384->4386 4388 4032dc 12 API calls 4385->4388 4463 402d98 GetTickCount GetModuleFileNameA 4386->4463 4387 405a5c CharNextA 4387->4389 4391 403541 4388->4391 4389->4381 4389->4387 4392 4034f8 4389->4392 4391->4386 4394 403545 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4391->4394 4550 406099 lstrcpynA 4392->4550 4393 40358f 4400 405a5c CharNextA 4393->4400 4433 403615 4393->4433 4446 403625 4393->4446 4396 4032dc 12 API calls 4394->4396 4398 403573 4396->4398 4398->4386 4398->4446 4404 4035aa 4400->4404 4402 40375d 4406 403765 GetCurrentProcess OpenProcessToken 4402->4406 4407 4037df ExitProcess 4402->4407 4403 40363f 4576 4057b5 4403->4576 4410 4035f0 4404->4410 4411 403655 4404->4411 4412 4037b0 4406->4412 4413 403780 LookupPrivilegeValueA AdjustTokenPrivileges 4406->4413 4551 405b1f 4410->4551 4415 405720 5 API calls 4411->4415 4416 406431 5 API calls 4412->4416 4413->4412 4418 40365a lstrcatA 4415->4418 4419 4037b7 4416->4419 4420 403676 lstrcatA lstrcmpiA 4418->4420 4421 40366b lstrcatA 4418->4421 4422 4037cc ExitWindowsEx 4419->4422 4425 4037d8 4419->4425 4424 403692 4420->4424 4420->4446 4421->4420 4422->4407 4422->4425 4427 403697 4424->4427 4428 40369e 4424->4428 4589 40140b 4425->4589 4426 40360a 4566 406099 lstrcpynA 4426->4566 4431 405686 4 API calls 4427->4431 4432 405703 2 API calls 4428->4432 4434 40369c 4431->4434 4435 4036a3 SetCurrentDirectoryA 4432->4435 4493 4038e9 4433->4493 4434->4435 4436 4036b2 4435->4436 4437 4036bd 4435->4437 4580 406099 lstrcpynA 4436->4580 4581 406099 lstrcpynA 4437->4581 4440 4060bb 17 API calls 4441 4036fc DeleteFileA 4440->4441 4442 403709 CopyFileA 4441->4442 4448 4036cb 4441->4448 4442->4448 4443 403751 4444 405e78 36 API calls 4443->4444 4444->4446 4567 4037f7 4446->4567 4447 4060bb 17 API calls 4447->4448 4448->4440 4448->4443 4448->4447 4450 40373d CloseHandle 4448->4450 4582 405e78 MoveFileExA 4448->4582 4586 405738 CreateProcessA 4448->4586 4450->4448 4451->4375 4452->4377 4454 406303 5 API calls 4453->4454 4456 4032e8 4454->4456 4455 4032f2 4455->4384 4456->4455 4592 405a31 lstrlenA CharPrevA 4456->4592 4459 405703 2 API calls 4460 403300 4459->4460 4461 405c61 2 API calls 4460->4461 4462 40330b 4461->4462 4462->4384 4595 405c32 GetFileAttributesA CreateFileA 4463->4595 4465 402ddb 4492 402de8 4465->4492 4596 406099 lstrcpynA 4465->4596 4467 402dfe 4597 405a78 lstrlenA 4467->4597 4471 402e0f GetFileSize 4472 402f10 4471->4472 4476 402e26 4471->4476 4602 402cf9 4472->4602 4476->4472 4478 402fab 4476->4478 4485 402cf9 32 API calls 4476->4485 4476->4492 4633 4032af 4476->4633 4477 402f53 GlobalAlloc 4481 402f6a 4477->4481 4479 402cf9 32 API calls 4478->4479 4479->4492 4483 405c61 2 API calls 4481->4483 4482 402f34 4484 4032af ReadFile 4482->4484 4486 402f7b CreateFileA 4483->4486 4487 402f3f 4484->4487 4485->4476 4488 402fb5 4486->4488 4486->4492 4487->4477 4487->4492 4617 4032c5 SetFilePointer 4488->4617 4490 402fc3 4618 40303e 4490->4618 4492->4393 4492->4492 4494 406431 5 API calls 4493->4494 4495 4038fd 4494->4495 4496 403903 GetUserDefaultUILanguage 4495->4496 4497 403915 4495->4497 4667 405ff7 wsprintfA 4496->4667 4499 405f80 3 API calls 4497->4499 4501 403940 4499->4501 4500 403913 4668 403bae 4500->4668 4502 40395e lstrcatA 4501->4502 4503 405f80 3 API calls 4501->4503 4502->4500 4503->4502 4506 405b1f 18 API calls 4507 403990 4506->4507 4508 403a19 4507->4508 4510 405f80 3 API calls 4507->4510 4509 405b1f 18 API calls 4508->4509 4511 403a1f 4509->4511 4519 4039bc 4510->4519 4512 403a2f LoadImageA 4511->4512 4513 4060bb 17 API calls 4511->4513 4514 403ad5 4512->4514 4515 403a56 RegisterClassA 4512->4515 4513->4512 4517 40140b 2 API calls 4514->4517 4516 403a8c SystemParametersInfoA CreateWindowExA 4515->4516 4549 403adf 4515->4549 4516->4514 4522 403adb 4517->4522 4518 4039d8 lstrlenA 4520 4039e6 lstrcmpiA 4518->4520 4521 403a0c 4518->4521 4519->4508 4519->4518 4523 405a5c CharNextA 4519->4523 4520->4521 4524 4039f6 GetFileAttributesA 4520->4524 4525 405a31 3 API calls 4521->4525 4528 403bae 18 API calls 4522->4528 4522->4549 4526 4039d6 4523->4526 4527 403a02 4524->4527 4529 403a12 4525->4529 4526->4518 4527->4521 4530 405a78 2 API calls 4527->4530 4531 403aec 4528->4531 4676 406099 lstrcpynA 4529->4676 4530->4521 4533 403af8 ShowWindow 4531->4533 4534 403b7b 4531->4534 4536 4063c3 3 API calls 4533->4536 4677 405292 OleInitialize 4534->4677 4538 403b10 4536->4538 4537 403b81 4539 403b85 4537->4539 4540 403b9d 4537->4540 4541 403b1e GetClassInfoA 4538->4541 4543 4063c3 3 API calls 4538->4543 4547 40140b 2 API calls 4539->4547 4539->4549 4542 40140b 2 API calls 4540->4542 4544 403b32 GetClassInfoA RegisterClassA 4541->4544 4545 403b48 DialogBoxParamA 4541->4545 4542->4549 4543->4541 4544->4545 4546 40140b 2 API calls 4545->4546 4548 403b70 4546->4548 4547->4549 4548->4549 4549->4446 4550->4382 4695 406099 lstrcpynA 4551->4695 4553 405b30 4696 405aca CharNextA CharNextA 4553->4696 4556 4035fb 4556->4446 4565 406099 lstrcpynA 4556->4565 4557 406303 5 API calls 4563 405b46 4557->4563 4558 405b71 lstrlenA 4559 405b7c 4558->4559 4558->4563 4561 405a31 3 API calls 4559->4561 4562 405b81 GetFileAttributesA 4561->4562 4562->4556 4563->4556 4563->4558 4564 405a78 2 API calls 4563->4564 4702 40639c FindFirstFileA 4563->4702 4564->4558 4565->4426 4566->4433 4568 403812 4567->4568 4569 403808 CloseHandle 4567->4569 4570 403826 4568->4570 4571 40381c CloseHandle 4568->4571 4569->4568 4705 403854 4570->4705 4571->4570 4577 4057ca 4576->4577 4578 40364d ExitProcess 4577->4578 4579 4057de MessageBoxIndirectA 4577->4579 4579->4578 4580->4437 4581->4448 4583 405e99 4582->4583 4584 405e8c 4582->4584 4583->4448 4762 405d08 4584->4762 4587 405777 4586->4587 4588 40576b CloseHandle 4586->4588 4587->4448 4588->4587 4590 401389 2 API calls 4589->4590 4591 401420 4590->4591 4591->4407 4593 4032fa 4592->4593 4594 405a4b lstrcatA 4592->4594 4593->4459 4594->4593 4595->4465 4596->4467 4598 405a85 4597->4598 4599 402e04 4598->4599 4600 405a8a CharPrevA 4598->4600 4601 406099 lstrcpynA 4599->4601 4600->4598 4600->4599 4601->4471 4603 402d07 4602->4603 4604 402d1f 4602->4604 4607 402d10 DestroyWindow 4603->4607 4608 402d17 4603->4608 4605 402d27 4604->4605 4606 402d2f GetTickCount 4604->4606 4637 40646d 4605->4637 4606->4608 4610 402d3d 4606->4610 4607->4608 4608->4477 4608->4492 4636 4032c5 SetFilePointer 4608->4636 4611 402d72 CreateDialogParamA ShowWindow 4610->4611 4612 402d45 4610->4612 4611->4608 4612->4608 4641 402cdd 4612->4641 4614 402d53 wsprintfA 4615 4051c0 24 API calls 4614->4615 4616 402d70 4615->4616 4616->4608 4617->4490 4619 403069 4618->4619 4620 40304d SetFilePointer 4618->4620 4644 403146 GetTickCount 4619->4644 4620->4619 4623 405caa ReadFile 4624 403089 4623->4624 4625 403146 42 API calls 4624->4625 4627 403106 4624->4627 4626 4030a0 4625->4626 4626->4627 4628 40310c ReadFile 4626->4628 4630 4030af 4626->4630 4627->4492 4628->4627 4630->4627 4631 405caa ReadFile 4630->4631 4657 405cd9 WriteFile 4630->4657 4631->4630 4634 405caa ReadFile 4633->4634 4635 4032c2 4634->4635 4635->4476 4636->4482 4638 40648a PeekMessageA 4637->4638 4639 406480 DispatchMessageA 4638->4639 4640 40649a 4638->4640 4639->4638 4640->4608 4642 402cec 4641->4642 4643 402cee MulDiv 4641->4643 4642->4643 4643->4614 4645 403174 4644->4645 4646 40329e 4644->4646 4659 4032c5 SetFilePointer 4645->4659 4647 402cf9 32 API calls 4646->4647 4653 403070 4647->4653 4649 40317f SetFilePointer 4654 4031a4 4649->4654 4650 4032af ReadFile 4650->4654 4652 402cf9 32 API calls 4652->4654 4653->4623 4653->4627 4654->4650 4654->4652 4654->4653 4655 405cd9 WriteFile 4654->4655 4656 40327f SetFilePointer 4654->4656 4660 406576 4654->4660 4655->4654 4656->4646 4658 405cf7 4657->4658 4658->4630 4659->4649 4661 40659b 4660->4661 4662 4065a3 4660->4662 4661->4654 4662->4661 4663 406633 GlobalAlloc 4662->4663 4664 40662a GlobalFree 4662->4664 4665 4066a1 GlobalFree 4662->4665 4666 4066aa GlobalAlloc 4662->4666 4663->4661 4663->4662 4664->4663 4665->4666 4666->4661 4666->4662 4667->4500 4669 403bc2 4668->4669 4684 405ff7 wsprintfA 4669->4684 4671 403c33 4685 403c67 4671->4685 4673 40396e 4673->4506 4674 403c38 4674->4673 4675 4060bb 17 API calls 4674->4675 4675->4674 4676->4508 4688 4041a6 4677->4688 4679 4052dc 4680 4041a6 SendMessageA 4679->4680 4681 4052ee OleUninitialize 4680->4681 4681->4537 4683 4052b5 4683->4679 4691 401389 4683->4691 4684->4671 4686 4060bb 17 API calls 4685->4686 4687 403c75 SetWindowTextA 4686->4687 4687->4674 4689 4041be 4688->4689 4690 4041af SendMessageA 4688->4690 4689->4683 4690->4689 4693 401390 4691->4693 4692 4013fe 4692->4683 4693->4692 4694 4013cb MulDiv SendMessageA 4693->4694 4694->4693 4695->4553 4697 405ae5 4696->4697 4700 405af5 4696->4700 4698 405af0 CharNextA 4697->4698 4697->4700 4701 405b15 4698->4701 4699 405a5c CharNextA 4699->4700 4700->4699 4700->4701 4701->4556 4701->4557 4703 4063b2 FindClose 4702->4703 4704 4063bd 4702->4704 4703->4704 4704->4563 4706 403862 4705->4706 4707 40382b 4706->4707 4708 403867 FreeLibrary GlobalFree 4706->4708 4709 405861 4707->4709 4708->4707 4708->4708 4710 405b1f 18 API calls 4709->4710 4711 405881 4710->4711 4712 4058a0 4711->4712 4713 405889 DeleteFileA 4711->4713 4715 4059d8 4712->4715 4749 406099 lstrcpynA 4712->4749 4714 40362e OleUninitialize 4713->4714 4714->4402 4714->4403 4715->4714 4720 40639c 2 API calls 4715->4720 4717 4058c6 4718 4058d9 4717->4718 4719 4058cc lstrcatA 4717->4719 4722 405a78 2 API calls 4718->4722 4721 4058df 4719->4721 4723 4059f2 4720->4723 4724 4058ed lstrcatA 4721->4724 4726 4058f8 lstrlenA FindFirstFileA 4721->4726 4722->4721 4723->4714 4725 4059f6 4723->4725 4724->4726 4727 405a31 3 API calls 4725->4727 4728 4059ce 4726->4728 4736 40591c 4726->4736 4729 4059fc 4727->4729 4728->4715 4731 405819 5 API calls 4729->4731 4730 405a5c CharNextA 4730->4736 4732 405a08 4731->4732 4733 405a22 4732->4733 4734 405a0c 4732->4734 4735 4051c0 24 API calls 4733->4735 4734->4714 4740 4051c0 24 API calls 4734->4740 4735->4714 4736->4730 4737 4059ad FindNextFileA 4736->4737 4744 405861 60 API calls 4736->4744 4746 4051c0 24 API calls 4736->4746 4747 4051c0 24 API calls 4736->4747 4748 405e78 36 API calls 4736->4748 4750 406099 lstrcpynA 4736->4750 4751 405819 4736->4751 4737->4736 4739 4059c5 FindClose 4737->4739 4739->4728 4741 405a19 4740->4741 4742 405e78 36 API calls 4741->4742 4745 405a20 4742->4745 4744->4736 4745->4714 4746->4737 4747->4736 4748->4736 4749->4717 4750->4736 4759 405c0d GetFileAttributesA 4751->4759 4754 405834 RemoveDirectoryA 4757 405842 4754->4757 4755 40583c DeleteFileA 4755->4757 4756 405846 4756->4736 4757->4756 4758 405852 SetFileAttributesA 4757->4758 4758->4756 4760 405825 4759->4760 4761 405c1f SetFileAttributesA 4759->4761 4760->4754 4760->4755 4760->4756 4761->4760 4763 405d54 GetShortPathNameA 4762->4763 4764 405d2e 4762->4764 4766 405e73 4763->4766 4767 405d69 4763->4767 4789 405c32 GetFileAttributesA CreateFileA 4764->4789 4766->4583 4767->4766 4769 405d71 wsprintfA 4767->4769 4768 405d38 CloseHandle GetShortPathNameA 4768->4766 4770 405d4c 4768->4770 4771 4060bb 17 API calls 4769->4771 4770->4763 4770->4766 4772 405d99 4771->4772 4790 405c32 GetFileAttributesA CreateFileA 4772->4790 4774 405da6 4774->4766 4775 405db5 GetFileSize GlobalAlloc 4774->4775 4776 405dd7 4775->4776 4777 405e6c CloseHandle 4775->4777 4778 405caa ReadFile 4776->4778 4777->4766 4779 405ddf 4778->4779 4779->4777 4791 405b97 lstrlenA 4779->4791 4782 405df6 lstrcpyA 4785 405e18 4782->4785 4783 405e0a 4784 405b97 4 API calls 4783->4784 4784->4785 4786 405e4f SetFilePointer 4785->4786 4787 405cd9 WriteFile 4786->4787 4788 405e65 GlobalFree 4787->4788 4788->4777 4789->4768 4790->4774 4792 405bd8 lstrlenA 4791->4792 4793 405be0 4792->4793 4794 405bb1 lstrcmpiA 4792->4794 4793->4782 4793->4783 4794->4793 4795 405bcf CharNextA 4794->4795 4795->4792 5920 401490 5921 4051c0 24 API calls 5920->5921 5922 401497 5921->5922 5380 338e46d 5381 338e49d 5380->5381 5382 33923cf 5381->5382 5385 33921e4 5381->5385 5389 3392404 5382->5389 5387 339226e 5385->5387 5386 33922b2 5387->5386 5388 339229c NtAllocateVirtualMemory 5387->5388 5388->5386 5390 3392413 5389->5390 5391 33923cf 5390->5391 5393 33627ab 5390->5393 5394 33921df 5390->5394 5395 3392404 NtAllocateVirtualMemory 5391->5395 5392 33921e4 NtAllocateVirtualMemory 5392->5391 5397 33627bf 5393->5397 5398 3365667 5393->5398 5394->5391 5394->5392 5395->5391 5397->5382 5402 3365694 5398->5402 5399 33923cf 5401 3392404 NtAllocateVirtualMemory 5399->5401 5400 33921e4 NtAllocateVirtualMemory 5400->5399 5401->5399 5403 33658c2 5402->5403 5404 33627ab 5402->5404 5403->5393 5403->5399 5403->5400 5405 3365667 NtAllocateVirtualMemory 5404->5405 5406 33627bf 5404->5406 5405->5404 5406->5393 5923 401d95 GetDC 5924 402a9f 17 API calls 5923->5924 5925 401da7 GetDeviceCaps MulDiv ReleaseDC 5924->5925 5926 402a9f 17 API calls 5925->5926 5927 401dd8 5926->5927 5928 4060bb 17 API calls 5927->5928 5929 401e15 CreateFontIndirectA 5928->5929 5930 402577 5929->5930 5407 10001058 5409 10001074 5407->5409 5408 100010dc 5409->5408 5410 100014bb GlobalFree 5409->5410 5411 10001091 5409->5411 5410->5411 5412 100014bb GlobalFree 5411->5412 5413 100010a1 5412->5413 5414 100010b1 5413->5414 5415 100010a8 GlobalSize 5413->5415 5416 100010b5 GlobalAlloc 5414->5416 5417 100010c6 5414->5417 5415->5414 5418 100014e2 3 API calls 5416->5418 5419 100010d1 GlobalFree 5417->5419 5418->5417 5419->5408 5420 406e18 5423 4065a9 5420->5423 5421 406633 GlobalAlloc 5421->5423 5424 406f14 5421->5424 5422 40662a GlobalFree 5422->5421 5423->5421 5423->5422 5423->5423 5423->5424 5425 4066a1 GlobalFree 5423->5425 5426 4066aa GlobalAlloc 5423->5426 5425->5426 5426->5423 5426->5424 5427 401d1a 5428 402a9f 17 API calls 5427->5428 5429 401d28 SetWindowLongA 5428->5429 5430 402951 5429->5430 5431 40491b 5432 404947 5431->5432 5433 40492b 5431->5433 5435 40497a 5432->5435 5436 40494d SHGetPathFromIDListA 5432->5436 5442 405799 GetDlgItemTextA 5433->5442 5438 404964 SendMessageA 5436->5438 5439 40495d 5436->5439 5437 404938 SendMessageA 5437->5432 5438->5435 5441 40140b 2 API calls 5439->5441 5441->5438 5442->5437 5064 33921e4 5066 339226e 5064->5066 5065 33922b2 5066->5065 5067 339229c NtAllocateVirtualMemory 5066->5067 5067->5065 5068 40159d 5069 402ac1 17 API calls 5068->5069 5070 4015a4 SetFileAttributesA 5069->5070 5071 4015b6 5070->5071 5936 40149d 5937 4022e1 5936->5937 5938 4014ab PostQuitMessage 5936->5938 5938->5937 5443 401a1e 5444 402ac1 17 API calls 5443->5444 5445 401a27 ExpandEnvironmentStringsA 5444->5445 5446 401a3b 5445->5446 5448 401a4e 5445->5448 5447 401a40 lstrcmpA 5446->5447 5446->5448 5447->5448 5449 40171f 5450 402ac1 17 API calls 5449->5450 5451 401726 SearchPathA 5450->5451 5452 401741 5451->5452 5939 100010e0 5941 1000110e 5939->5941 5940 100011c4 GlobalFree 5941->5940 5942 100012ad 2 API calls 5941->5942 5943 100011c3 5941->5943 5944 10001266 2 API calls 5941->5944 5945 10001155 GlobalAlloc 5941->5945 5946 100011ea GlobalFree 5941->5946 5947 100011b1 GlobalFree 5941->5947 5948 100012d1 lstrcpyA 5941->5948 5942->5941 5943->5940 5944->5947 5945->5941 5946->5941 5947->5941 5948->5941 5453 10002162 5454 100021c0 5453->5454 5455 100021f6 5453->5455 5454->5455 5456 100021d2 GlobalAlloc 5454->5456 5456->5454 5949 4042a3 5950 4042b9 5949->5950 5955 4043c5 5949->5955 5953 40415a 18 API calls 5950->5953 5951 404434 5952 4044fe 5951->5952 5954 40443e GetDlgItem 5951->5954 5959 4041c1 8 API calls 5952->5959 5956 40430f 5953->5956 5960 404454 5954->5960 5961 4044bc 5954->5961 5955->5951 5955->5952 5957 404409 GetDlgItem SendMessageA 5955->5957 5958 40415a 18 API calls 5956->5958 5982 40417c EnableWindow 5957->5982 5963 40431c CheckDlgButton 5958->5963 5964 4044f9 5959->5964 5960->5961 5965 40447a SendMessageA LoadCursorA SetCursor 5960->5965 5961->5952 5966 4044ce 5961->5966 5980 40417c EnableWindow 5963->5980 5983 404547 5965->5983 5967 4044d4 SendMessageA 5966->5967 5968 4044e5 5966->5968 5967->5968 5968->5964 5972 4044eb SendMessageA 5968->5972 5969 40442f 5973 404523 SendMessageA 5969->5973 5972->5964 5973->5951 5974 40433a GetDlgItem 5981 40418f SendMessageA 5974->5981 5977 404350 SendMessageA 5978 404377 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5977->5978 5979 40436e GetSysColor 5977->5979 5978->5964 5979->5978 5980->5974 5981->5977 5982->5969 5986 40577b ShellExecuteExA 5983->5986 5985 4044ad LoadCursorA SetCursor 5985->5961 5986->5985 5457 401e25 5458 402a9f 17 API calls 5457->5458 5459 401e2b 5458->5459 5460 402a9f 17 API calls 5459->5460 5461 401e37 5460->5461 5462 401e43 ShowWindow 5461->5462 5463 401e4e EnableWindow 5461->5463 5464 402951 5462->5464 5463->5464 5465 406725 5466 4065a9 5465->5466 5467 406f14 5466->5467 5468 406633 GlobalAlloc 5466->5468 5469 40662a GlobalFree 5466->5469 5470 4066a1 GlobalFree 5466->5470 5471 4066aa GlobalAlloc 5466->5471 5468->5466 5468->5467 5469->5468 5470->5471 5471->5466 5471->5467 5987 4064a6 WaitForSingleObject 5988 4064c0 5987->5988 5989 4064d2 GetExitCodeProcess 5988->5989 5990 40646d 2 API calls 5988->5990 5991 4064c7 WaitForSingleObject 5990->5991 5991->5988 5992 4038a7 5993 4038b2 5992->5993 5994 4038b6 5993->5994 5995 4038b9 GlobalAlloc 5993->5995 5995->5994 5472 401f2b 5473 402ac1 17 API calls 5472->5473 5474 401f32 5473->5474 5475 40639c 2 API calls 5474->5475 5476 401f38 5475->5476 5477 401f4a 5476->5477 5479 405ff7 wsprintfA 5476->5479 5479->5477 5480 40292c SendMessageA 5481 402951 5480->5481 5482 402946 InvalidateRect 5480->5482 5482->5481 5490 405134 5491 405144 5490->5491 5492 405158 5490->5492 5493 40514a 5491->5493 5502 4051a1 5491->5502 5494 405160 IsWindowVisible 5492->5494 5500 405177 5492->5500 5496 4041a6 SendMessageA 5493->5496 5497 40516d 5494->5497 5494->5502 5495 4051a6 CallWindowProcA 5498 405154 5495->5498 5496->5498 5503 404a8b SendMessageA 5497->5503 5500->5495 5508 404b0b 5500->5508 5502->5495 5504 404aea SendMessageA 5503->5504 5505 404aae GetMessagePos ScreenToClient SendMessageA 5503->5505 5506 404ae2 5504->5506 5505->5506 5507 404ae7 5505->5507 5506->5500 5507->5504 5517 406099 lstrcpynA 5508->5517 5510 404b1e 5518 405ff7 wsprintfA 5510->5518 5512 404b28 5513 40140b 2 API calls 5512->5513 5514 404b31 5513->5514 5519 406099 lstrcpynA 5514->5519 5516 404b38 5516->5502 5517->5510 5518->5512 5519->5516 5996 4026b4 5997 4026ba 5996->5997 5998 402951 5997->5998 5999 4026c2 FindClose 5997->5999 5999->5998 6000 4014b7 6001 4014bd 6000->6001 6002 401389 2 API calls 6001->6002 6003 4014c5 6002->6003 5520 401b39 5521 402ac1 17 API calls 5520->5521 5522 401b40 5521->5522 5523 402a9f 17 API calls 5522->5523 5524 401b49 wsprintfA 5523->5524 5525 402951 5524->5525 4879 40233a 4880 402ac1 17 API calls 4879->4880 4881 40234b 4880->4881 4882 402ac1 17 API calls 4881->4882 4883 402354 4882->4883 4884 402ac1 17 API calls 4883->4884 4885 40235e GetPrivateProfileStringA 4884->4885 5526 401d3b GetDlgItem GetClientRect 5527 402ac1 17 API calls 5526->5527 5528 401d6b LoadImageA SendMessageA 5527->5528 5529 402951 5528->5529 5530 401d89 DeleteObject 5528->5530 5530->5529 6004 4016bb 6005 402ac1 17 API calls 6004->6005 6006 4016c1 GetFullPathNameA 6005->6006 6007 4016d8 6006->6007 6008 4016f9 6006->6008 6007->6008 6011 40639c 2 API calls 6007->6011 6009 402951 6008->6009 6010 40170d GetShortPathNameA 6008->6010 6010->6009 6012 4016e9 6011->6012 6012->6008 6014 406099 lstrcpynA 6012->6014 6014->6008 5531 404b3d GetDlgItem GetDlgItem 5532 404b8f 7 API calls 5531->5532 5535 404da7 5531->5535 5533 404c32 DeleteObject 5532->5533 5534 404c25 SendMessageA 5532->5534 5536 404c3b 5533->5536 5534->5533 5547 404e8b 5535->5547 5549 404a8b 5 API calls 5535->5549 5565 404e18 5535->5565 5537 404c72 5536->5537 5538 4060bb 17 API calls 5536->5538 5582 40415a 5537->5582 5541 404c54 SendMessageA SendMessageA 5538->5541 5540 404f37 5542 404f41 SendMessageA 5540->5542 5543 404f49 5540->5543 5541->5536 5542->5543 5553 404f62 5543->5553 5554 404f5b ImageList_Destroy 5543->5554 5562 404f72 5543->5562 5544 404c86 5550 40415a 18 API calls 5544->5550 5545 404d9a 5590 4041c1 5545->5590 5547->5540 5547->5545 5551 404ee4 SendMessageA 5547->5551 5548 404e7d SendMessageA 5548->5547 5549->5565 5566 404c94 5550->5566 5551->5545 5556 404ef9 SendMessageA 5551->5556 5557 404f6b GlobalFree 5553->5557 5553->5562 5554->5553 5555 4050e1 5555->5545 5560 4050f3 ShowWindow GetDlgItem ShowWindow 5555->5560 5559 404f0c 5556->5559 5557->5562 5558 404d68 GetWindowLongA SetWindowLongA 5561 404d81 5558->5561 5567 404f1d SendMessageA 5559->5567 5560->5545 5563 404d87 ShowWindow 5561->5563 5564 404d9f 5561->5564 5562->5555 5574 404b0b 4 API calls 5562->5574 5578 404fad 5562->5578 5585 40418f SendMessageA 5563->5585 5586 40418f SendMessageA 5564->5586 5565->5547 5565->5548 5566->5558 5568 404d62 5566->5568 5571 404ce3 SendMessageA 5566->5571 5572 404d30 SendMessageA 5566->5572 5573 404d1f SendMessageA 5566->5573 5567->5540 5568->5558 5568->5561 5571->5566 5572->5566 5573->5566 5574->5578 5575 4050b7 InvalidateRect 5575->5555 5576 4050cd 5575->5576 5587 404a46 5576->5587 5577 404fdb SendMessageA 5581 404ff1 5577->5581 5578->5577 5578->5581 5580 405065 SendMessageA SendMessageA 5580->5581 5581->5575 5581->5580 5583 4060bb 17 API calls 5582->5583 5584 404165 SetDlgItemTextA 5583->5584 5584->5544 5585->5545 5586->5535 5604 404981 5587->5604 5589 404a5b 5589->5555 5591 404262 5590->5591 5592 4041d9 GetWindowLongA 5590->5592 5592->5591 5593 4041ea 5592->5593 5594 4041f9 GetSysColor 5593->5594 5595 4041fc 5593->5595 5594->5595 5596 404202 SetTextColor 5595->5596 5597 40420c SetBkMode 5595->5597 5596->5597 5598 404224 GetSysColor 5597->5598 5599 40422a 5597->5599 5598->5599 5600 404231 SetBkColor 5599->5600 5601 40423b 5599->5601 5600->5601 5601->5591 5602 404255 CreateBrushIndirect 5601->5602 5603 40424e DeleteObject 5601->5603 5602->5591 5603->5602 5605 404997 5604->5605 5606 4060bb 17 API calls 5605->5606 5607 4049fb 5606->5607 5608 4060bb 17 API calls 5607->5608 5609 404a06 5608->5609 5610 4060bb 17 API calls 5609->5610 5611 404a1c lstrlenA wsprintfA SetDlgItemTextA 5610->5611 5611->5589

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 0 40330d-40334c SetErrorMode GetVersion 1 40334e-403356 call 406431 0->1 2 40335f 0->2 1->2 8 403358 1->8 3 403364-403377 call 4063c3 lstrlenA 2->3 9 403379-403395 call 406431 * 3 3->9 8->2 16 4033a6-403406 #17 OleInitialize SHGetFileInfoA call 406099 GetCommandLineA call 406099 GetModuleHandleA 9->16 17 403397-40339d 9->17 24 403412-403427 call 405a5c CharNextA 16->24 25 403408-40340d 16->25 17->16 22 40339f 17->22 22->16 28 4034ec-4034f0 24->28 25->24 29 4034f6 28->29 30 40342c-40342f 28->30 33 403509-403523 GetTempPathA call 4032dc 29->33 31 403431-403435 30->31 32 403437-40343f 30->32 31->31 31->32 34 403441-403442 32->34 35 403447-40344a 32->35 40 403525-403543 GetWindowsDirectoryA lstrcatA call 4032dc 33->40 41 40357b-403595 DeleteFileA call 402d98 33->41 34->35 38 403450-403454 35->38 39 4034dc-4034e9 call 405a5c 35->39 43 403456-40345c 38->43 44 40346c-403499 38->44 39->28 57 4034eb 39->57 40->41 58 403545-403575 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4032dc 40->58 59 403629-403639 call 4037f7 OleUninitialize 41->59 60 40359b-4035a1 41->60 50 403462 43->50 51 40345e-403460 43->51 46 40349b-4034a1 44->46 47 4034ac-4034da 44->47 53 4034a3-4034a5 46->53 54 4034a7 46->54 47->39 55 4034f8-403504 call 406099 47->55 50->44 51->44 51->50 53->47 53->54 54->47 55->33 57->28 58->41 58->59 70 40375d-403763 59->70 71 40363f-40364f call 4057b5 ExitProcess 59->71 63 4035a3-4035ae call 405a5c 60->63 64 403619-403620 call 4038e9 60->64 77 4035b0-4035d9 63->77 78 4035e4-4035ee 63->78 72 403625 64->72 75 403765-40377e GetCurrentProcess OpenProcessToken 70->75 76 4037df-4037e7 70->76 72->59 84 4037b0-4037be call 406431 75->84 85 403780-4037aa LookupPrivilegeValueA AdjustTokenPrivileges 75->85 79 4037e9 76->79 80 4037ed-4037f1 ExitProcess 76->80 86 4035db-4035dd 77->86 82 4035f0-4035fd call 405b1f 78->82 83 403655-403669 call 405720 lstrcatA 78->83 79->80 82->59 94 4035ff-403615 call 406099 * 2 82->94 95 403676-403690 lstrcatA lstrcmpiA 83->95 96 40366b-403671 lstrcatA 83->96 97 4037c0-4037ca 84->97 98 4037cc-4037d6 ExitWindowsEx 84->98 85->84 86->78 87 4035df-4035e2 86->87 87->78 87->86 94->64 95->59 100 403692-403695 95->100 96->95 97->98 101 4037d8-4037da call 40140b 97->101 98->76 98->101 103 403697-40369c call 405686 100->103 104 40369e call 405703 100->104 101->76 112 4036a3-4036b0 SetCurrentDirectoryA 103->112 104->112 113 4036b2-4036b8 call 406099 112->113 114 4036bd-4036e5 call 406099 112->114 113->114 118 4036eb-403707 call 4060bb DeleteFileA 114->118 121 403748-40374f 118->121 122 403709-403719 CopyFileA 118->122 121->118 123 403751-403758 call 405e78 121->123 122->121 124 40371b-40373b call 405e78 call 4060bb call 405738 122->124 123->59 124->121 133 40373d-403744 CloseHandle 124->133 133->121
                              APIs
                              • SetErrorMode.KERNELBASE ref: 00403332
                              • GetVersion.KERNEL32 ref: 00403338
                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040336B
                              • #17.COMCTL32(?,00000006,?,0000000A), ref: 004033A7
                              • OleInitialize.OLE32(00000000), ref: 004033AE
                              • SHGetFileInfoA.SHELL32(0041FCF0,00000000,?,?,00000000,?,00000006,?,0000000A), ref: 004033CA
                              • GetCommandLineA.KERNEL32(00423F20,NSIS Error,?,00000006,?,0000000A), ref: 004033DF
                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000,?,00000006,?,0000000A), ref: 004033F2
                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000020,?,00000006,?,0000000A), ref: 0040341D
                              • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,?,0000000A), ref: 0040351A
                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,?,0000000A), ref: 0040352B
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,?,0000000A), ref: 00403537
                              • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,?,0000000A), ref: 0040354B
                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,?,0000000A), ref: 00403553
                              • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,?,0000000A), ref: 00403564
                              • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,?,0000000A), ref: 0040356C
                              • DeleteFileA.KERNELBASE(1033,?,00000006,?,0000000A), ref: 00403580
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,?,0000000A), ref: 004060A6
                                • Part of subcall function 004038E9: GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000), ref: 00403903
                                • Part of subcall function 004038E9: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne,1033,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,74DF3410), ref: 004039D9
                                • Part of subcall function 004038E9: lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                                • Part of subcall function 004038E9: GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                                • Part of subcall function 004038E9: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne), ref: 00403A40
                                • Part of subcall function 004038E9: RegisterClassA.USER32(00423EC0), ref: 00403A7D
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002B4,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,?,0000000A), ref: 00403809
                                • Part of subcall function 004037F7: CloseHandle.KERNEL32(000002BC,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,?,0000000A), ref: 0040381D
                              • OleUninitialize.OLE32(?,?,00000006,?,0000000A), ref: 0040362E
                              • ExitProcess.KERNEL32 ref: 0040364F
                              • GetCurrentProcess.KERNEL32(?,?,00000006,?,0000000A), ref: 0040376C
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403773
                              • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040378B
                              • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004037AA
                              • ExitWindowsEx.USER32(00000002,80040002), ref: 004037CE
                              • ExitProcess.KERNEL32 ref: 004037F1
                                • Part of subcall function 004057B5: MessageBoxIndirectA.USER32(0040A230), ref: 00405810
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: HandleProcess$ExitFile$CloseEnvironmentModulePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCommandCurrentDefaultDeleteDirectoryErrorImageIndirectInfoInitializeLanguageLineLoadLookupMessageModeNextOpenPrivilegePrivilegesProcRegisterUninitializeUserValueVersionlstrcmpilstrcpyn
                              • String ID: "$"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$.tmp$1033$49610752$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu
                              • API String ID: 1129060429-2709583667
                              • Opcode ID: 80222e2a1608f68e9a01e2d4467cb4f437ef41324d85fef8055a94e839ea45f6
                              • Instruction ID: 629f98fd345f67a1e75e2db33264847053f345a98c6a7e8b50a39e9081f0102f
                              • Opcode Fuzzy Hash: 80222e2a1608f68e9a01e2d4467cb4f437ef41324d85fef8055a94e839ea45f6
                              • Instruction Fuzzy Hash: 46C1E6702047506AD721AF759D89A2F3EACAB81706F45443FF581B61E2CB7C8A158B2F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 340 401759-40177c call 402ac1 call 405a9e 345 401786-401798 call 406099 call 405a31 lstrcatA 340->345 346 40177e-401784 call 406099 340->346 351 40179d-4017a3 call 406303 345->351 346->351 356 4017a8-4017ac 351->356 357 4017ae-4017b8 call 40639c 356->357 358 4017df-4017e2 356->358 365 4017ca-4017dc 357->365 366 4017ba-4017c8 CompareFileTime 357->366 359 4017e4-4017e5 call 405c0d 358->359 360 4017ea-401806 call 405c32 358->360 359->360 368 401808-40180b 360->368 369 40187e-4018a7 call 4051c0 call 40303e 360->369 365->358 366->365 370 401860-40186a call 4051c0 368->370 371 40180d-40184f call 406099 * 2 call 4060bb call 406099 call 4057b5 368->371 381 4018a9-4018ad 369->381 382 4018af-4018bb SetFileTime 369->382 383 401873-401879 370->383 371->356 404 401855-401856 371->404 381->382 385 4018c1-4018cc CloseHandle 381->385 382->385 386 40295a 383->386 389 402951-402954 385->389 390 4018d2-4018d5 385->390 391 40295c-402960 386->391 389->386 393 4018d7-4018e8 call 4060bb lstrcatA 390->393 394 4018ea-4018ed call 4060bb 390->394 400 4018f2-4022e6 call 4057b5 393->400 394->400 400->391 404->383 406 401858-401859 404->406 406->370
                              APIs
                              • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne,00000000,00000000,00000031), ref: 00401798
                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne,00000000,00000000,00000031), ref: 004017C2
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,?,0000000A), ref: 004060A6
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne$C:\Users\user\AppData\Local\Temp\nsw94A.tmp$C:\Users\user\AppData\Local\Temp\nsw94A.tmp\System.dll$Call$user32::EnumWindows(i r1 ,i 0)
                              • API String ID: 1941528284-1753177355
                              • Opcode ID: 6d4c10959a53388a6810b5416c206514c44b4a0d35f0a660f1aca1b6d6b68858
                              • Instruction ID: 2c94bdb1ed45b9066cdaff59bd30f99cb4fab6046a6a22cdc065c2defd4e90a3
                              • Opcode Fuzzy Hash: 6d4c10959a53388a6810b5416c206514c44b4a0d35f0a660f1aca1b6d6b68858
                              • Instruction Fuzzy Hash: CD41D871A00615BBCB10BFB5CC45EAF3669EF01329B21823FF522B10E1D77C89518A6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 407 405861-405887 call 405b1f 410 4058a0-4058a7 407->410 411 405889-40589b DeleteFileA 407->411 413 4058a9-4058ab 410->413 414 4058ba-4058ca call 406099 410->414 412 405a2a-405a2e 411->412 415 4058b1-4058b4 413->415 416 4059d8-4059dd 413->416 422 4058d9-4058da call 405a78 414->422 423 4058cc-4058d7 lstrcatA 414->423 415->414 415->416 416->412 419 4059df-4059e2 416->419 420 4059e4-4059ea 419->420 421 4059ec-4059f4 call 40639c 419->421 420->412 421->412 430 4059f6-405a0a call 405a31 call 405819 421->430 425 4058df-4058e2 422->425 423->425 428 4058e4-4058eb 425->428 429 4058ed-4058f3 lstrcatA 425->429 428->429 431 4058f8-405916 lstrlenA FindFirstFileA 428->431 429->431 446 405a22-405a25 call 4051c0 430->446 447 405a0c-405a0f 430->447 433 40591c-405933 call 405a5c 431->433 434 4059ce-4059d2 431->434 440 405935-405939 433->440 441 40593e-405941 433->441 434->416 436 4059d4 434->436 436->416 440->441 443 40593b 440->443 444 405943-405948 441->444 445 405954-405962 call 406099 441->445 443->441 449 40594a-40594c 444->449 450 4059ad-4059bf FindNextFileA 444->450 457 405964-40596c 445->457 458 405979-405984 call 405819 445->458 446->412 447->420 452 405a11-405a20 call 4051c0 call 405e78 447->452 449->445 453 40594e-405952 449->453 450->433 455 4059c5-4059c8 FindClose 450->455 452->412 453->445 453->450 455->434 457->450 460 40596e-405977 call 405861 457->460 466 4059a5-4059a8 call 4051c0 458->466 467 405986-405989 458->467 460->450 466->450 469 40598b-40599b call 4051c0 call 405e78 467->469 470 40599d-4059a3 467->470 469->450 470->450
                              APIs
                              • DeleteFileA.KERNELBASE(?,?,74DF3410,74DF2EE0,00000000), ref: 0040588A
                              • lstrcatA.KERNEL32(00421D38,\*.*,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 004058D2
                              • lstrcatA.KERNEL32(?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 004058F3
                              • lstrlenA.KERNEL32(?,?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 004058F9
                              • FindFirstFileA.KERNEL32(00421D38,?,?,?,0040A014,?,00421D38,?,?,74DF3410,74DF2EE0,00000000), ref: 0040590A
                              • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004059B7
                              • FindClose.KERNEL32(00000000), ref: 004059C8
                              Strings
                              • \*.*, xrefs: 004058CC
                              • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 00405861
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                              • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$\*.*
                              • API String ID: 2035342205-370014428
                              • Opcode ID: e51b648568a1e5a9b47539b24ed2716d15288ef485a4508b80519d1c974b3528
                              • Instruction ID: 1dcfc4082d76b88a8dbc056b088e655b37054d2965a561fc4bca86fefb361094
                              • Opcode Fuzzy Hash: e51b648568a1e5a9b47539b24ed2716d15288ef485a4508b80519d1c974b3528
                              • Instruction Fuzzy Hash: 8C51AF71900A04EADB22AB258C85BBF7A78DF42724F14817BF851B51D2D73C4982DF6E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 612 406725-40672a 613 40679b-4067b9 612->613 614 40672c-40675b 612->614 617 406d91-406da6 613->617 615 406762-406766 614->615 616 40675d-406760 614->616 619 406768-40676c 615->619 620 40676e 615->620 618 406772-406775 616->618 621 406dc0-406dd6 617->621 622 406da8-406dbe 617->622 623 406793-406796 618->623 624 406777-406780 618->624 619->618 620->618 625 406dd9-406de0 621->625 622->625 628 406968-406986 623->628 626 406782 624->626 627 406785-406791 624->627 629 406de2-406de6 625->629 630 406e07-406e13 625->630 626->627 636 4067fb-406829 627->636 633 406988-40699c 628->633 634 40699e-4069b0 628->634 631 406f95-406f9f 629->631 632 406dec-406e04 629->632 638 4065a9-4065b2 630->638 639 406fab-406fbe 631->639 632->630 637 4069b3-4069bd 633->637 634->637 640 406845-40685f 636->640 641 40682b-406843 636->641 643 406960-406966 637->643 644 4069bf 637->644 646 406fc0 638->646 647 4065b8 638->647 645 406fc3-406fc7 639->645 642 406862-40686c 640->642 641->642 649 406872 642->649 650 4067e3-4067e9 642->650 643->628 648 406904-40690e 643->648 651 406ad0-406add 644->651 652 40693b-40693f 644->652 646->645 653 406664-406668 647->653 654 4066d4-4066d8 647->654 655 4065bf-4065c3 647->655 656 4066ff-406720 647->656 662 406f53-406f5d 648->662 663 406914-406936 648->663 673 4067c8-4067e0 649->673 674 406f2f-406f39 649->674 664 40689c-4068a2 650->664 665 4067ef-4067f5 650->665 651->638 667 406945-40695d 652->667 668 406f47-406f51 652->668 660 406f14-406f1e 653->660 661 40666e-406687 653->661 657 406f23-406f2d 654->657 658 4066de-4066f2 654->658 655->639 666 4065c9-4065d6 655->666 656->617 657->639 669 4066f5-4066fd 658->669 660->639 672 40668a-40668e 661->672 662->639 663->651 670 406900 664->670 671 4068a4-4068c2 664->671 665->636 665->670 666->646 675 4065dc-406622 666->675 667->643 668->639 669->654 669->656 670->648 678 4068c4-4068d8 671->678 679 4068da-4068ec 671->679 672->653 680 406690-406696 672->680 673->650 674->639 676 406624-406628 675->676 677 40664a-40664c 675->677 681 406633-406641 GlobalAlloc 676->681 682 40662a-40662d GlobalFree 676->682 683 40665a-406662 677->683 684 40664e-406658 677->684 685 4068ef-4068f9 678->685 679->685 686 4066c0-4066d2 680->686 687 406698-40669f 680->687 681->646 688 406647 681->688 682->681 683->672 684->683 684->684 685->664 689 4068fb 685->689 686->669 690 4066a1-4066a4 GlobalFree 687->690 691 4066aa-4066ba GlobalAlloc 687->691 688->677 693 406881-406899 689->693 694 406f3b-406f45 689->694 690->691 691->646 691->686 693->664 694->639
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction ID: 4aa70ef1b53fe275c3baa8fcae8ec6f6e0a9bb882f540f469220498d10fac131
                              • Opcode Fuzzy Hash: 33747ec9ccf1e96e03ed3acadba13ccb82446055e1a2ca0fa1c9679c5aff3799
                              • Instruction Fuzzy Hash: E9F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D7785A9ACF44
                              APIs
                              • FindFirstFileA.KERNELBASE(74DF3410,00422580,C:\,00405B62,C:\,C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405881,?,74DF3410,74DF2EE0), ref: 004063A7
                              • FindClose.KERNEL32(00000000), ref: 004063B3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID: C:\
                              • API String ID: 2295610775-3404278061
                              • Opcode ID: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                              • Instruction ID: 7ad18ffb452888df832aaad39da4d842c40e8f76539fb63f13b43eacc156c169
                              • Opcode Fuzzy Hash: 650a356e45ca360fc625af9c332ec7d5af07b83f4ad3dd0750b8552cb66ed4f4
                              • Instruction Fuzzy Hash: 7CD012316050306BC20117386E0C84B7A5C9F053307119B37F9A6F12E0D7748CB286DD
                              APIs
                              • NtAllocateVirtualMemory.NTDLL ref: 0339229F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4096311949.0000000003046000.00000040.00001000.00020000.00000000.sdmp, Offset: 03046000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3046000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Yara matches
                              Similarity
                              • API ID: AllocateMemoryVirtual
                              • String ID: Yn
                              • API String ID: 2167126740-2158672061
                              • Opcode ID: 881ee08e26b22e315f274d01f8d05b25576b517f408f0b0b09087002b8d7c057
                              • Instruction ID: a4ade938b3693516907f9c2429c4e17446c5abbd7f0894be6995ad97c8ef21e2
                              • Opcode Fuzzy Hash: 881ee08e26b22e315f274d01f8d05b25576b517f408f0b0b09087002b8d7c057
                              • Instruction Fuzzy Hash: CB015734A00B4ADFDF29EE7489D42EE77A2AF89344F51492ACD85CE618DB3098858A00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 134 4038e9-403901 call 406431 137 403903-40390e GetUserDefaultUILanguage call 405ff7 134->137 138 403915-403946 call 405f80 134->138 141 403913 137->141 144 403948-403959 call 405f80 138->144 145 40395e-403964 lstrcatA 138->145 143 403969-403992 call 403bae call 405b1f 141->143 151 403998-40399d 143->151 152 403a19-403a21 call 405b1f 143->152 144->145 145->143 151->152 153 40399f-4039c3 call 405f80 151->153 158 403a23-403a2a call 4060bb 152->158 159 403a2f-403a54 LoadImageA 152->159 153->152 160 4039c5-4039c7 153->160 158->159 162 403ad5-403add call 40140b 159->162 163 403a56-403a86 RegisterClassA 159->163 167 4039d8-4039e4 lstrlenA 160->167 168 4039c9-4039d6 call 405a5c 160->168 175 403ae7-403af2 call 403bae 162->175 176 403adf-403ae2 162->176 164 403ba4 163->164 165 403a8c-403ad0 SystemParametersInfoA CreateWindowExA 163->165 173 403ba6-403bad 164->173 165->162 169 4039e6-4039f4 lstrcmpiA 167->169 170 403a0c-403a14 call 405a31 call 406099 167->170 168->167 169->170 174 4039f6-403a00 GetFileAttributesA 169->174 170->152 179 403a02-403a04 174->179 180 403a06-403a07 call 405a78 174->180 186 403af8-403b12 ShowWindow call 4063c3 175->186 187 403b7b-403b83 call 405292 175->187 176->173 179->170 179->180 180->170 194 403b14-403b19 call 4063c3 186->194 195 403b1e-403b30 GetClassInfoA 186->195 192 403b85-403b8b 187->192 193 403b9d-403b9f call 40140b 187->193 192->176 196 403b91-403b98 call 40140b 192->196 193->164 194->195 199 403b32-403b42 GetClassInfoA RegisterClassA 195->199 200 403b48-403b79 DialogBoxParamA call 40140b call 403839 195->200 196->176 199->200 200->173
                              APIs
                                • Part of subcall function 00406431: GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                                • Part of subcall function 00406431: GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                              • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000), ref: 00403903
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              • lstrcatA.KERNEL32(1033,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000), ref: 00403964
                              • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne,1033,00420D30,80000001,Control Panel\Desktop\ResourceLocale,00000000,00420D30,00000000,00000002,74DF3410), ref: 004039D9
                              • lstrcmpiA.KERNEL32(?,.exe), ref: 004039EC
                              • GetFileAttributesA.KERNEL32(Call), ref: 004039F7
                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne), ref: 00403A40
                              • RegisterClassA.USER32(00423EC0), ref: 00403A7D
                              • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403A95
                              • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403ACA
                              • ShowWindow.USER32(00000005,00000000), ref: 00403B00
                              • GetClassInfoA.USER32(00000000,RichEdit20A,00423EC0), ref: 00403B2C
                              • GetClassInfoA.USER32(00000000,RichEdit,00423EC0), ref: 00403B39
                              • RegisterClassA.USER32(00423EC0), ref: 00403B42
                              • DialogBoxParamA.USER32(?,00000000,00403C86,00000000), ref: 00403B61
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                              • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$.DEFAULT\Control Panel\International$.exe$0B$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                              • API String ID: 606308-446042241
                              • Opcode ID: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                              • Instruction ID: 64417a43097117c8645ac50bcac1ff1732ece6e83d5d80f238bcb810e00f0866
                              • Opcode Fuzzy Hash: e3ec59447a3a5e7c0f5e833dcd66e45d6aae208e89073c804757ba1de371f7ae
                              • Instruction Fuzzy Hash: 8F61B770340604AED620AF65AD45F3B3A6CDB8575AF40453FF991B22E2CB7D9D028E2D

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 207 402d98-402de6 GetTickCount GetModuleFileNameA call 405c32 210 402df2-402e20 call 406099 call 405a78 call 406099 GetFileSize 207->210 211 402de8-402ded 207->211 219 402f10-402f1e call 402cf9 210->219 220 402e26-402e3d 210->220 212 403037-40303b 211->212 226 402f24-402f27 219->226 227 402fef-402ff4 219->227 222 402e41-402e4e call 4032af 220->222 223 402e3f 220->223 231 402e54-402e5a 222->231 232 402fab-402fb3 call 402cf9 222->232 223->222 229 402f53-402f9f GlobalAlloc call 406556 call 405c61 CreateFileA 226->229 230 402f29-402f41 call 4032c5 call 4032af 226->230 227->212 256 402fa1-402fa6 229->256 257 402fb5-402fe5 call 4032c5 call 40303e 229->257 230->227 259 402f47-402f4d 230->259 236 402eda-402ede 231->236 237 402e5c-402e74 call 405bed 231->237 232->227 240 402ee0-402ee6 call 402cf9 236->240 241 402ee7-402eed 236->241 237->241 252 402e76-402e7d 237->252 240->241 248 402f00-402f0a 241->248 249 402eef-402efd call 4064e8 241->249 248->219 248->220 249->248 252->241 258 402e7f-402e86 252->258 256->212 267 402fea-402fed 257->267 258->241 260 402e88-402e8f 258->260 259->227 259->229 260->241 262 402e91-402e98 260->262 262->241 264 402e9a-402eba 262->264 264->227 266 402ec0-402ec4 264->266 268 402ec6-402eca 266->268 269 402ecc-402ed4 266->269 267->227 270 402ff6-403007 267->270 268->219 268->269 269->241 271 402ed6-402ed8 269->271 272 403009 270->272 273 40300f-403014 270->273 271->241 272->273 274 403015-40301b 273->274 274->274 275 40301d-403035 call 405bed 274->275 275->212
                              APIs
                              • GetTickCount.KERNEL32 ref: 00402DAC
                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,00000400), ref: 00402DC8
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              • GetFileSize.KERNEL32(00000000,00000000,0042C000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003), ref: 00402E11
                              • GlobalAlloc.KERNEL32(?,0040A130), ref: 00402F58
                              Strings
                              • C:\Users\user\Desktop, xrefs: 00402DF3, 00402DF8, 00402DFE
                              • Error launching installer, xrefs: 00402DE8
                              • soft, xrefs: 00402E88
                              • Inst, xrefs: 00402E7F
                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FEF
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DA2, 00402F70
                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FA1
                              • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 00402D98
                              • Null, xrefs: 00402E91
                              • C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, xrefs: 00402DB2, 00402DC1, 00402DD5, 00402DF2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                              • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                              • API String ID: 2803837635-297479754
                              • Opcode ID: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                              • Instruction ID: 415a6227fd12514a0fe47228c9aaee062227cda2d2dbc78d85e3b2e5f7ba07c2
                              • Opcode Fuzzy Hash: 4785f0ebff018845c403b6ca7344f0ae65bd881e692373c18b1951fa0e6bcd5c
                              • Instruction Fuzzy Hash: 2561B271A40205ABDB20EF64DE89B9E7AB8EB40358F20413BF514B62D1DB7C99419B9C

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 278 4060bb-4060c6 279 4060c8-4060d7 278->279 280 4060d9-4060ef 278->280 279->280 281 4062e0-4062e4 280->281 282 4060f5-406100 280->282 284 406112-40611c 281->284 285 4062ea-4062f4 281->285 282->281 283 406106-40610d 282->283 283->281 284->285 286 406122-406129 284->286 287 4062f6-4062fa call 406099 285->287 288 4062ff-406300 285->288 290 4062d3 286->290 291 40612f-406163 286->291 287->288 292 4062d5-4062db 290->292 293 4062dd-4062df 290->293 294 406280-406283 291->294 295 406169-406173 291->295 292->281 293->281 298 4062b3-4062b6 294->298 299 406285-406288 294->299 296 406175-406179 295->296 297 40618d 295->297 296->297 303 40617b-40617f 296->303 300 406194-40619b 297->300 301 4062c4-4062d1 lstrlenA 298->301 302 4062b8-4062bf call 4060bb 298->302 304 406298-4062a4 call 406099 299->304 305 40628a-406296 call 405ff7 299->305 307 4061a0-4061a2 300->307 308 40619d-40619f 300->308 301->281 302->301 303->297 311 406181-406185 303->311 315 4062a9-4062af 304->315 305->315 313 4061a4-4061c7 call 405f80 307->313 314 4061db-4061de 307->314 308->307 311->297 316 406187-40618b 311->316 326 406267-40626b 313->326 327 4061cd-4061d6 call 4060bb 313->327 319 4061e0-4061ec GetSystemDirectoryA 314->319 320 4061ee-4061f1 314->320 315->301 318 4062b1 315->318 316->300 322 406278-40627e call 406303 318->322 323 406262-406265 319->323 324 4061f3-406201 GetWindowsDirectoryA 320->324 325 40625e-406260 320->325 322->301 323->322 323->326 324->325 325->323 328 406203-40620d 325->328 326->322 331 40626d-406273 lstrcatA 326->331 327->323 333 406227-40623d SHGetSpecialFolderLocation 328->333 334 40620f-406212 328->334 331->322 336 40625b 333->336 337 40623f-406259 SHGetPathFromIDListA CoTaskMemFree 333->337 334->333 335 406214-40621b 334->335 339 406223-406225 335->339 336->325 337->323 337->336 339->323 339->333
                              APIs
                              • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004061E6
                              • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,00420510,00000000,004051F8,00420510,00000000), ref: 004061F9
                              • SHGetSpecialFolderLocation.SHELL32(004051F8,00000000,?,00420510,00000000,004051F8,00420510,00000000), ref: 00406235
                              • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00406243
                              • CoTaskMemFree.OLE32(00000000), ref: 0040624F
                              • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406273
                              • lstrlenA.KERNEL32(Call,?,00420510,00000000,004051F8,00420510,00000000,00000000,00000000,00000000), ref: 004062C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                              • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)$M
                              • API String ID: 717251189-190614682
                              • Opcode ID: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                              • Instruction ID: 009d83548d98726144a2e54fa316bc550aecd198e2c9f4ca7d92c8f0a1cd1b24
                              • Opcode Fuzzy Hash: ab93b42b91f91bae910e6fac62c15208670ece31f71cd1d64f2b49d88cab81d9
                              • Instruction Fuzzy Hash: 7361F271900105AEDF20AF64C894B7A3BA4EB56710F1241BFE913BA2D1C77C8962CB4E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 476 405686-4056d1 CreateDirectoryA 477 4056d3-4056d5 476->477 478 4056d7-4056e4 GetLastError 476->478 479 4056fe-405700 477->479 478->479 480 4056e6-4056fa SetFileSecurityA 478->480 480->477 481 4056fc GetLastError 480->481 481->479
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                              • GetLastError.KERNEL32 ref: 004056DD
                              • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004056F2
                              • GetLastError.KERNEL32 ref: 004056FC
                              Strings
                              • C:\Users\user\Desktop, xrefs: 00405686
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004056AC
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                              • API String ID: 3449924974-2028306314
                              • Opcode ID: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction ID: f1d10c799bfca9e4ec05a1b7c6bbaf57c6c97cfabee98fddb41b1e3f6ffc1dc8
                              • Opcode Fuzzy Hash: b585f5161d807d3f0f7c483c76382efe3a1db6be34ae0fb1d35030ff25d5446d
                              • Instruction Fuzzy Hash: 13010871D10259EADF109FA4C9047EFBFB8EB14315F10447AD544B6290DB7A9604CFA9

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 482 4063c3-4063e3 GetSystemDirectoryA 483 4063e5 482->483 484 4063e7-4063e9 482->484 483->484 485 4063f9-4063fb 484->485 486 4063eb-4063f3 484->486 488 4063fc-40642e wsprintfA LoadLibraryExA 485->488 486->485 487 4063f5-4063f7 486->487 487->488
                              APIs
                              • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                              • wsprintfA.USER32 ref: 00406413
                              • LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 00406427
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: DirectoryLibraryLoadSystemwsprintf
                              • String ID: %s%s.dll$UXTHEME$\
                              • API String ID: 2200240437-4240819195
                              • Opcode ID: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction ID: c4678dfb2da91d08484603cd09ba86b434f6c063b959f4a2bfe8732341513f46
                              • Opcode Fuzzy Hash: e24acbe6227527768190d78db3c852bebda673ce15d2d0c5597dd6d7ee2660dd
                              • Instruction Fuzzy Hash: 69F0FC7054060967DB149768DD0DFEB365CEB08304F14057EA587E10D1D978D8358B98

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 489 401ffd-402009 490 4020c4-4020c6 489->490 491 40200f-402025 call 402ac1 * 2 489->491 492 402237-40223c call 401423 490->492 502 402034-402042 LoadLibraryExA 491->502 503 402027-402032 GetModuleHandleA 491->503 498 402951-402960 492->498 499 402716-40271d 492->499 499->498 505 402044-402051 GetProcAddress 502->505 506 4020bd-4020bf 502->506 503->502 503->505 507 402090-402095 call 4051c0 505->507 508 402053-402059 505->508 506->492 513 40209a-40209d 507->513 509 402072-402089 call 100016bd 508->509 510 40205b-402067 call 401423 508->510 515 40208b-40208e 509->515 510->513 520 402069-402070 510->520 513->498 516 4020a3-4020ab call 403889 513->516 515->513 516->498 521 4020b1-4020b8 FreeLibrary 516->521 520->513 521->498
                              APIs
                              • GetModuleHandleA.KERNELBASE(00000000,00000001,?), ref: 00402028
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • LoadLibraryExA.KERNELBASE(00000000,?,?,00000001,?), ref: 00402038
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00402048
                              • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,?,00000001,?), ref: 004020B2
                              Strings
                              • user32::EnumWindows(i r1 ,i 0), xrefs: 0040207C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                              • String ID: user32::EnumWindows(i r1 ,i 0)
                              • API String ID: 2987980305-797600110
                              • Opcode ID: 60fb46ecd7be2e423669211bfc99dba76962e3cb0b4c4fdd8d202bc87f238218
                              • Instruction ID: b9fd2243ea981f5bcf097e6c9410b7191d7035710d5254353367cb498e194193
                              • Opcode Fuzzy Hash: 60fb46ecd7be2e423669211bfc99dba76962e3cb0b4c4fdd8d202bc87f238218
                              • Instruction Fuzzy Hash: 2C21C971A04225A7CF207FA48E4DB6E7660AB44358F21413BF711B62D0CBBD4942965E

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 523 405c61-405c6b 524 405c6c-405c97 GetTickCount GetTempFileNameA 523->524 525 405ca6-405ca8 524->525 526 405c99-405c9b 524->526 528 405ca0-405ca3 525->528 526->524 527 405c9d 526->527 527->528
                              APIs
                              • GetTickCount.KERNEL32 ref: 00405C75
                              • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,?,0000000A), ref: 00405C8F
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C64
                              • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 00405C61
                              • nsa, xrefs: 00405C6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CountFileNameTempTick
                              • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                              • API String ID: 1716503409-2545641651
                              • Opcode ID: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction ID: cf48cc2e124a12ae61d5b18fb9546061e9ffe7603c061e2a5f49afbd00461fe6
                              • Opcode Fuzzy Hash: 2db5ec21233206098d740d0a7eec71b69382ff709a5caa38a177d135453c6e3c
                              • Instruction Fuzzy Hash: F3F082363087047BEB108F55DC04B9B7F99DF91750F14803BFA48EA180D6B499648758

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 529 100016bd-100016f9 call 10001a5d 533 1000180a-1000180c 529->533 534 100016ff-10001703 529->534 535 10001705-1000170b call 100021b0 534->535 536 1000170c-10001719 call 100021fa 534->536 535->536 541 10001749-10001750 536->541 542 1000171b-10001720 536->542 543 10001770-10001774 541->543 544 10001752-1000176e call 100023d8 call 10001559 call 10001266 GlobalFree 541->544 545 10001722-10001723 542->545 546 1000173b-1000173e 542->546 550 100017b2-100017b8 call 100023d8 543->550 551 10001776-100017b0 call 10001559 call 100023d8 543->551 567 100017b9-100017bd 544->567 548 10001725-10001726 545->548 549 1000172b-1000172c call 100027e4 545->549 546->541 552 10001740-10001741 call 10002a9f 546->552 555 10001733-10001739 call 10002587 548->555 556 10001728-10001729 548->556 562 10001731 549->562 550->567 551->567 565 10001746 552->565 566 10001748 555->566 556->541 556->549 562->565 565->566 566->541 571 100017fa-10001801 567->571 572 100017bf-100017cd call 1000239e 567->572 571->533 577 10001803-10001804 GlobalFree 571->577 579 100017e5-100017ec 572->579 580 100017cf-100017d2 572->580 577->533 579->571 582 100017ee-100017f9 call 100014e2 579->582 580->579 581 100017d4-100017dc 580->581 581->579 583 100017de-100017df FreeLibrary 581->583 582->571 583->579
                              APIs
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001768
                              • FreeLibrary.KERNEL32(?), ref: 100017DF
                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(?,7D8BEC45), ref: 100021E2
                                • Part of subcall function 10002587: GlobalAlloc.KERNEL32(?,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025F9
                                • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,10004010,00000000,10001695,00000000), ref: 10001572
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc$Librarylstrcpy
                              • String ID:
                              • API String ID: 1791698881-3916222277
                              • Opcode ID: 87444a894296e8d40cc63a4c2e1c416a7af340e3bff12e61cd27f34ad68e5005
                              • Instruction ID: 474564f2ddd1a30fda7ef2e88bb39d7445f8f4f5c00c78564696995dcbc9c57a
                              • Opcode Fuzzy Hash: 87444a894296e8d40cc63a4c2e1c416a7af340e3bff12e61cd27f34ad68e5005
                              • Instruction Fuzzy Hash: C4319E79408205DAFB41DF649CC5BCA37ECFB042D5F118465FA0A9A09EDF78A8858B60

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 586 4023d0-402401 call 402ac1 * 2 call 402b51 593 402951-402960 586->593 594 402407-402411 586->594 596 402421-402424 594->596 597 402413-402420 call 402ac1 lstrlenA 594->597 600 402426-402437 call 402a9f 596->600 601 402438-40243b 596->601 597->596 600->601 604 40244c-402460 RegSetValueExA 601->604 605 40243d-402447 call 40303e 601->605 606 402462 604->606 607 402465-402542 RegCloseKey 604->607 605->604 606->607 607->593 611 402716-40271d 607->611 611->593
                              APIs
                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsw94A.tmp,00000023,00000011,00000002), ref: 0040241B
                              • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsw94A.tmp,00000000,00000011,00000002), ref: 00402458
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsw94A.tmp,00000000,00000011,00000002), ref: 0040253C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CloseValuelstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\nsw94A.tmp
                              • API String ID: 2655323295-2303157643
                              • Opcode ID: 97315e2270c4fa8c14221e85b70d1482120828f961fc2ed06137c593c8c56db8
                              • Instruction ID: f5012b3eed6b0e10d725da1925ea8f3c2a7a7eca851d842cc00ee1163223ef4a
                              • Opcode Fuzzy Hash: 97315e2270c4fa8c14221e85b70d1482120828f961fc2ed06137c593c8c56db8
                              • Instruction Fuzzy Hash: DA115471E00215BEDF10EFA5DE89A9E7A74EB44754F21403BF508F71D1CAB84D419B29

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 695 4015ca-4015ce 696 4015d0-4015e3 call 405a5c 695->696 697 401624-401627 695->697 705 4015e5-4015e8 696->705 706 4015fb-4015fc call 405703 696->706 699 401652-40223c call 401423 697->699 700 401629-401644 call 401423 call 406099 SetCurrentDirectoryA 697->700 712 402951-402960 699->712 713 402716-40271d 699->713 700->712 721 40164a-40164d 700->721 705->706 710 4015ea-4015f1 call 405720 705->710 714 401601-401603 706->714 710->706 725 4015f3-4015f4 call 405686 710->725 713->712 718 401605-40160a 714->718 719 40161a-401622 714->719 723 401617 718->723 724 40160c-401615 GetFileAttributesA 718->724 719->696 719->697 721->712 723->719 724->719 724->723 727 4015f9 725->727 727->714
                              APIs
                              • GetFileAttributesA.KERNELBASE(?,?,?,?), ref: 0040160D
                                • Part of subcall function 00405686: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C9
                              • SetCurrentDirectoryA.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne), ref: 0040163C
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne, xrefs: 00401631
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Directory$AttributesCreateCurrentFile
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne
                              • API String ID: 2075002604-534986317
                              • Opcode ID: 74f6a17f5a2169b7d4ce497a97ab3ad334f2cf828c1790a636ca55a9d9f680d7
                              • Instruction ID: af62f180ee62bfda1351b7d55936977a3264c064610e85f8965f3656ce2abef5
                              • Opcode Fuzzy Hash: 74f6a17f5a2169b7d4ce497a97ab3ad334f2cf828c1790a636ca55a9d9f680d7
                              • Instruction Fuzzy Hash: 87110631608152EBCF216FA54D405BF66B09A92314B28093FE9D2B22E2D63D4943A62F

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 728 405b1f-405b3a call 406099 call 405aca 733 405b40-405b4d call 406303 728->733 734 405b3c-405b3e 728->734 738 405b59-405b5b 733->738 739 405b4f-405b53 733->739 735 405b92-405b94 734->735 741 405b71-405b7a lstrlenA 738->741 739->734 740 405b55-405b57 739->740 740->734 740->738 742 405b7c-405b90 call 405a31 GetFileAttributesA 741->742 743 405b5d-405b64 call 40639c 741->743 742->735 748 405b66-405b69 743->748 749 405b6b-405b6c call 405a78 743->749 748->734 748->749 749->741
                              APIs
                                • Part of subcall function 00406099: lstrcpynA.KERNEL32(?,?,00000400,004033DF,00423F20,NSIS Error,?,00000006,?,0000000A), ref: 004060A6
                                • Part of subcall function 00405ACA: CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,74DF3410,?,74DF2EE0,00405881,?,74DF3410,74DF2EE0,00000000), ref: 00405AD8
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405ADD
                                • Part of subcall function 00405ACA: CharNextA.USER32(00000000), ref: 00405AF1
                              • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405881,?,74DF3410,74DF2EE0,00000000), ref: 00405B72
                              • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,74DF3410,?,74DF2EE0,00405881,?,74DF3410,74DF2EE0), ref: 00405B82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                              • String ID: C:\
                              • API String ID: 3248276644-3404278061
                              • Opcode ID: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction ID: f7918bca05de5a67ada1f7886cb37670742315f8bcd1f0c25b92126024abb592
                              • Opcode Fuzzy Hash: c6667372e5261f6f491ce2a3369269f5050a05521b0262897edc27dc6412bb0c
                              • Instruction Fuzzy Hash: 5DF0F425205E6516C722323A0C45AAF6964CE92324709423BF891B22C3CA3CB8429DBD
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction ID: 6855221002494b765214394805571b816b3a2b1c2e31bdc36608bad3b484bcdf
                              • Opcode Fuzzy Hash: da96dc2bbb9a86ab2b5a0042be55c5a39520afa60a4d641acd723a491c183434
                              • Instruction Fuzzy Hash: FEA13271E00229CBDF28CFA8C8446ADBBB1FF44305F15856EE816BB281C7795A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction ID: 6c4a77322bd37e7d8c46b95768b691bf5348243e95b36c4706824fec2f4d082d
                              • Opcode Fuzzy Hash: 45b087146125c5b2b0c74364d17b57d2d8ebf1295e4abb7c2da9f37e6e20948f
                              • Instruction Fuzzy Hash: A0911170D00229CBDF28CF98C8587ADBBB1FF44305F15856AE816BB281C7795A96DF84
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction ID: 723f18ff0051ee6ad4f375e9cb18d989a687bb59657bcd06a5bbc8819a965d11
                              • Opcode Fuzzy Hash: ec7db08be09974c8046cad88b73edbb403e33193446cf3f9fa5a5555e34d97c1
                              • Instruction Fuzzy Hash: F5814371E00229CFDF24CFA8C8847ADBBB1FB44305F25856AD416BB281C7389A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction ID: f9a0fdfb68df0875c036107095c0f8e37124572de3281b7b6a4fcb1f7c3ff658
                              • Opcode Fuzzy Hash: 8c6c0676c47b070245886c612b6dc18845a4ce32cc894a17ea31aa6889f3f80a
                              • Instruction Fuzzy Hash: DF818771D00229DBDF24CFA8D8447AEBBB0FF44305F11856AE856BB280CB785A96DF44
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction ID: 20aa67b2f9945943e29b5428d9247f38e2249d0fc5fe98f3e4ff2a84f3334865
                              • Opcode Fuzzy Hash: f6ce5af891e87e3449ce1a2b8efcbaa2a3983e7e126d00aa5b1ca20c5284b7a8
                              • Instruction Fuzzy Hash: 17712271E00229DBDF24CFA8C8447ADBBB1FF44305F15846AE856BB280C7395996DF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction ID: 361238ff60de6b05a878e60f6b30513898442098bea6392746699c597b8ff52c
                              • Opcode Fuzzy Hash: 8cda32c1d2df7732f9a33e0b4945691d5d8bf2b32cd6aa3e273add15dd404c12
                              • Instruction Fuzzy Hash: 53713371E00229DBDF28CF98C844BADBBB1FF44305F15846AE816BB280CB795996DF54
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction ID: cefc1bbef9c73defef891fc114d0afe65c0266ceafdcaf147cd695a7a928f12c
                              • Opcode Fuzzy Hash: 7ce01b185a18f77deed043a820b6804b7b2a700fb218066bf9b3b7a05f4b9fc8
                              • Instruction Fuzzy Hash: E1715671E00229DBDF28CF98C8447ADBBB1FF44305F15846AD816BB281CB795996DF44
                              APIs
                              • GetTickCount.KERNEL32 ref: 0040315A
                                • Part of subcall function 004032C5: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 0040318D
                              • SetFilePointer.KERNELBASE(000D038C,00000000,00000000,004138D8,00004000,?,00000000,00403070,00000004,00000000,00000000,?,?,00402FEA,000000FF,00000000), ref: 00403288
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FilePointer$CountTick
                              • String ID:
                              • API String ID: 1092082344-0
                              • Opcode ID: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                              • Instruction ID: 532adb213c64d5ab3b143d976f528210e7f95c922d5c949e36f01b9cb200fd6d
                              • Opcode Fuzzy Hash: 66296152afd6068201e6c2e1ab460adb435358711bd3d40a2675aec94dc3ea3b
                              • Instruction Fuzzy Hash: FD3160726442049FD710AF6AFE4896A3BECF75435A710827FE904B22F0DB389941DB9D
                              APIs
                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402511
                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 00402524
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsw94A.tmp,00000000,00000011,00000002), ref: 0040253C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Enum$CloseValue
                              • String ID:
                              • API String ID: 397863658-0
                              • Opcode ID: fe8fd4e513e4e616d4eb5e2fb0ddd0ee11b0ac4f4ac673c702b8733e8fb061e1
                              • Instruction ID: 518a01c90e212b4e6c6a91e55dc37795372a660c14e02f5234546a481bba951e
                              • Opcode Fuzzy Hash: fe8fd4e513e4e616d4eb5e2fb0ddd0ee11b0ac4f4ac673c702b8733e8fb061e1
                              • Instruction Fuzzy Hash: 9901B171A04105AFE7159F69DE9CABF7ABCEF80348F10003EF405A61C0DAB84A419729
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: EnumErrorLastWindows
                              • String ID:
                              • API String ID: 14984897-0
                              • Opcode ID: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                              • Instruction ID: 7088a7f0c219bdfd589eed4d744adbaf06b55c7882bf085a68ef70f7e309f44b
                              • Opcode Fuzzy Hash: 06dad9edf242867fa2d433b3a0ae819eccaab9780a225514c3bf782f990559be
                              • Instruction Fuzzy Hash: 385194BA908215DFF711EF60D9C575937A8EB443E0F21842AEA08E721DDF34A9818B55
                              APIs
                              • SetFilePointer.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 00403063
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                              • Instruction ID: d45136b7277fa4a4eeb989eab338d16e1e03b20585a5145be81ea7fda6220a17
                              • Opcode Fuzzy Hash: 636c82f294539f8116134b886240b7bf4a9a68a3f80346334f9d5df26d1cb633
                              • Instruction Fuzzy Hash: 6C314F31204259EFDB109F56DD44A9A7FA8EB08759F10803AF905FA190D378DA50DBA9
                              APIs
                              • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040249D
                              • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsw94A.tmp,00000000,00000011,00000002), ref: 0040253C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID:
                              • API String ID: 3356406503-0
                              • Opcode ID: ad300b22dd5f7cf06ede3240ba929c96a40a23854c2b6697e9be571cd6d1636f
                              • Instruction ID: 1b22629e75d9b419b9fa7e371b5212fc4da00fb077cffe61c988f7dc4f8aba71
                              • Opcode Fuzzy Hash: ad300b22dd5f7cf06ede3240ba929c96a40a23854c2b6697e9be571cd6d1636f
                              • Instruction Fuzzy Hash: 5511E771A05205EEDB15DF64DA8C5BE7BB4EF05348F20403FE446B72C0D6B88A42DB29
                              APIs
                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                              • Instruction ID: 0b9a08df0e19283e0c47f542131d218e25c17bbe1cc26e2bbd3e30b70dde81e4
                              • Opcode Fuzzy Hash: 9ad871f4f8a3338eb99fe4e61ab0dcd0b50e8b4f7c7093f405d94b725c985010
                              • Instruction Fuzzy Hash: FD01F431B202109BE7194B389D05B6A36A8E710315F51823FF951F65F1D778CC038B4C
                              APIs
                              • GetModuleHandleA.KERNEL32(?,?,?,00403380,0000000A), ref: 00406443
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040645E
                                • Part of subcall function 004063C3: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004063DA
                                • Part of subcall function 004063C3: wsprintfA.USER32 ref: 00406413
                                • Part of subcall function 004063C3: LoadLibraryExA.KERNELBASE(?,00000000,?), ref: 00406427
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                              • String ID:
                              • API String ID: 2547128583-0
                              • Opcode ID: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                              • Instruction ID: 56fda94a1dd54a43fb122a1991fe363568279dfba8e98efda579274c3b941564
                              • Opcode Fuzzy Hash: 0ad4aa8648104e950424ecb2e9ed5d31610cefc4b667c124e82fedf243554202
                              • Instruction Fuzzy Hash: E3E086326042105AD2106BB09E0487773A89F84750302883EF946F2140D7389C75ABAE
                              APIs
                              • GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003), ref: 00405C36
                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: File$AttributesCreate
                              • String ID:
                              • API String ID: 415043291-0
                              • Opcode ID: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                              • Instruction ID: 44ec1511c7d75563636feacf23b0872b92cf9f9cc06fc18b7ec6e669f43cef59
                              • Opcode Fuzzy Hash: a0ef3aabf8739962215ab3b029b3a8460f23d0e56d3659f47e9d959f4e092221
                              • Instruction Fuzzy Hash: E4D09E71654201AFEF098F20DE16F2EBAA2EB84B00F11952CB682944E1DA715819AB19
                              APIs
                              • CreateDirectoryA.KERNELBASE(?,00000000,00403300,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 00405709
                              • GetLastError.KERNEL32(?,00000006,?,0000000A), ref: 00405717
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CreateDirectoryErrorLast
                              • String ID:
                              • API String ID: 1375471231-0
                              • Opcode ID: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                              • Instruction ID: 9e29868ffe2b43b7798ba1daada82999d34952ab2a4b7d437405be2737e00dc4
                              • Opcode Fuzzy Hash: 6906a218f2e8c60edb1d49339bec002b269bb684b810150c6462e9a7ab2278e9
                              • Instruction Fuzzy Hash: 0DC04C30225901DADA606F249F087177994FBA0741F1144396146E30E0EA348415ED2D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: wsprintf
                              • String ID:
                              • API String ID: 2111968516-0
                              • Opcode ID: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                              • Instruction ID: 014ce3e67ccbc0a67955049e33e6e2fc18f0270869ac9b4e1a99f60d8e299e74
                              • Opcode Fuzzy Hash: 4fda81b7895bfe8bf62350e409a9146a4ce559ffbc9a4be406a98ca21679bf34
                              • Instruction Fuzzy Hash: CC21F970D04295BEDF318B699948AAEBF749F11304F04457FE4D0B62D5C6BE8A82CF19
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004026A0
                                • Part of subcall function 00405FF7: wsprintfA.USER32 ref: 00406004
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FilePointerwsprintf
                              • String ID:
                              • API String ID: 327478801-0
                              • Opcode ID: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                              • Instruction ID: daba68e88d81473494fab100d986bdd4d5457abcde4f4dc52411d400b48531e4
                              • Opcode Fuzzy Hash: 7f4dd024d7baea7243aacb1c134d87f0f28e7bae7902d05c041a77775a735631
                              • Instruction Fuzzy Hash: BCE09B71B04116ABD700FB95AA4997E7768DF40304F10403FF515F00C1CA7D4C025B2D
                              APIs
                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040232F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: PrivateProfileStringWrite
                              • String ID:
                              • API String ID: 390214022-0
                              • Opcode ID: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                              • Instruction ID: f472a2c509351f333654906e099da5e6dfd11f42980ce41b172c94471a0d1cd1
                              • Opcode Fuzzy Hash: d24bdbc1146ceb37acbd80640b4da5ce9412419425c02070d407eaaf5c42416a
                              • Instruction Fuzzy Hash: 8BE01A31B401246ADB207AB10E8E96E14989BC4744B29053ABE05B62C3DDBC4C414AB9
                              APIs
                              • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B72,00000000,?,?), ref: 00405F76
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction ID: b8b87f9e7f23a22b038ad66cb6348727c8887116b88fbbe418bbf9d15439b9dc
                              • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                              • Instruction Fuzzy Hash: B4E0E67201450DBEDF095F60DD0AD7B371DEB08304F04452EFA45D4091E7B5AD209E74
                              APIs
                              • WriteFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,0040C66A,0040B8D8,00403246,0040B8D8,0040C66A,004138D8,00004000,?,00000000,00403070,00000004), ref: 00405CED
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FileWrite
                              • String ID:
                              • API String ID: 3934441357-0
                              • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction ID: e5327eed263ed0cb59b3772f759b7efddda8826228879d6768eb485b7ec61b42
                              • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                              • Instruction Fuzzy Hash: CEE0EC3225065AABDF509E95AD08FEB7B6CEF053A0F008837F915E2150D631E821DBA8
                              APIs
                              • ReadFile.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,004138D8,0040B8D8,004032C2,0040A130,0040A130,004031C6,004138D8,00004000,?,00000000,00403070), ref: 00405CBE
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                              • Instruction ID: 86bb3e2151b1fdd0dbac44507bcf00ea7ca2ece369def3772f3446380bdcc129
                              • Opcode Fuzzy Hash: e23cbb0757ad9fa8c6c9682000f81612da8d127e18228ddbd7f099cf91b7f4dd
                              • Instruction Fuzzy Hash: DAE08C3220825EABEF109E508C00EEB3B6CFB00361F144432FD10E7040E230E860ABB4
                              APIs
                              • VirtualProtect.KERNELBASE(1000404C,?,?,1000403C), ref: 10002727
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction ID: e09dfa788fffc30199ef0a9f627684cb70e95bce5f527532b7ad3e980fb418b3
                              • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                              • Instruction Fuzzy Hash: 67F09BF19092A0DEF360DF688CC47063FE4E3983D5B03852AE358F6269EB7441448B19
                              APIs
                              • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040236D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: PrivateProfileString
                              • String ID:
                              • API String ID: 1096422788-0
                              • Opcode ID: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                              • Instruction ID: 8896498bc3bf22cdd75c41d4cee83ceff5cc5a9cf36b2948d6df5d4522980b60
                              • Opcode Fuzzy Hash: e8e9dc98ecc8dc52fd3defedd6371274e224f608b56cf67719823b11c706e596
                              • Instruction Fuzzy Hash: 82E08634B44308BADF10AFA19D49EAD3668AF41710F14403AFD547B0E2EEB844429B2D
                              APIs
                              • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,00420510,?,?,00405FAD,00420510,?,?,?,00000002,Call), ref: 00405F43
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction ID: 49134d8a29c384089d71c2fc87a48e1db8574b6415c3e00dd087e3758e4bfdf5
                              • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                              • Instruction Fuzzy Hash: C1D0EC3210420ABADF119E919D01FAB371DEB04350F004426BA45E4091D779D520AE54
                              APIs
                              • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015A8
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: AttributesFile
                              • String ID:
                              • API String ID: 3188754299-0
                              • Opcode ID: e7fa766cc053bfdbcc21595e48a1bcd3d4c0b026ba3eff1e1b85954f558f6b14
                              • Instruction ID: ce3aa80a16c353682a4fc60f6c60757a41c4294f2dd63ac0650dc91194aad8f9
                              • Opcode Fuzzy Hash: e7fa766cc053bfdbcc21595e48a1bcd3d4c0b026ba3eff1e1b85954f558f6b14
                              • Instruction Fuzzy Hash: E1D0127270811197CB10DBA8AB4869D77A4EB80325B318137D515F21D1E6B9C945671D
                              APIs
                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                              • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                              • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                              APIs
                              • GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: AllocGlobal
                              • String ID:
                              • API String ID: 3761449716-0
                              • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                              • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                              • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                              • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                              APIs
                              • GetDlgItem.USER32(?,000003F9), ref: 00404B55
                              • GetDlgItem.USER32(?,00000408), ref: 00404B60
                              • GlobalAlloc.KERNEL32(?,?), ref: 00404BAA
                              • LoadBitmapA.USER32(0000006E), ref: 00404BBD
                              • SetWindowLongA.USER32(?,?,00405134), ref: 00404BD6
                              • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404BEA
                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BFC
                              • SendMessageA.USER32(?,00001109,00000002), ref: 00404C12
                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404C1E
                              • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404C30
                              • DeleteObject.GDI32(00000000), ref: 00404C33
                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404C5E
                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404C6A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404CFF
                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404D2A
                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404D3E
                              • GetWindowLongA.USER32(?,?), ref: 00404D6D
                              • SetWindowLongA.USER32(?,?,00000000), ref: 00404D7B
                              • ShowWindow.USER32(?,00000005), ref: 00404D8C
                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404E89
                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404EEE
                              • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404F03
                              • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404F27
                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404F47
                              • ImageList_Destroy.COMCTL32(?), ref: 00404F5C
                              • GlobalFree.KERNEL32(?), ref: 00404F6C
                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404FE5
                              • SendMessageA.USER32(?,00001102,?,?), ref: 0040508E
                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 0040509D
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 004050BD
                              • ShowWindow.USER32(?,00000000), ref: 0040510B
                              • GetDlgItem.USER32(?,000003FE), ref: 00405116
                              • ShowWindow.USER32(00000000), ref: 0040511D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                              • String ID: $M$N$M
                              • API String ID: 1638840714-2013270251
                              • Opcode ID: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                              • Instruction ID: d82d2da19de6c08df5f7af85b096481c441aefc445292f149536e1611d4f21ae
                              • Opcode Fuzzy Hash: 21234ef24cb517e62b6e681d72db919925f617bec669e1fe45a086f5b61beedf
                              • Instruction Fuzzy Hash: 080241B0A00209AFDB209F95DD85AAE7BB5FB84314F10417AF611BA2E1C7799D42CF58
                              APIs
                              • GetDlgItem.USER32(?,00000403), ref: 0040535D
                              • GetDlgItem.USER32(?,000003EE), ref: 0040536C
                              • GetClientRect.USER32(?,?), ref: 004053A9
                              • GetSystemMetrics.USER32(00000002), ref: 004053B0
                              • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004053D1
                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004053E2
                              • SendMessageA.USER32(?,00001001,00000000,?), ref: 004053F5
                              • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405403
                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405416
                              • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405438
                              • ShowWindow.USER32(?,?), ref: 0040544C
                              • GetDlgItem.USER32(?,000003EC), ref: 0040546D
                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040547D
                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405496
                              • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004054A2
                              • GetDlgItem.USER32(?,000003F8), ref: 0040537B
                                • Part of subcall function 0040418F: SendMessageA.USER32(?,?,00000001,00403FBF), ref: 0040419D
                              • GetDlgItem.USER32(?,000003EC), ref: 004054BE
                              • CreateThread.KERNEL32(00000000,00000000,Function_00005292,00000000), ref: 004054CC
                              • CloseHandle.KERNEL32(00000000), ref: 004054D3
                              • ShowWindow.USER32(00000000), ref: 004054F6
                              • ShowWindow.USER32(?,?), ref: 004054FD
                              • ShowWindow.USER32(?), ref: 00405543
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405577
                              • CreatePopupMenu.USER32 ref: 00405588
                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 0040559D
                              • GetWindowRect.USER32(?,000000FF), ref: 004055BD
                              • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 004055D6
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405612
                              • OpenClipboard.USER32(00000000), ref: 00405622
                              • EmptyClipboard.USER32 ref: 00405628
                              • GlobalAlloc.KERNEL32(00000042,?), ref: 00405631
                              • GlobalLock.KERNEL32(00000000), ref: 0040563B
                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040564F
                              • GlobalUnlock.KERNEL32(00000000), ref: 00405668
                              • SetClipboardData.USER32(00000001,00000000), ref: 00405673
                              • CloseClipboard.USER32 ref: 00405679
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                              • String ID: 0B
                              • API String ID: 590372296-4132856435
                              • Opcode ID: 799acff668d1406a393a64cfa932ce4a107f44924d59ebcbf16f3d2c856b27c8
                              • Instruction ID: 65bb4f05285cabcaf0c1ceede2bf8135bd939e85a5c998f60940a67221f6d910
                              • Opcode Fuzzy Hash: 799acff668d1406a393a64cfa932ce4a107f44924d59ebcbf16f3d2c856b27c8
                              • Instruction Fuzzy Hash: A8A17A71900208BFDB119FA0DE89EAE7F79FB08355F00403AFA55BA1A0CB754E519F68
                              APIs
                              • GetDlgItem.USER32(?,000003FB), ref: 00404619
                              • SetWindowTextA.USER32(00000000,?), ref: 00404643
                              • SHBrowseForFolderA.SHELL32(?,00420108,?), ref: 004046F4
                              • CoTaskMemFree.OLE32(00000000), ref: 004046FF
                              • lstrcmpiA.KERNEL32(Call,00420D30), ref: 00404731
                              • lstrcatA.KERNEL32(?,Call), ref: 0040473D
                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040474F
                                • Part of subcall function 00405799: GetDlgItemTextA.USER32(?,?,00000400,00404786), ref: 004057AC
                                • Part of subcall function 00406303: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 0040635B
                                • Part of subcall function 00406303: CharNextA.USER32(?,?,?,00000000,?,00000006,?,0000000A), ref: 00406368
                                • Part of subcall function 00406303: CharNextA.USER32(?,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 0040636D
                                • Part of subcall function 00406303: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 0040637D
                              • GetDiskFreeSpaceA.KERNEL32(0041FD00,?,?,0000040F,?,0041FD00,0041FD00,?,00000001,0041FD00,?,?,000003FB,?), ref: 0040480D
                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404828
                                • Part of subcall function 00404981: lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                                • Part of subcall function 00404981: wsprintfA.USER32 ref: 00404A27
                                • Part of subcall function 00404981: SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                              • String ID: 0B$A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne$Call$user32::EnumWindows(i r1 ,i 0)$M
                              • API String ID: 2624150263-2562472055
                              • Opcode ID: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                              • Instruction ID: 615b1c7bc5a39f2962dd47e2389a1e1cc3dfb76fea7d39b1cb42eedec06edaaa
                              • Opcode Fuzzy Hash: 76c1ef681dfc1789dea454b52c729533340df3c35bc87fe95344eb3cb4d70c23
                              • Instruction Fuzzy Hash: E4A19FB1900209ABDB11EFA5CC85AAFB7B8EF85314F10843BF611B62D1D77C89418B69
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalAlloc.KERNEL32(?,000014A4), ref: 10001B67
                              • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                              • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                              • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                              • GlobalFree.KERNEL32(?), ref: 10001CC4
                              • GlobalFree.KERNEL32(?), ref: 10001CC9
                              • GlobalFree.KERNEL32(?), ref: 10001CCE
                              • GlobalFree.KERNEL32(00000000), ref: 10001E76
                              • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Global$Free$lstrcpy$Alloc
                              • String ID:
                              • API String ID: 4227406936-0
                              • Opcode ID: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                              • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                              • Opcode Fuzzy Hash: 4cb5dc2aea9cf7ab25a3b1e4be44dc9197e12157622a09bbe3f88e709afef852
                              • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51
                              APIs
                              • CoCreateInstance.OLE32(00408408,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040214D
                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004083F8,?,?,00000045,000000CD,00000002,000000DF,?), ref: 004021FC
                              Strings
                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne, xrefs: 0040218D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: ByteCharCreateInstanceMultiWide
                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\stvbrernes\Cementfabrikkerne
                              • API String ID: 123533781-534986317
                              • Opcode ID: 1f4e783d33bd6e9172d284d0e230be815ba95689a56598640df84db978dd7c10
                              • Instruction ID: a4a7f3c5621d46c7608b395b9069b641d7403675325c7ae40bb0e4cab6624151
                              • Opcode Fuzzy Hash: 1f4e783d33bd6e9172d284d0e230be815ba95689a56598640df84db978dd7c10
                              • Instruction Fuzzy Hash: 89512475A00208BFCF10DFE4C988A9DBBB5EF88314F2045AAF915EB2D1DA799941CF54
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4096311949.0000000003046000.00000040.00001000.00020000.00000000.sdmp, Offset: 03046000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3046000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: (
                              • API String ID: 0-92557136
                              • Opcode ID: c6c5e9520f70c5611b15a3a9360dd9f160484365514acee5eaf4a84375745546
                              • Instruction ID: c4d2f60ee9067529a29fc23e339d1cfa88e92a65ac8afd293016eb0fb46b4e39
                              • Opcode Fuzzy Hash: c6c5e9520f70c5611b15a3a9360dd9f160484365514acee5eaf4a84375745546
                              • Instruction Fuzzy Hash: 42B18836504349DFEB259E38CCD97EB7BA2AF02350F4A456EDCC18B596D7358486CB02
                              APIs
                              • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402707
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FileFindFirst
                              • String ID:
                              • API String ID: 1974802433-0
                              • Opcode ID: 8bb92b40096ce253c1feb66c156ee41281b8be3657acaa0f53a495f9db4c8228
                              • Instruction ID: 0159b05a81fb7445ac67952f267e1ed3d95360429fb03f1bd53dceef05a54f2a
                              • Opcode Fuzzy Hash: 8bb92b40096ce253c1feb66c156ee41281b8be3657acaa0f53a495f9db4c8228
                              • Instruction Fuzzy Hash: EEF055727041019BC300EBB49948AEEB768DF21324F20017FE285F20C1C7B889469B3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4096311949.0000000003046000.00000040.00001000.00020000.00000000.sdmp, Offset: 03046000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_3046000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Yara matches
                              Similarity
                              • API ID:
                              • String ID: QKQ
                              • API String ID: 0-1237365341
                              • Opcode ID: 5f9c8ef3640e3be87150f9059254476c5e0099abb199a63dc90ac1fd32d556f4
                              • Instruction ID: a36ad0d5f0e61a5b1dc0adf4f5235b01055bf68b1b957035964fed29009e806a
                              • Opcode Fuzzy Hash: 5f9c8ef3640e3be87150f9059254476c5e0099abb199a63dc90ac1fd32d556f4
                              • Instruction Fuzzy Hash: 6A81EC3590438A9FDB34EF24C8E57EA7BB6EF45360F95412EDC8A8B155C7314A86CB01
                              APIs
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CC2
                              • ShowWindow.USER32(?), ref: 00403CDF
                              • DestroyWindow.USER32 ref: 00403CF3
                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403D0F
                              • GetDlgItem.USER32(?,?), ref: 00403D30
                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403D44
                              • IsWindowEnabled.USER32(00000000), ref: 00403D4B
                              • GetDlgItem.USER32(?,00000001), ref: 00403DF9
                              • GetDlgItem.USER32(?,00000002), ref: 00403E03
                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403E1D
                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403E6E
                              • GetDlgItem.USER32(?,00000003), ref: 00403F14
                              • ShowWindow.USER32(00000000,?), ref: 00403F35
                              • EnableWindow.USER32(?,?), ref: 00403F47
                              • EnableWindow.USER32(?,?), ref: 00403F62
                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F78
                              • EnableMenuItem.USER32(00000000), ref: 00403F7F
                              • SendMessageA.USER32(?,?,00000000,00000001), ref: 00403F97
                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403FAA
                              • lstrlenA.KERNEL32(00420D30,?,00420D30,00000000), ref: 00403FD4
                              • SetWindowTextA.USER32(?,00420D30), ref: 00403FE3
                              • ShowWindow.USER32(?,0000000A), ref: 00404117
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                              • String ID: 0B
                              • API String ID: 184305955-4132856435
                              • Opcode ID: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                              • Instruction ID: afa02c3f8619f32611db6353159f3c7bef7a20c9a9555f4ee95b1447c660ea49
                              • Opcode Fuzzy Hash: 52da23376c786621b01899b05758cefab0ff852f565aac078f1ff0427d2d89b0
                              • Instruction Fuzzy Hash: 6FC11271600201FBDB206F61EE89D2B3AB8FB94306F51053EF661B51F0CB7998829B1D
                              APIs
                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040432E
                              • GetDlgItem.USER32(00000000,000003E8), ref: 00404342
                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404360
                              • GetSysColor.USER32(?), ref: 00404371
                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404380
                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040438F
                              • lstrlenA.KERNEL32(?), ref: 00404392
                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004043A1
                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004043B6
                              • GetDlgItem.USER32(?,0000040A), ref: 00404418
                              • SendMessageA.USER32(00000000), ref: 0040441B
                              • GetDlgItem.USER32(?,000003E8), ref: 00404446
                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404486
                              • LoadCursorA.USER32(00000000,00007F02), ref: 00404495
                              • SetCursor.USER32(00000000), ref: 0040449E
                              • LoadCursorA.USER32(00000000,00007F00), ref: 004044B4
                              • SetCursor.USER32(00000000), ref: 004044B7
                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 004044E3
                              • SendMessageA.USER32(?,00000000,00000000), ref: 004044F7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                              • String ID: Call$N$nB@$M
                              • API String ID: 3103080414-102202749
                              • Opcode ID: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction ID: d5db58c66581f694922deb7e8fae8f0f3f349f8e9ef4465256bb12a48e84c332
                              • Opcode Fuzzy Hash: be1686f5ab50b662bbe0d02e149cf8afdcfbb49c1a0c534bd92e439938163a57
                              • Instruction Fuzzy Hash: 0E61A4B1A40209BFDB109F61DD45F6A7B69FB84714F10803AFB05BA2D1C7B8A951CF98
                              APIs
                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                              • BeginPaint.USER32(?,?), ref: 00401047
                              • GetClientRect.USER32(?,?), ref: 0040105B
                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                              • DeleteObject.GDI32(?), ref: 004010ED
                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                              • SelectObject.GDI32(00000000,?), ref: 00401140
                              • DrawTextA.USER32(00000000,00423F20,000000FF,00000010,00000820), ref: 00401156
                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                              • DeleteObject.GDI32(?), ref: 00401165
                              • EndPaint.USER32(?,?), ref: 0040116E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                              • String ID: F
                              • API String ID: 941294808-1304234792
                              • Opcode ID: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction ID: efe066deb40a78245321151b9dab29af26a41e73ee4a669cec0cc25ab5e9cd35
                              • Opcode Fuzzy Hash: bdf52cc5ae8694a0bdbebf00984b2734c5f81ee4e26e9c894a20d3f53608c02a
                              • Instruction Fuzzy Hash: 89418C71800209AFCF058F95DE459AFBBB9FF45315F00802EF5A1AA1A0CB389A55DFA4
                              APIs
                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405E99,?,?), ref: 00405D39
                              • GetShortPathNameA.KERNEL32(?,00422AC0,00000400), ref: 00405D42
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                                • Part of subcall function 00405B97: lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              • GetShortPathNameA.KERNEL32(?,00422EC0,00000400), ref: 00405D5F
                              • wsprintfA.USER32 ref: 00405D7D
                              • GetFileSize.KERNEL32(00000000,00000000,00422EC0,C0000000,?,00422EC0,?,?,?,?,?), ref: 00405DB8
                              • GlobalAlloc.KERNEL32(?,0000000A,?,?,?,?), ref: 00405DC7
                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DFF
                              • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,004226C0,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00405E55
                              • GlobalFree.KERNEL32(00000000), ref: 00405E66
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405E6D
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                              • String ID: %s=%s$[Rename]
                              • API String ID: 2171350718-1727408572
                              • Opcode ID: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                              • Instruction ID: d3b28aaf25f2f1dce52cf372ecf52c774524a9466fe584fbe8e796e5af075e1b
                              • Opcode Fuzzy Hash: f38d8d20ea3c52f409b1efdd4663a8df0a06a90a62bb981f7671b6e2d5e9100d
                              • Instruction Fuzzy Hash: 97312331200B19BBC2206B61EE49F2B3A5CDF85754F14043AF985F62D2DB7CA9018ABD
                              APIs
                              • GlobalFree.KERNEL32(00000000), ref: 10002348
                                • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                              • GlobalAlloc.KERNEL32(?,?), ref: 100022C5
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022DA
                              • GlobalAlloc.KERNEL32(?,?), ref: 100022E9
                              • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F7
                              • GlobalFree.KERNEL32(00000000), ref: 100022FE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                              • String ID: @Hmu
                              • API String ID: 3730416702-887474944
                              • Opcode ID: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                              • Instruction ID: a642113aa4013a2ca06c871554e8d399cf46bf4099943ddf9e0960cc50565d32
                              • Opcode Fuzzy Hash: 0f1d2088a070cebd5915530b0a964975e4ea41447dfd67459970790859c4aece
                              • Instruction Fuzzy Hash: A941BCB1508311EFF320DF648C84B6AB7E8FF443D0F11892AF946D61A9DB34AA40CB61
                              APIs
                              • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 0040635B
                              • CharNextA.USER32(?,?,?,00000000,?,00000006,?,0000000A), ref: 00406368
                              • CharNextA.USER32(?,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 0040636D
                              • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004032E8,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 0040637D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00406304
                              • *?|<>/":, xrefs: 0040634B
                              • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 0040633F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Char$Next$Prev
                              • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                              • API String ID: 589700163-1776944453
                              • Opcode ID: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction ID: aaadfa82e77317605f3281ec64e2e7980eb4a55dd70e9bd95d11bcdf30b36afc
                              • Opcode Fuzzy Hash: b04103f1c3b5c2dc28f3c9fe732184cb0b910e084cb0e1e3de7299130b8356f6
                              • Instruction Fuzzy Hash: 6011826180479129EB3216384C44BBBAFD84B57760F5A407FEDC6722C2D67C6C6286AD
                              APIs
                              • GetWindowLongA.USER32(?,000000EB), ref: 004041DE
                              • GetSysColor.USER32(00000000), ref: 004041FA
                              • SetTextColor.GDI32(?,00000000), ref: 00404206
                              • SetBkMode.GDI32(?,?), ref: 00404212
                              • GetSysColor.USER32(?), ref: 00404225
                              • SetBkColor.GDI32(?,?), ref: 00404235
                              • DeleteObject.GDI32(?), ref: 0040424F
                              • CreateBrushIndirect.GDI32(?), ref: 00404259
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                              • String ID:
                              • API String ID: 2320649405-0
                              • Opcode ID: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction ID: ef1bd211f687dc199c5e2a556594d88cbafbffeaa14e1023ebc7d04ec3d96a61
                              • Opcode Fuzzy Hash: ae3d8a9df92c775f8f54e71e017c7c1ec6869770dfd215418e325c2b67ca61e7
                              • Instruction Fuzzy Hash: A32184B1504704ABC7219F78DD08B5BBBF8AF81714F04896DFAD5E26A0D734E944CB64
                              APIs
                                • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                              • GlobalFree.KERNEL32(?), ref: 100024B3
                              • GlobalFree.KERNEL32(00000000), ref: 100024ED
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                              • Instruction ID: c0db1d51d0d8beb2da32add46ec64f24e8f484468aa98c5ce89375ba0c102a5a
                              • Opcode Fuzzy Hash: 9b8f7426cd7417a05f7efaca6ab9ef20acf91f7aea9c9defdea317c740d0f0ba
                              • Instruction Fuzzy Hash: 0831A9B1504211EFF322DB94CCC4C2B7BBDEB853D4B118929FA4193228CB31AC94DB62
                              APIs
                              • lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                              • lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                              • lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                              • SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                              • String ID:
                              • API String ID: 2531174081-0
                              • Opcode ID: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                              • Instruction ID: 0096fbd02e39835f1f24d83275f9c38cb3dbb50e4440d35a5143882a1b4174d0
                              • Opcode Fuzzy Hash: fcc158ebca62b9556dfbd252b9eba4bb3779b7d310f90d2e7aaaf4a512f9cf01
                              • Instruction Fuzzy Hash: 4D218C71900518BFDF119FA5DD84A9EBFB9FF04354F0480BAF904B6291C7798A418FA8
                              APIs
                              • DestroyWindow.USER32(00000000,00000000), ref: 00402D11
                              • GetTickCount.KERNEL32 ref: 00402D2F
                              • wsprintfA.USER32 ref: 00402D5D
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000,?), ref: 004051F9
                                • Part of subcall function 004051C0: lstrlenA.KERNEL32(00402D70,00420510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D70,00000000), ref: 00405209
                                • Part of subcall function 004051C0: lstrcatA.KERNEL32(00420510,00402D70,00402D70,00420510,00000000,00000000,00000000), ref: 0040521C
                                • Part of subcall function 004051C0: SetWindowTextA.USER32(00420510,00420510), ref: 0040522E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405254
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040526E
                                • Part of subcall function 004051C0: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040527C
                              • CreateDialogParamA.USER32(0000006F,00000000,00402C61,00000000), ref: 00402D81
                              • ShowWindow.USER32(00000000,00000005), ref: 00402D8F
                                • Part of subcall function 00402CDD: MulDiv.KERNEL32(00000000,?,00000D92), ref: 00402CF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                              • String ID: ... %d%%
                              • API String ID: 722711167-2449383134
                              • Opcode ID: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                              • Instruction ID: 05ae4936d853d48bc68e56bc5a14e51e8e164cb381f888baae312624535d0e7d
                              • Opcode Fuzzy Hash: 581d0362c9c78e99b63bfe565d6ea7dfe38dfe796f0dab54d06828bbe0081036
                              • Instruction Fuzzy Hash: 3601D630901620EBD722AB60BF0CEDE7A78EF48701B44003BF555B51E4CBB84C41CA9E
                              APIs
                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404AA6
                              • GetMessagePos.USER32 ref: 00404AAE
                              • ScreenToClient.USER32(?,?), ref: 00404AC8
                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404ADA
                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404B00
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Message$Send$ClientScreen
                              • String ID: f
                              • API String ID: 41195575-1993550816
                              • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction ID: d6f0acc73841e927dc0e8d5cbc3229ede44acf808998aa5f41192725d6cd764a
                              • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                              • Instruction Fuzzy Hash: 03019275900219BADB00DB95CD81BFFBBBCAF45711F10012BBA10B61C0C7B495018F94
                              APIs
                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C7C
                              • wsprintfA.USER32 ref: 00402CB0
                              • SetWindowTextA.USER32(?,?), ref: 00402CC0
                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CD2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Text$ItemTimerWindowwsprintf
                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                              • API String ID: 1451636040-1158693248
                              • Opcode ID: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction ID: dd36d9f71d3f98b31449e9fd5fd6fbb92ab2983ffa1af0ce52afe90c4e52f268
                              • Opcode Fuzzy Hash: fd6d30a01278415fece07758d049025ae65b55165fa63b5b41d509ea3c6516ac
                              • Instruction Fuzzy Hash: B6F03C7150020CFBEF209F61CE0ABAE7769EB44344F00803AFA16B52D0DBB999559F99
                              APIs
                                • Part of subcall function 00405C32: GetFileAttributesA.KERNELBASE(00000003,00402DDB,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003), ref: 00405C36
                                • Part of subcall function 00405C32: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405C58
                              • GlobalAlloc.KERNEL32(?,?), ref: 0040278A
                              • CloseHandle.KERNEL32(?), ref: 00402810
                                • Part of subcall function 004032C5: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FC3,?), ref: 004032D3
                              • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004027A6
                              • GlobalFree.KERNEL32(?), ref: 004027E5
                              • GlobalFree.KERNEL32(00000000), ref: 004027F8
                                • Part of subcall function 0040303E: SetFilePointer.KERNELBASE(0040A130,00000000,00000000,00000000,00000000,?,?,00402FEA,000000FF,00000000,00000000,0040A130,?), ref: 00403063
                              • DeleteFileA.KERNEL32(?), ref: 00402824
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: File$Global$AllocFreePointer$AttributesCloseCreateDeleteHandle
                              • String ID:
                              • API String ID: 488507980-0
                              • Opcode ID: c91c9bd5815d1241bbceb1c2895bdf00b75426eacf14b09c248079251ff6b1a7
                              • Instruction ID: 1fe78f37701cbcc77283e4ca16615c536d0e0ac6238c74e6acd79bc50f6aaca8
                              • Opcode Fuzzy Hash: c91c9bd5815d1241bbceb1c2895bdf00b75426eacf14b09c248079251ff6b1a7
                              • Instruction Fuzzy Hash: 54219D72800128BBCF116FA5DE48DAE7F79EF05360B14423EF554B62E0CA794D419BA8
                              APIs
                              • lstrlenA.KERNEL32(00420D30,00420D30,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,0040489C,000000DF,00000000,00000400,?), ref: 00404A1F
                              • wsprintfA.USER32 ref: 00404A27
                              • SetDlgItemTextA.USER32(?,00420D30), ref: 00404A3A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: ItemTextlstrlenwsprintf
                              • String ID: %u.%u%s%s$0B
                              • API String ID: 3540041739-2032437577
                              • Opcode ID: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                              • Instruction ID: 454b38ceac9876f8861c3790537a611104b372144c9fccdb064e9295d2f1ba63
                              • Opcode Fuzzy Hash: 1956ebf24d5e1f55d94ce1980efd0233ee95868cdb52b5f3f7c77d6cead7fe34
                              • Instruction Fuzzy Hash: 2111E773A0412837DB0066799C45EAF329CDB85374F254637FA26F31D1EA78CC1242E9
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: FreeGlobal
                              • String ID:
                              • API String ID: 2979337801-0
                              • Opcode ID: e61c022a33ae2d8226f4f9d8dc9768096fb4d6cd4e5c598d89deb3e57b8d12c3
                              • Instruction ID: adaf369aa6dab84e94bee76403d526b7d43184adb12fe210256c1aedb67fe499
                              • Opcode Fuzzy Hash: e61c022a33ae2d8226f4f9d8dc9768096fb4d6cd4e5c598d89deb3e57b8d12c3
                              • Instruction Fuzzy Hash: 43512536D04159AEFB55DFB488A4AEEBBF6EF453C0F124169E841B315DCA306E4087D2
                              APIs
                              • GetDC.USER32(?), ref: 00401D98
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                              • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                              • CreateFontIndirectA.GDI32(0040B808), ref: 00401E1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CapsCreateDeviceFontIndirectRelease
                              • String ID:
                              • API String ID: 3808545654-0
                              • Opcode ID: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                              • Instruction ID: bb5471ef097cc8c5e92714fe4b65473af6cf7b7baf5f4d2141323caa5fcdcc79
                              • Opcode Fuzzy Hash: db451da96fda065fe5f02a6a41f4c9c1ff559c50a342c71b5ed450c678e34272
                              • Instruction Fuzzy Hash: D4014C72944240AFE7006BB5AE5AA997FE8DB55305F10C839F241BA2F2CB7805458FAD
                              APIs
                              • GetDlgItem.USER32(?), ref: 00401D3F
                              • GetClientRect.USER32(00000000,?), ref: 00401D4C
                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                              • DeleteObject.GDI32(00000000), ref: 00401D8A
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                              • String ID:
                              • API String ID: 1849352358-0
                              • Opcode ID: fc1458dcfc400969bed1c091e5691bcd3d4000c1b62ed4e40ea1ea561ade4028
                              • Instruction ID: 074f51ed6dd20aae2d42350fdade0312ac008d0ce280de7d9e26dccf07732080
                              • Opcode Fuzzy Hash: fc1458dcfc400969bed1c091e5691bcd3d4000c1b62ed4e40ea1ea561ade4028
                              • Instruction Fuzzy Hash: 62F0FFB2600515AFDB00EBA4DE88DAFB7BCFB44301B04447AF645F2191CB748D018B38
                              APIs
                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: MessageSend$Timeout
                              • String ID: !
                              • API String ID: 1777923405-2657877971
                              • Opcode ID: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction ID: aed907c05dc833253b389eb1df77c6bfbb772c9e61476b09ce63ef5510084725
                              • Opcode Fuzzy Hash: 61d668203e925d2b626f83b6d528d825a590e8d0b5f9acd222ce781ec0ff5e12
                              • Instruction Fuzzy Hash: 46218F71A44209AEEB15DFA5D946AED7BB0EF84304F14803EF505F61D1DA7889408F28
                              APIs
                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 00405A37
                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032FA,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403521,?,00000006,?,0000000A), ref: 00405A40
                              • lstrcatA.KERNEL32(?,0040A014,?,00000006,?,0000000A), ref: 00405A51
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A31
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CharPrevlstrcatlstrlen
                              • String ID: C:\Users\user\AppData\Local\Temp\
                              • API String ID: 2659869361-3081826266
                              • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction ID: 868260c831235620665dea70b18de3ff29fa680cd517475ab4f5cc36a8a73f00
                              • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                              • Instruction Fuzzy Hash: 79D023726015303AD1127F154C05DCF1A4C8F023507050077F200B7191CB3C0D514BFE
                              APIs
                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C19
                              • RegCloseKey.ADVAPI32(?), ref: 00402C22
                              • RegCloseKey.ADVAPI32(?), ref: 00402C43
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Close$Enum
                              • String ID:
                              • API String ID: 464197530-0
                              • Opcode ID: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                              • Instruction ID: a71df8347eb47d58d859942eb4958fb6338d9c628d5ecfe9f9dc7c39a89e9901
                              • Opcode Fuzzy Hash: 7700570c92338514809be4fe700ff97aaec082cd166b5f15edfff62a18f3ae9c
                              • Instruction Fuzzy Hash: FA118832504119BBEF01AF91CF09B9E3B79EB04341F104036BA05B50E0E7B4DE61AA68
                              APIs
                              • CharNextA.USER32(?,?,C:\,?,00405B36,C:\,C:\,74DF3410,?,74DF2EE0,00405881,?,74DF3410,74DF2EE0,00000000), ref: 00405AD8
                              • CharNextA.USER32(00000000), ref: 00405ADD
                              • CharNextA.USER32(00000000), ref: 00405AF1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CharNext
                              • String ID: C:\
                              • API String ID: 3213498283-3404278061
                              • Opcode ID: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                              • Instruction ID: db937687bc36527a3f7147c44c8c9b1a0bf4ed848bee0725310acd997699ac17
                              • Opcode Fuzzy Hash: f542051b0c3854551ba559e3fab41aa2c74e08886ad556a296c0d482775cdbba
                              • Instruction Fuzzy Hash: D8F0C861B14F501AFB2262640C54B776BA8CB99350F04406BD540671C286BC6C404F6A
                              APIs
                              • CloseHandle.KERNEL32(000002B4,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,?,0000000A), ref: 00403809
                              • CloseHandle.KERNEL32(000002BC,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,?,0000000A), ref: 0040381D
                              Strings
                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004037FC
                              • C:\Users\user\AppData\Local\Temp\nsw94A.tmp, xrefs: 0040382D
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsw94A.tmp
                              • API String ID: 2962429428-1118326888
                              • Opcode ID: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                              • Instruction ID: a243388e665e2d569925beaf0092b2dcbae65f1e85c6ca02b15765f08549dd2e
                              • Opcode Fuzzy Hash: bc9d59c8f271c216c0b0e312611624ce7a9d5bb861437aa17873a49c6d363409
                              • Instruction Fuzzy Hash: 08E04F3250071896C620BF79AE494853B599B41735724C776F138B20F1C73899975AA9
                              APIs
                              • IsWindowVisible.USER32(?), ref: 00405163
                              • CallWindowProcA.USER32(?,?,?,?), ref: 004051B4
                                • Part of subcall function 004041A6: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004041B8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Window$CallMessageProcSendVisible
                              • String ID:
                              • API String ID: 3748168415-3916222277
                              • Opcode ID: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction ID: c2e14b81eed27f6ef80c9e529a4f942fbf68e082709ee8d6c9922b6f58a3139d
                              • Opcode Fuzzy Hash: cef517e8acf1b00021c4c6b190ff76a2e6404192bdc33fc547d340bfee77a79a
                              • Instruction Fuzzy Hash: 7801B131900608AFEF218F41DD80F6B3676EB84750F244137FA00BA1D1C7799D929E6D
                              APIs
                              • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,00420510,?,?,?,00000002,Call,?,004061C4,80000002), ref: 00405FC6
                              • RegCloseKey.ADVAPI32(?,?,004061C4,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,00420510), ref: 00405FD1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CloseQueryValue
                              • String ID: Call
                              • API String ID: 3356406503-1824292864
                              • Opcode ID: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                              • Instruction ID: 18c902175c261954d743b78889848fcc164f2ce977d73a6ea322bbd2e465ffc2
                              • Opcode Fuzzy Hash: 89fd80a38215459d753601d22b2c149a63a94ab0799c11bc238657d83ab6ff10
                              • Instruction Fuzzy Hash: CD01BC7250020AABDF228F20CC09FDB3FA8EF54364F00403AFA05A2190D278CA14DFA8
                              APIs
                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00422538,Error launching installer), ref: 00405761
                              • CloseHandle.KERNEL32(?), ref: 0040576E
                              Strings
                              • Error launching installer, xrefs: 0040574B
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: Error launching installer
                              • API String ID: 3712363035-66219284
                              • Opcode ID: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction ID: 69b2a91025ee82e0f17d0b644fa8ba69f8cb79a6280e59e5c1840fb2568b3eab
                              • Opcode Fuzzy Hash: 8239ab618066ac962b74623b1050f3e7ebc47b2e843eb3c877c6a70e342349f1
                              • Instruction Fuzzy Hash: 00E046F0600209BFEB009F60EE49F7BBBACEB10704F808421BD00F2190D6B898448A78
                              APIs
                              • FreeLibrary.KERNEL32(10000000,74DF3410,00000000,74DF2EE0,0040382B,C:\Users\user\AppData\Local\Temp\,0040362E,?,?,00000006,?,0000000A), ref: 0040386E
                              • GlobalFree.KERNEL32(004D7628), ref: 00403875
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Free$GlobalLibrary
                              • String ID: (vM
                              • API String ID: 1100898210-3088526615
                              • Opcode ID: bf20d2945bb5ef82aea882dca47bf7a800ed57bbe34a1365a93ea0a8c88c69c9
                              • Instruction ID: 5a7e105abd1ff501ddbafdab51ff1ddcb88a66ee3eeb0d8e06bf853bef0fe42f
                              • Opcode Fuzzy Hash: bf20d2945bb5ef82aea882dca47bf7a800ed57bbe34a1365a93ea0a8c88c69c9
                              • Instruction Fuzzy Hash: 9AE08C3380112097C6212F25EA0475AB7A86F44B22F1180BAFC807B2608B741C428AC8
                              APIs
                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003), ref: 00405A7E
                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E04,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003), ref: 00405A8C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: CharPrevlstrlen
                              • String ID: C:\Users\user\Desktop
                              • API String ID: 2709904686-224404859
                              • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction ID: 40098e637bf6d505f922d12736ff559178fc12fa7d0ee67292c12de19d06dc46
                              • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                              • Instruction Fuzzy Hash: 6ED0A7729089702EF30393108C00B9F6A88CF16341F090062E480A7191C67C0C424BAD
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.4097643168.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                              • Associated: 00000000.00000002.4097630701.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097654830.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                              • Associated: 00000000.00000002.4097666710.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_10000000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: Global$Free$Alloc
                              • String ID:
                              • API String ID: 1780285237-0
                              • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                              • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                              • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                              APIs
                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BA7
                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BBF
                              • CharNextA.USER32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD0
                              • lstrlenA.KERNEL32(00000000,?,00000000,00405DF2,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD9
                              Memory Dump Source
                              • Source File: 00000000.00000002.4095708870.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                              • Associated: 00000000.00000002.4095692731.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095724320.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095735715.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.4095820882.0000000000435000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                              Similarity
                              • API ID: lstrlen$CharNextlstrcmpi
                              • String ID:
                              • API String ID: 190613189-0
                              • Opcode ID: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction ID: c0798baac460c4c161baa60e5c3960505173fe7825234d44b9ee5cd82a8c1779
                              • Opcode Fuzzy Hash: 3b856c8c7d4e4c10c4bedc5fcb7273c416007e4233098a198b9b1013c6992f0c
                              • Instruction Fuzzy Hash: 29F06235105918AFCB02DFA9DD40D9EBBB8EF46350B2540B9F840FB211D674FE01ABA9