Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe

Overview

General Information

Sample name:DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
Analysis ID:1586499
MD5:a25712989100fcdcb627446bcedb6c0a
SHA1:7577219dfedaaedff8b10dc274b97cff0f2788fb
SHA256:148b1248f6b89fa446d40890492bf0f9dddfa0b17d1cb9cad9fd84a0f9934890
Tags:batDHLexeuser-abuse_ch
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected non-DNS traffic on DNS port
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeVirustotal: Detection: 45%Perma Link
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeReversingLabs: Detection: 34%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
Source: global trafficTCP traffic: 192.168.2.8:57509 -> 162.159.36.2:53
Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00405461 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405461

System Summary

barindex
Source: initial sampleStatic PE information: Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
Source: initial sampleStatic PE information: Filename: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00406B150_2_00406B15
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004072EC0_2_004072EC
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00404C9E0_2_00404C9E
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_73911B5F0_2_73911B5F
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0340A5AF0_2_0340A5AF
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal60.evad.winEXE@1/7@1/0
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00404722 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404722
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00402104 CoCreateInstance,0_2_00402104
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15Jump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsjCDE3.tmpJump to behavior
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeVirustotal: Detection: 45%
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeReversingLabs: Detection: 34%
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile read: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
Source: DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_73911B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73911B5F
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_03396D94 push E4840C47h; retf 0_2_03396D99
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeRDTSC instruction interceptor: First address: 33C5976 second address: 33C5976 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FC410C24D08h 0x00000006 push eax 0x00000007 mov eax, 0512F0F1h 0x0000000c cmp eax, 00000091h 0x00000011 jng 00007FC410C696B7h 0x00000017 pop eax 0x00000018 inc ebp 0x00000019 inc ebx 0x0000001a rdtsc
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004059CC GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004059CC
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_004065FD FindFirstFileW,FindClose,0_2_004065FD
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_00402868 FindFirstFileW,0_2_00402868
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4410
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4402
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_73911B5F GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73911B5F
Source: C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeCode function: 0_2_0040338F EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040338F
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Access Token Manipulation
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Access Token Manipulation
LSASS Memory3
File and Directory Discovery
Remote Desktop Protocol1
Clipboard Data
1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe46%VirustotalBrowse
DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe34%ReversingLabsWin32.Trojan.Guloader
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dll0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
15.164.165.52.in-addr.arpa
unknown
unknownfalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorDHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exefalse
      high
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1586499
      Start date and time:2025-01-09 08:27:38 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 20s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:6
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
      Detection:MAL
      Classification:mal60.evad.winEXE@1/7@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 96%
      • Number of executed functions: 33
      • Number of non-executed functions: 38
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded IPs from analysis (whitelisted): 20.109.210.53, 52.165.164.15, 172.202.163.200
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dllKO0q4biYfC.exeGet hashmaliciousRemcos, GuLoaderBrowse
        Yoranis Setup.exeGet hashmaliciousUnknownBrowse
          Yoranis Setup.exeGet hashmaliciousUnknownBrowse
            Pralevia Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
              Pralevia Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                NativeApp_G5L1NHZZ.exeGet hashmaliciousLummaC StealerBrowse
                  Awb 4586109146.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                    PO 0309494059506060609696007.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                        YF3YnL4ksc.exeGet hashmaliciousUnknownBrowse
                          Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):173644
                          Entropy (8bit):4.604565799329235
                          Encrypted:false
                          SSDEEP:3072:q0tzOnbU0Aaa/V6Zk+0RRnDfcPL+uSPyg7BIxgv9S:q0ZOAvcp5PLqpexgvA
                          MD5:5B3DF8436D091B59E8C3F11130FB0FC8
                          SHA1:8D6AE6E79E039E0FE9E5EEBD9A66DB3567785B51
                          SHA-256:14E5190C91AD97F6A4EC03B50B1E0BB1FFC7C9B968F33C4BDC3D9D9B742976E8
                          SHA-512:9399D9FF873A76DF3F205D89158B093E685102A3CE558B6F06A5EDCDFBE2EC67E7C7E8B763A28DAF75208EA09780DF6EDCAE9B13C51662F426A554B92DBA3A71
                          Malicious:false
                          Reputation:low
                          Preview:..ttt.............***....X..............--.....{.......................ee.......*.?............OO.......gg...........................................**....??........+++++........2222222222...!!!..............z.....a.....888......2....................X.........3.qqq..................................N.oo....L.......V..g.qqq.sss.....m...........c........\......$................................22.........w........P.fffff..................vv...........\...................ww..........B....{{.........ff.nnnn............................8.........K..mmm........AAAA....6.`.......aaa.n....QQQ...................8......??.........................................2.D.PPP..zz..7....{{...}..>..*..................,........BBB....................PPP.p.......\\\\...B............................N.........................................&...............ttt................g.....L.....O..kk.!.F.........Y......=.!!..>.................VV.)...V...;..44..`..........==..M.....#..k.............................r....
                          Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File Type:Matlab v4 mat-file (little endian) \376\376\376\376, numeric, rows 36494, columns 3233857728
                          Category:dropped
                          Size (bytes):332054
                          Entropy (8bit):7.578249290217776
                          Encrypted:false
                          SSDEEP:6144:2Fltsrea3kjbw52a0SSxoD9gvHS7kaC+QcwwVfnJo134KGgLroal:27txa0452apc/SfQcwwN6VGgLrf
                          MD5:D877F72AAAAC187E43BE4DA409B54EB9
                          SHA1:1BF3C844E2C04D3ACD91F09481FC3F9B013E13D6
                          SHA-256:9D3D95BCFDAFCA3F59BF336A34FE6439EE318888C8071AFC8D9CC0A303CDF495
                          SHA-512:5DFA7184814D2E4DD4FDDE52DF4A7AEF247D93FBAE1BA9ED3873BFC1C89561B9589F95241F49AFC681CF17AE4460072B026CFC703158499F715C1D53BD55AE4C
                          Malicious:false
                          Reputation:low
                          Preview:............................. ..QQQQQ.>.................ssss...ii...........44..c................."....{..pppp...........,.)).$$$.O..............?.......rr....\\\.............!.^.III..............................J.II...ooo.dd.^.f.....QQ......::....XX.....bb..............................BB.......44......7...p.......y...).........ooo.........a.U..............mmmmm...`........<....cccccc..N.........................................................S...A.......................G..999...```....&&......... ....T.OO..................r...................9999............................E.................!..^^.........Y...................##...................F.............. .....................F...........k......999..I...X...........I......\\\\.....?.........U....C........................}...................""".8........ff..f...........m.............EE.*....................................hh...0......nnn..................[........rrrr.PP...222.....????.................`.....CCCC....W........-.
                          Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):62355
                          Entropy (8bit):1.258826482536988
                          Encrypted:false
                          SSDEEP:384:MW0KDb3KVOw/j7X+S0KA0ArEsyiOYl3fVXdYJE7udSAzJObdxbYxJ6aV:r08OVd/n0KA5YcZdYmudvQpxboJxV
                          MD5:525837D7C36E52AE3BC6211BCCBF5EA1
                          SHA1:37850DC35FBD8485D5E1A2AF97EC82F51AEA20DD
                          SHA-256:5A4BD2EE31A482045C32C9C9959349AF8B9A25AA0802733353CE8B109FE0F9E2
                          SHA-512:07762F5FAB9A7A2A71EE3C63FBF5447EC2E21C9D7445452124B3F392742763533D8C5C13D57D3EF10D72D18DDA7D0D69903C2F0F89665F78C198C19BC2324592
                          Malicious:false
                          Reputation:low
                          Preview:............................................Z..................................................................................R...........D...................................................-........................................._........t.............................U...........................................................................................6............N.........q.................................................................................................._.d................"................................................=.........................................................z.....e.............!............)....................................O.............................................................C.....E.............................3..................................................I..................t.........k........0...P........<..............]...........................4........................................w..........................d......
                          Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):485505
                          Entropy (8bit):1.2528129101207983
                          Encrypted:false
                          SSDEEP:1536:EVa8YX2OjjNzeeS9xrLyC0EOUz5teMpuzfAwf03J:EVhOj+nrgMGfAwfOJ
                          MD5:555D5C56BDD2315465BECC10397D5764
                          SHA1:955DFA2743CC2B49DC493C23C1BC8CB0FF21E6C8
                          SHA-256:D81040FF324DC02AE272F7B3EC644F5D988539648C9459B4669C92C95EB8F83B
                          SHA-512:8477D70481A576EA3BB2123A3114A3E4C6E5DD3D9A461CED29B63727E71289BEC6982C2B5D59559C15AC875E004872855D90E74999069D2B6E1C1E09C8D13937
                          Malicious:false
                          Reputation:low
                          Preview:...............................3...........................%.....z....................<......................................................6.........................7.....>............................].....A...............w......".................l.T..............................................................B........./.i......................................................................................................+..T...........................................~..........8........................[..................................9...................................%...........................................................F................E.......................................................v....................................;.....................................................r..............................................d...................................u.-........................:.8.....>9.......................................................................
                          Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File Type:data
                          Category:dropped
                          Size (bytes):336216
                          Entropy (8bit):1.2639133058786656
                          Encrypted:false
                          SSDEEP:768:NzYP1DovnbTLlQx1bwZqqOkw26hthJhXKJ639+HFf8TCoDrT6lmudk5e7rfWC07A:LBG2dqxIJVo6rJIhwTf764dpzz
                          MD5:3D6D953D11FDDE966CDA116E27C6BB2F
                          SHA1:FD0779E2A60E03EEE4EF2B21DA200A4DEFC549D0
                          SHA-256:28B4FF5BDCC66D02A0B19325797AB0EBD58C78D29180DA993FB1551B0650A414
                          SHA-512:8302C8DB0BF42DFDA96B6DA42BDA8B189D65AB6A5D2C769B6D9F3A347DD09EA6FDA94CACE00B455810348E02DBD390F1CB406A33E8C846C6D453408F22F5518A
                          Malicious:false
                          Reputation:low
                          Preview:.....p.........[.............g..................]....5......................................u.................................z..........A.*.........................S.d.....................................................s....................................................................8..............................................................x.......................1........j................................................y...P...............................................................F...........X............................>............................................*.....U................................`...................#............p.............%.......................#....................#....................?...........................>..............9..........................................................................................{........................................................................J...................................................
                          Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):25
                          Entropy (8bit):4.0536606896881855
                          Encrypted:false
                          SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                          MD5:08CA75DA54EB4810D18796C97F510A55
                          SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                          SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                          SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                          Malicious:false
                          Reputation:moderate, very likely benign file
                          Preview:[Bus Clock]..Gats=Galse..
                          Process:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):12288
                          Entropy (8bit):5.719859767584478
                          Encrypted:false
                          SSDEEP:192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
                          MD5:0D7AD4F45DC6F5AA87F606D0331C6901
                          SHA1:48DF0911F0484CBE2A8CDD5362140B63C41EE457
                          SHA-256:3EB38AE99653A7DBC724132EE240F6E5C4AF4BFE7C01D31D23FAF373F9F2EACA
                          SHA-512:C07DE7308CB54205E8BD703001A7FE4FD7796C9AC1B4BB330C77C872BF712B093645F40B80CE7127531FE6746A5B66E18EA073AB6A644934ABED9BB64126FEA9
                          Malicious:false
                          Antivirus:
                          • Antivirus: ReversingLabs, Detection: 0%
                          • Antivirus: Virustotal, Detection: 0%, Browse
                          Joe Sandbox View:
                          • Filename: KO0q4biYfC.exe, Detection: malicious, Browse
                          • Filename: Yoranis Setup.exe, Detection: malicious, Browse
                          • Filename: Yoranis Setup.exe, Detection: malicious, Browse
                          • Filename: Pralevia Setup 1.0.0.exe, Detection: malicious, Browse
                          • Filename: Pralevia Setup 1.0.0.exe, Detection: malicious, Browse
                          • Filename: NativeApp_G5L1NHZZ.exe, Detection: malicious, Browse
                          • Filename: Awb 4586109146.bat.exe, Detection: malicious, Browse
                          • Filename: PO 0309494059506060609696007.exe, Detection: malicious, Browse
                          • Filename: YF3YnL4ksc.exe, Detection: malicious, Browse
                          • Filename: YF3YnL4ksc.exe, Detection: malicious, Browse
                          Reputation:high, very likely benign file
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....~.\...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                          Entropy (8bit):7.665655342643962
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          File size:764'339 bytes
                          MD5:a25712989100fcdcb627446bcedb6c0a
                          SHA1:7577219dfedaaedff8b10dc274b97cff0f2788fb
                          SHA256:148b1248f6b89fa446d40890492bf0f9dddfa0b17d1cb9cad9fd84a0f9934890
                          SHA512:cb73d6e402c985060fa29f19cd8a9c5969fea907be08dace163d30994849eec6da053822959e9b0d2f9e2aac5435381fbef47a6e04cd16e4df038059ba266d04
                          SSDEEP:12288:gSsoaNkT5nJ2CDKyunOwmxfydcitSooK0uTddwDAvJaDpuhFQp3nZoThK:gxCnJ7DKZnO5xPK02dYDpmQp3nZac
                          TLSH:C6F4F1AAF150A991C08D73B2843F3EDE5668ECCEBD7CD96C198D3A45FBB72C01806855
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L......\.................h.........
                          Icon Hash:9b673392d8969765
                          Entrypoint:0x40338f
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x5C157F2E [Sat Dec 15 22:24:46 2018 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:b34f154ec913d2d2c435cbd644e91687
                          Instruction
                          sub esp, 000002D4h
                          push ebx
                          push esi
                          push edi
                          push 00000020h
                          pop edi
                          xor ebx, ebx
                          push 00008001h
                          mov dword ptr [esp+14h], ebx
                          mov dword ptr [esp+10h], 0040A2E0h
                          mov dword ptr [esp+1Ch], ebx
                          call dword ptr [004080A8h]
                          call dword ptr [004080A4h]
                          and eax, BFFFFFFFh
                          cmp ax, 00000006h
                          mov dword ptr [00434EECh], eax
                          je 00007FC41100E263h
                          push ebx
                          call 00007FC411011515h
                          cmp eax, ebx
                          je 00007FC41100E259h
                          push 00000C00h
                          call eax
                          mov esi, 004082B0h
                          push esi
                          call 00007FC41101148Fh
                          push esi
                          call dword ptr [00408150h]
                          lea esi, dword ptr [esi+eax+01h]
                          cmp byte ptr [esi], 00000000h
                          jne 00007FC41100E23Ch
                          push 0000000Ah
                          call 00007FC4110114E8h
                          push 00000008h
                          call 00007FC4110114E1h
                          push 00000006h
                          mov dword ptr [00434EE4h], eax
                          call 00007FC4110114D5h
                          cmp eax, ebx
                          je 00007FC41100E261h
                          push 0000001Eh
                          call eax
                          test eax, eax
                          je 00007FC41100E259h
                          or byte ptr [00434EEFh], 00000040h
                          push ebp
                          call dword ptr [00408044h]
                          push ebx
                          call dword ptr [004082A0h]
                          mov dword ptr [00434FB8h], eax
                          push ebx
                          lea eax, dword ptr [esp+34h]
                          push 000002B4h
                          push eax
                          push ebx
                          push 0042B208h
                          call dword ptr [00408188h]
                          push 0040A2C8h
                          Programming Language:
                          • [EXP] VC++ 6.0 SP5 build 8804
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x530000x2a7c8.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x66270x680037029c3103747b9cc70c8ecd944a9b83False0.6643629807692307data6.451784672975888IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x80000x14a20x1600eecac1fed9cc6b447d50940d178404d8False0.4405184659090909data5.025178929113415IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa0000x2aff80x600939516377e7577b622eb1ffdc4b5db4aFalse0.517578125data4.03532418489749IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .ndata0x350000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .rsrc0x530000x2a7c80x2a800e4f28a45b728cc6119beb84ff29a2c0aFalse0.2807502297794118data5.286546909879635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x533e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.23547852833313618
                          RT_ICON0x63c100x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.2597487912549926
                          RT_ICON0x6d0b80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.29551756007393715
                          RT_ICON0x725400x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.31317902692489374
                          RT_ICON0x767680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3537344398340249
                          RT_ICON0x78d100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4406660412757974
                          RT_ICON0x79db80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.451226012793177
                          RT_ICON0x7ac600x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.4864754098360656
                          RT_ICON0x7b5e80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.506768953068592
                          RT_ICON0x7be900x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colorsEnglishUnited States0.5034562211981567
                          RT_ICON0x7c5580x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3880057803468208
                          RT_ICON0x7cac00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5957446808510638
                          RT_DIALOG0x7cf280x100dataEnglishUnited States0.5234375
                          RT_DIALOG0x7d0280x11cdataEnglishUnited States0.6056338028169014
                          RT_DIALOG0x7d1480x60dataEnglishUnited States0.7291666666666666
                          RT_GROUP_ICON0x7d1a80xaedataEnglishUnited States0.6609195402298851
                          RT_VERSION0x7d2580x22cdataEnglishUnited States0.5323741007194245
                          RT_MANIFEST0x7d4880x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                          DLLImport
                          KERNEL32.dllSetEnvironmentVariableW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, SetCurrentDirectoryW, GetFileAttributesW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, ExitProcess, GetShortPathNameW, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalLock, GlobalUnlock, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                          USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                          SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                          ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 9, 2025 08:29:06.210772038 CET5750953192.168.2.8162.159.36.2
                          Jan 9, 2025 08:29:06.215646029 CET5357509162.159.36.2192.168.2.8
                          Jan 9, 2025 08:29:06.215769053 CET5750953192.168.2.8162.159.36.2
                          Jan 9, 2025 08:29:06.220873117 CET5357509162.159.36.2192.168.2.8
                          Jan 9, 2025 08:29:06.669380903 CET5750953192.168.2.8162.159.36.2
                          Jan 9, 2025 08:29:06.674410105 CET5357509162.159.36.2192.168.2.8
                          Jan 9, 2025 08:29:06.674454927 CET5750953192.168.2.8162.159.36.2
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 9, 2025 08:29:06.210203886 CET5351846162.159.36.2192.168.2.8
                          Jan 9, 2025 08:29:06.692223072 CET5535353192.168.2.81.1.1.1
                          Jan 9, 2025 08:29:06.699352980 CET53553531.1.1.1192.168.2.8
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 9, 2025 08:29:06.692223072 CET192.168.2.81.1.1.10xcfcbStandard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 9, 2025 08:29:06.699352980 CET1.1.1.1192.168.2.80xcfcbName error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:02:28:32
                          Start date:09/01/2025
                          Path:C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe
                          Wow64 process (32bit):true
                          Commandline:"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"
                          Imagebase:0x400000
                          File size:764'339 bytes
                          MD5 hash:A25712989100FCDCB627446BCEDB6C0A
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:14.7%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:19.3%
                            Total number of Nodes:1543
                            Total number of Limit Nodes:28
                            execution_graph 3956 401941 3957 401943 3956->3957 3962 402c41 3957->3962 3963 402c4d 3962->3963 4007 4062dc 3963->4007 3966 401948 3968 4059cc 3966->3968 4049 405c97 3968->4049 3971 4059f4 DeleteFileW 3973 401951 3971->3973 3972 405a0b 3974 405b36 3972->3974 4063 4062ba lstrcpynW 3972->4063 3974->3973 4092 4065fd FindFirstFileW 3974->4092 3976 405a31 3977 405a44 3976->3977 3978 405a37 lstrcatW 3976->3978 4064 405bdb lstrlenW 3977->4064 3979 405a4a 3978->3979 3982 405a5a lstrcatW 3979->3982 3984 405a65 lstrlenW FindFirstFileW 3979->3984 3982->3984 3986 405b2b 3984->3986 4005 405a87 3984->4005 3985 405b54 4095 405b8f lstrlenW CharPrevW 3985->4095 3986->3974 3989 405b0e FindNextFileW 3993 405b24 FindClose 3989->3993 3989->4005 3990 405984 5 API calls 3992 405b66 3990->3992 3994 405b80 3992->3994 3995 405b6a 3992->3995 3993->3986 3997 405322 24 API calls 3994->3997 3995->3973 3999 405322 24 API calls 3995->3999 3997->3973 3998 4059cc 60 API calls 3998->4005 4000 405b77 3999->4000 4001 406080 36 API calls 4000->4001 4003 405b7e 4001->4003 4002 405322 24 API calls 4002->3989 4003->3973 4005->3989 4005->3998 4005->4002 4068 4062ba lstrcpynW 4005->4068 4069 405984 4005->4069 4077 405322 4005->4077 4088 406080 MoveFileExW 4005->4088 4008 4062e9 4007->4008 4009 406534 4008->4009 4012 406502 lstrlenW 4008->4012 4015 4062dc 10 API calls 4008->4015 4017 406417 GetSystemDirectoryW 4008->4017 4018 40642a GetWindowsDirectoryW 4008->4018 4019 40654e 5 API calls 4008->4019 4020 4062dc 10 API calls 4008->4020 4021 4064a5 lstrcatW 4008->4021 4022 40645e SHGetSpecialFolderLocation 4008->4022 4033 406188 4008->4033 4038 406201 wsprintfW 4008->4038 4039 4062ba lstrcpynW 4008->4039 4010 402c6e 4009->4010 4040 4062ba lstrcpynW 4009->4040 4010->3966 4024 40654e 4010->4024 4012->4008 4015->4012 4017->4008 4018->4008 4019->4008 4020->4008 4021->4008 4022->4008 4023 406476 SHGetPathFromIDListW CoTaskMemFree 4022->4023 4023->4008 4030 40655b 4024->4030 4025 4065d1 4026 4065d6 CharPrevW 4025->4026 4028 4065f7 4025->4028 4026->4025 4027 4065c4 CharNextW 4027->4025 4027->4030 4028->3966 4030->4025 4030->4027 4031 4065b0 CharNextW 4030->4031 4032 4065bf CharNextW 4030->4032 4045 405bbc 4030->4045 4031->4030 4032->4027 4041 406127 4033->4041 4036 4061ec 4036->4008 4037 4061bc RegQueryValueExW RegCloseKey 4037->4036 4038->4008 4039->4008 4040->4010 4042 406136 4041->4042 4043 40613a 4042->4043 4044 40613f RegOpenKeyExW 4042->4044 4043->4036 4043->4037 4044->4043 4046 405bc2 4045->4046 4047 405bd8 4046->4047 4048 405bc9 CharNextW 4046->4048 4047->4030 4048->4046 4098 4062ba lstrcpynW 4049->4098 4051 405ca8 4099 405c3a CharNextW CharNextW 4051->4099 4054 4059ec 4054->3971 4054->3972 4055 40654e 5 API calls 4061 405cbe 4055->4061 4056 405cef lstrlenW 4057 405cfa 4056->4057 4056->4061 4059 405b8f 3 API calls 4057->4059 4058 4065fd 2 API calls 4058->4061 4060 405cff GetFileAttributesW 4059->4060 4060->4054 4061->4054 4061->4056 4061->4058 4062 405bdb 2 API calls 4061->4062 4062->4056 4063->3976 4065 405be9 4064->4065 4066 405bfb 4065->4066 4067 405bef CharPrevW 4065->4067 4066->3979 4067->4065 4067->4066 4068->4005 4105 405d8b GetFileAttributesW 4069->4105 4072 4059a7 DeleteFileW 4074 4059ad 4072->4074 4073 40599f RemoveDirectoryW 4073->4074 4075 4059b1 4074->4075 4076 4059bd SetFileAttributesW 4074->4076 4075->4005 4076->4075 4078 40533d 4077->4078 4087 4053df 4077->4087 4079 405359 lstrlenW 4078->4079 4080 4062dc 17 API calls 4078->4080 4081 405382 4079->4081 4082 405367 lstrlenW 4079->4082 4080->4079 4084 405395 4081->4084 4085 405388 SetWindowTextW 4081->4085 4083 405379 lstrcatW 4082->4083 4082->4087 4083->4081 4086 40539b SendMessageW SendMessageW SendMessageW 4084->4086 4084->4087 4085->4084 4086->4087 4087->4005 4089 406094 4088->4089 4091 4060a1 4088->4091 4108 405f06 4089->4108 4091->4005 4093 406613 FindClose 4092->4093 4094 405b50 4092->4094 4093->4094 4094->3973 4094->3985 4096 405b5a 4095->4096 4097 405bab lstrcatW 4095->4097 4096->3990 4097->4096 4098->4051 4100 405c57 4099->4100 4102 405c69 4099->4102 4101 405c64 CharNextW 4100->4101 4100->4102 4104 405c8d 4101->4104 4103 405bbc CharNextW 4102->4103 4102->4104 4103->4102 4104->4054 4104->4055 4106 405990 4105->4106 4107 405d9d SetFileAttributesW 4105->4107 4106->4072 4106->4073 4106->4075 4107->4106 4109 405f36 4108->4109 4110 405f5c GetShortPathNameW 4108->4110 4135 405db0 GetFileAttributesW CreateFileW 4109->4135 4112 405f71 4110->4112 4113 40607b 4110->4113 4112->4113 4115 405f79 wsprintfA 4112->4115 4113->4091 4114 405f40 CloseHandle GetShortPathNameW 4114->4113 4116 405f54 4114->4116 4117 4062dc 17 API calls 4115->4117 4116->4110 4116->4113 4118 405fa1 4117->4118 4136 405db0 GetFileAttributesW CreateFileW 4118->4136 4120 405fae 4120->4113 4121 405fbd GetFileSize GlobalAlloc 4120->4121 4122 406074 CloseHandle 4121->4122 4123 405fdf 4121->4123 4122->4113 4137 405e33 ReadFile 4123->4137 4128 406012 4130 405d15 4 API calls 4128->4130 4129 405ffe lstrcpyA 4131 406020 4129->4131 4130->4131 4132 406057 SetFilePointer 4131->4132 4144 405e62 WriteFile 4132->4144 4135->4114 4136->4120 4138 405e51 4137->4138 4138->4122 4139 405d15 lstrlenA 4138->4139 4140 405d56 lstrlenA 4139->4140 4141 405d5e 4140->4141 4142 405d2f lstrcmpiA 4140->4142 4141->4128 4141->4129 4142->4141 4143 405d4d CharNextA 4142->4143 4143->4140 4145 405e80 GlobalFree 4144->4145 4145->4122 4146 4015c1 4147 402c41 17 API calls 4146->4147 4148 4015c8 4147->4148 4149 405c3a 4 API calls 4148->4149 4161 4015d1 4149->4161 4150 401631 4152 401663 4150->4152 4153 401636 4150->4153 4151 405bbc CharNextW 4151->4161 4156 401423 24 API calls 4152->4156 4173 401423 4153->4173 4162 40165b 4156->4162 4160 40164a SetCurrentDirectoryW 4160->4162 4161->4150 4161->4151 4163 401617 GetFileAttributesW 4161->4163 4165 40588b 4161->4165 4168 4057f1 CreateDirectoryW 4161->4168 4177 40586e CreateDirectoryW 4161->4177 4163->4161 4180 406694 GetModuleHandleA 4165->4180 4169 405842 GetLastError 4168->4169 4170 40583e 4168->4170 4169->4170 4171 405851 SetFileSecurityW 4169->4171 4170->4161 4171->4170 4172 405867 GetLastError 4171->4172 4172->4170 4174 405322 24 API calls 4173->4174 4175 401431 4174->4175 4176 4062ba lstrcpynW 4175->4176 4176->4160 4178 405882 GetLastError 4177->4178 4179 40587e 4177->4179 4178->4179 4179->4161 4181 4066b0 4180->4181 4182 4066ba GetProcAddress 4180->4182 4186 406624 GetSystemDirectoryW 4181->4186 4183 405892 4182->4183 4183->4161 4185 4066b6 4185->4182 4185->4183 4187 406646 wsprintfW LoadLibraryExW 4186->4187 4187->4185 4189 73912993 4190 739129e3 4189->4190 4191 739129a3 VirtualProtect 4189->4191 4191->4190 4820 401e49 4821 402c1f 17 API calls 4820->4821 4822 401e4f 4821->4822 4823 402c1f 17 API calls 4822->4823 4824 401e5b 4823->4824 4825 401e72 EnableWindow 4824->4825 4826 401e67 ShowWindow 4824->4826 4827 402ac5 4825->4827 4826->4827 4200 40264a 4214 402c1f 4200->4214 4202 402796 4203 4026a3 ReadFile 4203->4202 4210 402659 4203->4210 4204 40273c 4204->4202 4204->4210 4217 405e91 SetFilePointer 4204->4217 4205 405e33 ReadFile 4205->4210 4207 4026e3 MultiByteToWideChar 4207->4210 4208 402798 4226 406201 wsprintfW 4208->4226 4210->4202 4210->4203 4210->4204 4210->4205 4210->4207 4210->4208 4211 402709 SetFilePointer MultiByteToWideChar 4210->4211 4212 4027a9 4210->4212 4211->4210 4212->4202 4213 4027ca SetFilePointer 4212->4213 4213->4202 4215 4062dc 17 API calls 4214->4215 4216 402c34 4215->4216 4216->4210 4218 405ead 4217->4218 4221 405ec5 4217->4221 4219 405e33 ReadFile 4218->4219 4220 405eb9 4219->4220 4220->4221 4222 405ef6 SetFilePointer 4220->4222 4223 405ece SetFilePointer 4220->4223 4221->4204 4222->4221 4223->4222 4224 405ed9 4223->4224 4225 405e62 WriteFile 4224->4225 4225->4221 4226->4202 5377 4016cc 5378 402c41 17 API calls 5377->5378 5379 4016d2 GetFullPathNameW 5378->5379 5380 4016ec 5379->5380 5386 40170e 5379->5386 5383 4065fd 2 API calls 5380->5383 5380->5386 5381 401723 GetShortPathNameW 5382 402ac5 5381->5382 5384 4016fe 5383->5384 5384->5386 5387 4062ba lstrcpynW 5384->5387 5386->5381 5386->5382 5387->5386 4237 40234e 4238 402c41 17 API calls 4237->4238 4239 40235d 4238->4239 4240 402c41 17 API calls 4239->4240 4241 402366 4240->4241 4242 402c41 17 API calls 4241->4242 4243 402370 GetPrivateProfileStringW 4242->4243 5388 73911000 5391 7391101b 5388->5391 5398 73911516 5391->5398 5393 73911020 5394 73911024 5393->5394 5395 73911027 GlobalAlloc 5393->5395 5396 7391153d 3 API calls 5394->5396 5395->5394 5397 73911019 5396->5397 5400 7391151c 5398->5400 5399 73911522 5399->5393 5400->5399 5401 7391152e GlobalFree 5400->5401 5401->5393 4828 401b53 4829 402c41 17 API calls 4828->4829 4830 401b5a 4829->4830 4831 402c1f 17 API calls 4830->4831 4832 401b63 wsprintfW 4831->4832 4833 402ac5 4832->4833 4834 401956 4835 402c41 17 API calls 4834->4835 4836 40195d lstrlenW 4835->4836 4837 402592 4836->4837 4809 4014d7 4810 402c1f 17 API calls 4809->4810 4811 4014dd Sleep 4810->4811 4813 402ac5 4811->4813 4838 403d58 4839 403d70 4838->4839 4840 403eab 4838->4840 4839->4840 4841 403d7c 4839->4841 4842 403efc 4840->4842 4843 403ebc GetDlgItem GetDlgItem 4840->4843 4845 403d87 SetWindowPos 4841->4845 4846 403d9a 4841->4846 4844 403f56 4842->4844 4852 401389 2 API calls 4842->4852 4924 404231 4843->4924 4848 40427d SendMessageW 4844->4848 4869 403ea6 4844->4869 4845->4846 4849 403db7 4846->4849 4850 403d9f ShowWindow 4846->4850 4867 403f68 4848->4867 4853 403dd9 4849->4853 4854 403dbf DestroyWindow 4849->4854 4850->4849 4851 403ee6 SetClassLongW 4855 40140b 2 API calls 4851->4855 4858 403f2e 4852->4858 4856 403dde SetWindowLongW 4853->4856 4857 403def 4853->4857 4906 4041ba 4854->4906 4855->4842 4856->4869 4859 403dfb GetDlgItem 4857->4859 4875 403e66 4857->4875 4858->4844 4860 403f32 SendMessageW 4858->4860 4863 403e2b 4859->4863 4864 403e0e SendMessageW IsWindowEnabled 4859->4864 4860->4869 4861 40140b 2 API calls 4861->4867 4862 4041bc DestroyWindow EndDialog 4862->4906 4870 403e38 4863->4870 4873 403e7f SendMessageW 4863->4873 4874 403e4b 4863->4874 4880 403e30 4863->4880 4864->4863 4864->4869 4866 4041eb ShowWindow 4866->4869 4867->4861 4867->4862 4868 4062dc 17 API calls 4867->4868 4867->4869 4872 404231 18 API calls 4867->4872 4881 404231 18 API calls 4867->4881 4897 4040fc DestroyWindow 4867->4897 4868->4867 4870->4873 4870->4880 4872->4867 4873->4875 4876 403e53 4874->4876 4877 403e68 4874->4877 4910 404298 4875->4910 4879 40140b 2 API calls 4876->4879 4878 40140b 2 API calls 4877->4878 4878->4880 4879->4880 4880->4875 4907 40420a 4880->4907 4882 403fe3 GetDlgItem 4881->4882 4883 404000 ShowWindow EnableWindow 4882->4883 4884 403ff8 4882->4884 4927 404253 EnableWindow 4883->4927 4884->4883 4886 40402a EnableWindow 4891 40403e 4886->4891 4887 404043 GetSystemMenu EnableMenuItem SendMessageW 4888 404073 SendMessageW 4887->4888 4887->4891 4888->4891 4890 403d39 18 API calls 4890->4891 4891->4887 4891->4890 4928 404266 SendMessageW 4891->4928 4929 4062ba lstrcpynW 4891->4929 4893 4040a2 lstrlenW 4894 4062dc 17 API calls 4893->4894 4895 4040b8 SetWindowTextW 4894->4895 4896 401389 2 API calls 4895->4896 4896->4867 4898 404116 CreateDialogParamW 4897->4898 4897->4906 4899 404149 4898->4899 4898->4906 4900 404231 18 API calls 4899->4900 4901 404154 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4900->4901 4902 401389 2 API calls 4901->4902 4903 40419a 4902->4903 4903->4869 4904 4041a2 ShowWindow 4903->4904 4905 40427d SendMessageW 4904->4905 4905->4906 4906->4866 4906->4869 4908 404211 4907->4908 4909 404217 SendMessageW 4907->4909 4908->4909 4909->4875 4911 40435b 4910->4911 4912 4042b0 GetWindowLongW 4910->4912 4911->4869 4912->4911 4913 4042c5 4912->4913 4913->4911 4914 4042f2 GetSysColor 4913->4914 4915 4042f5 4913->4915 4914->4915 4916 404305 SetBkMode 4915->4916 4917 4042fb SetTextColor 4915->4917 4918 404323 4916->4918 4919 40431d GetSysColor 4916->4919 4917->4916 4920 40432a SetBkColor 4918->4920 4921 404334 4918->4921 4919->4918 4920->4921 4921->4911 4922 404347 DeleteObject 4921->4922 4923 40434e CreateBrushIndirect 4921->4923 4922->4923 4923->4911 4925 4062dc 17 API calls 4924->4925 4926 40423c SetDlgItemTextW 4925->4926 4926->4851 4927->4886 4928->4891 4929->4893 4930 401f58 4931 402c41 17 API calls 4930->4931 4932 401f5f 4931->4932 4933 4065fd 2 API calls 4932->4933 4934 401f65 4933->4934 4936 401f76 4934->4936 4937 406201 wsprintfW 4934->4937 4937->4936 4938 402259 4939 402c41 17 API calls 4938->4939 4940 40225f 4939->4940 4941 402c41 17 API calls 4940->4941 4942 402268 4941->4942 4943 402c41 17 API calls 4942->4943 4944 402271 4943->4944 4945 4065fd 2 API calls 4944->4945 4946 40227a 4945->4946 4947 40228b lstrlenW lstrlenW 4946->4947 4948 40227e 4946->4948 4950 405322 24 API calls 4947->4950 4949 405322 24 API calls 4948->4949 4952 402286 4949->4952 4951 4022c9 SHFileOperationW 4950->4951 4951->4948 4951->4952 5402 4046db 5403 404711 5402->5403 5404 4046eb 5402->5404 5405 404298 8 API calls 5403->5405 5406 404231 18 API calls 5404->5406 5407 40471d 5405->5407 5408 4046f8 SetDlgItemTextW 5406->5408 5408->5403 4814 40175c 4815 402c41 17 API calls 4814->4815 4816 401763 4815->4816 4817 405ddf 2 API calls 4816->4817 4818 40176a 4817->4818 4819 405ddf 2 API calls 4818->4819 4819->4818 4953 401d5d GetDlgItem GetClientRect 4954 402c41 17 API calls 4953->4954 4955 401d8f LoadImageW SendMessageW 4954->4955 4956 402ac5 4955->4956 4957 401dad DeleteObject 4955->4957 4957->4956 5409 4022dd 5410 4022f7 5409->5410 5411 4022e4 5409->5411 5412 4062dc 17 API calls 5411->5412 5413 4022f1 5412->5413 5414 405920 MessageBoxIndirectW 5413->5414 5414->5410 4958 405461 4959 405482 GetDlgItem GetDlgItem GetDlgItem 4958->4959 4960 40560b 4958->4960 5003 404266 SendMessageW 4959->5003 4962 405614 GetDlgItem CreateThread CloseHandle 4960->4962 4963 40563c 4960->4963 4962->4963 4965 405653 ShowWindow ShowWindow 4963->4965 4966 40568c 4963->4966 4967 405667 4963->4967 4964 4054f2 4969 4054f9 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4964->4969 5005 404266 SendMessageW 4965->5005 4973 404298 8 API calls 4966->4973 4968 4056c7 4967->4968 4971 4056a1 ShowWindow 4967->4971 4972 40567b 4967->4972 4968->4966 4979 4056d5 SendMessageW 4968->4979 4977 405567 4969->4977 4978 40554b SendMessageW SendMessageW 4969->4978 4975 4056c1 4971->4975 4976 4056b3 4971->4976 4980 40420a SendMessageW 4972->4980 4974 40569a 4973->4974 4982 40420a SendMessageW 4975->4982 4981 405322 24 API calls 4976->4981 4983 40557a 4977->4983 4984 40556c SendMessageW 4977->4984 4978->4977 4979->4974 4985 4056ee CreatePopupMenu 4979->4985 4980->4966 4981->4975 4982->4968 4987 404231 18 API calls 4983->4987 4984->4983 4986 4062dc 17 API calls 4985->4986 4988 4056fe AppendMenuW 4986->4988 4989 40558a 4987->4989 4990 40571b GetWindowRect 4988->4990 4991 40572e TrackPopupMenu 4988->4991 4992 405593 ShowWindow 4989->4992 4993 4055c7 GetDlgItem SendMessageW 4989->4993 4990->4991 4991->4974 4995 405749 4991->4995 4996 4055a9 ShowWindow 4992->4996 4997 4055b6 4992->4997 4993->4974 4994 4055ee SendMessageW SendMessageW 4993->4994 4994->4974 4998 405765 SendMessageW 4995->4998 4996->4997 5004 404266 SendMessageW 4997->5004 4998->4998 4999 405782 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4998->4999 5001 4057a7 SendMessageW 4999->5001 5001->5001 5002 4057d0 GlobalUnlock SetClipboardData CloseClipboard 5001->5002 5002->4974 5003->4964 5004->4993 5005->4967 5006 401563 5007 402a6b 5006->5007 5010 406201 wsprintfW 5007->5010 5009 402a70 5010->5009 5415 4023e4 5416 402c41 17 API calls 5415->5416 5417 4023f6 5416->5417 5418 402c41 17 API calls 5417->5418 5419 402400 5418->5419 5432 402cd1 5419->5432 5422 402438 5424 402444 5422->5424 5427 402c1f 17 API calls 5422->5427 5423 402c41 17 API calls 5426 40242e lstrlenW 5423->5426 5428 402463 RegSetValueExW 5424->5428 5429 403116 31 API calls 5424->5429 5425 40288b 5426->5422 5427->5424 5430 402479 RegCloseKey 5428->5430 5429->5428 5430->5425 5433 402cec 5432->5433 5436 406155 5433->5436 5437 406164 5436->5437 5438 402410 5437->5438 5439 40616f RegCreateKeyExW 5437->5439 5438->5422 5438->5423 5438->5425 5439->5438 5011 404367 lstrcpynW lstrlenW 5012 402868 5013 402c41 17 API calls 5012->5013 5014 40286f FindFirstFileW 5013->5014 5015 402882 5014->5015 5016 402897 5014->5016 5020 406201 wsprintfW 5016->5020 5018 4028a0 5021 4062ba lstrcpynW 5018->5021 5020->5018 5021->5015 5022 401968 5023 402c1f 17 API calls 5022->5023 5024 40196f 5023->5024 5025 402c1f 17 API calls 5024->5025 5026 40197c 5025->5026 5027 402c41 17 API calls 5026->5027 5028 401993 lstrlenW 5027->5028 5030 4019a4 5028->5030 5029 4019e5 5030->5029 5034 4062ba lstrcpynW 5030->5034 5032 4019d5 5032->5029 5033 4019da lstrlenW 5032->5033 5033->5029 5034->5032 5035 403968 5036 403973 5035->5036 5037 403977 5036->5037 5038 40397a GlobalAlloc 5036->5038 5038->5037 5039 40166a 5040 402c41 17 API calls 5039->5040 5041 401670 5040->5041 5042 4065fd 2 API calls 5041->5042 5043 401676 5042->5043 5440 7391103d 5441 7391101b 5 API calls 5440->5441 5442 73911056 5441->5442 4278 40176f 4279 402c41 17 API calls 4278->4279 4280 401776 4279->4280 4281 401796 4280->4281 4282 40179e 4280->4282 4338 4062ba lstrcpynW 4281->4338 4339 4062ba lstrcpynW 4282->4339 4285 40179c 4289 40654e 5 API calls 4285->4289 4286 4017a9 4287 405b8f 3 API calls 4286->4287 4288 4017af lstrcatW 4287->4288 4288->4285 4306 4017bb 4289->4306 4290 4017f7 4292 405d8b 2 API calls 4290->4292 4291 4065fd 2 API calls 4291->4306 4292->4306 4294 4017cd CompareFileTime 4294->4306 4295 40188d 4297 405322 24 API calls 4295->4297 4296 401864 4298 405322 24 API calls 4296->4298 4316 401879 4296->4316 4300 401897 4297->4300 4298->4316 4299 4062ba lstrcpynW 4299->4306 4318 403116 4300->4318 4303 4018be SetFileTime 4304 4018d0 CloseHandle 4303->4304 4307 4018e1 4304->4307 4304->4316 4305 4062dc 17 API calls 4305->4306 4306->4290 4306->4291 4306->4294 4306->4295 4306->4296 4306->4299 4306->4305 4317 405db0 GetFileAttributesW CreateFileW 4306->4317 4340 405920 4306->4340 4308 4018e6 4307->4308 4309 4018f9 4307->4309 4310 4062dc 17 API calls 4308->4310 4311 4062dc 17 API calls 4309->4311 4313 4018ee lstrcatW 4310->4313 4314 401901 4311->4314 4313->4314 4315 405920 MessageBoxIndirectW 4314->4315 4315->4316 4317->4306 4319 40312f 4318->4319 4320 40315d 4319->4320 4347 403347 SetFilePointer 4319->4347 4344 403331 4320->4344 4324 4032ca 4326 40330c 4324->4326 4331 4032ce 4324->4331 4325 40317a GetTickCount 4327 4018aa 4325->4327 4334 4031c9 4325->4334 4328 403331 ReadFile 4326->4328 4327->4303 4327->4304 4328->4327 4329 403331 ReadFile 4329->4334 4330 403331 ReadFile 4330->4331 4331->4327 4331->4330 4332 405e62 WriteFile 4331->4332 4332->4331 4333 40321f GetTickCount 4333->4334 4334->4327 4334->4329 4334->4333 4335 403244 MulDiv wsprintfW 4334->4335 4337 405e62 WriteFile 4334->4337 4336 405322 24 API calls 4335->4336 4336->4334 4337->4334 4338->4285 4339->4286 4341 405935 4340->4341 4342 405981 4341->4342 4343 405949 MessageBoxIndirectW 4341->4343 4342->4306 4343->4342 4345 405e33 ReadFile 4344->4345 4346 403168 4345->4346 4346->4324 4346->4325 4346->4327 4347->4320 4348 4027ef 4349 402a70 4348->4349 4350 4027f6 4348->4350 4351 402c1f 17 API calls 4350->4351 4352 4027fd 4351->4352 4353 40280c SetFilePointer 4352->4353 4353->4349 4354 40281c 4353->4354 4356 406201 wsprintfW 4354->4356 4356->4349 5443 4043f0 5444 404522 5443->5444 5447 404408 5443->5447 5445 40458c 5444->5445 5448 404656 5444->5448 5454 40455d GetDlgItem SendMessageW 5444->5454 5446 404596 GetDlgItem 5445->5446 5445->5448 5449 4045b0 5446->5449 5450 404617 5446->5450 5451 404231 18 API calls 5447->5451 5453 404298 8 API calls 5448->5453 5449->5450 5457 4045d6 SendMessageW LoadCursorW SetCursor 5449->5457 5450->5448 5458 404629 5450->5458 5452 40446f 5451->5452 5455 404231 18 API calls 5452->5455 5456 404651 5453->5456 5476 404253 EnableWindow 5454->5476 5460 40447c CheckDlgButton 5455->5460 5477 40469f 5457->5477 5462 40463f 5458->5462 5463 40462f SendMessageW 5458->5463 5474 404253 EnableWindow 5460->5474 5462->5456 5468 404645 SendMessageW 5462->5468 5463->5462 5464 404587 5465 40467b SendMessageW 5464->5465 5465->5445 5468->5456 5469 40449a GetDlgItem 5475 404266 SendMessageW 5469->5475 5471 4044b0 SendMessageW 5472 4044d6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5471->5472 5473 4044cd GetSysColor 5471->5473 5472->5456 5473->5472 5474->5469 5475->5471 5476->5464 5480 4058e6 ShellExecuteExW 5477->5480 5479 404605 LoadCursorW SetCursor 5479->5450 5480->5479 5044 401a72 5045 402c1f 17 API calls 5044->5045 5046 401a7b 5045->5046 5047 402c1f 17 API calls 5046->5047 5048 401a20 5047->5048 5049 401573 5050 401583 ShowWindow 5049->5050 5051 40158c 5049->5051 5050->5051 5052 402ac5 5051->5052 5053 40159a ShowWindow 5051->5053 5053->5052 5481 401cf3 5482 402c1f 17 API calls 5481->5482 5483 401cf9 IsWindow 5482->5483 5484 401a20 5483->5484 5485 402df3 5486 402e05 SetTimer 5485->5486 5487 402e1e 5485->5487 5486->5487 5488 402e73 5487->5488 5489 402e38 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5487->5489 5489->5488 5490 4014f5 SetForegroundWindow 5491 402ac5 5490->5491 5054 402576 5055 402c41 17 API calls 5054->5055 5056 40257d 5055->5056 5059 405db0 GetFileAttributesW CreateFileW 5056->5059 5058 402589 5059->5058 5060 401b77 5061 401b84 5060->5061 5062 401bc8 5060->5062 5065 401c0d 5061->5065 5070 401b9b 5061->5070 5063 401bf2 GlobalAlloc 5062->5063 5064 401bcd 5062->5064 5066 4062dc 17 API calls 5063->5066 5078 4022f7 5064->5078 5081 4062ba lstrcpynW 5064->5081 5067 4062dc 17 API calls 5065->5067 5065->5078 5066->5065 5069 4022f1 5067->5069 5073 405920 MessageBoxIndirectW 5069->5073 5079 4062ba lstrcpynW 5070->5079 5071 401bdf GlobalFree 5071->5078 5073->5078 5074 401baa 5080 4062ba lstrcpynW 5074->5080 5076 401bb9 5082 4062ba lstrcpynW 5076->5082 5079->5074 5080->5076 5081->5071 5082->5078 5083 404a78 5084 404aa4 5083->5084 5085 404a88 5083->5085 5087 404ad7 5084->5087 5088 404aaa SHGetPathFromIDListW 5084->5088 5094 405904 GetDlgItemTextW 5085->5094 5090 404ac1 SendMessageW 5088->5090 5091 404aba 5088->5091 5089 404a95 SendMessageW 5089->5084 5090->5087 5092 40140b 2 API calls 5091->5092 5092->5090 5094->5089 5492 4024f8 5493 402c81 17 API calls 5492->5493 5494 402502 5493->5494 5495 402c1f 17 API calls 5494->5495 5496 40250b 5495->5496 5497 402533 RegEnumValueW 5496->5497 5498 402527 RegEnumKeyW 5496->5498 5500 40288b 5496->5500 5499 402548 RegCloseKey 5497->5499 5498->5499 5499->5500 5095 40167b 5096 402c41 17 API calls 5095->5096 5097 401682 5096->5097 5098 402c41 17 API calls 5097->5098 5099 40168b 5098->5099 5100 402c41 17 API calls 5099->5100 5101 401694 MoveFileW 5100->5101 5102 4016a0 5101->5102 5103 4016a7 5101->5103 5105 401423 24 API calls 5102->5105 5104 4065fd 2 API calls 5103->5104 5107 402250 5103->5107 5106 4016b6 5104->5106 5105->5107 5106->5107 5108 406080 36 API calls 5106->5108 5108->5102 5109 401e7d 5110 402c41 17 API calls 5109->5110 5111 401e83 5110->5111 5112 402c41 17 API calls 5111->5112 5113 401e8c 5112->5113 5114 402c41 17 API calls 5113->5114 5115 401e95 5114->5115 5116 402c41 17 API calls 5115->5116 5117 401e9e 5116->5117 5118 401423 24 API calls 5117->5118 5119 401ea5 5118->5119 5126 4058e6 ShellExecuteExW 5119->5126 5121 401ee7 5124 40288b 5121->5124 5127 406745 WaitForSingleObject 5121->5127 5123 401f01 CloseHandle 5123->5124 5126->5121 5128 40675f 5127->5128 5129 406771 GetExitCodeProcess 5128->5129 5130 4066d0 2 API calls 5128->5130 5129->5123 5131 406766 WaitForSingleObject 5130->5131 5131->5128 5502 4019ff 5503 402c41 17 API calls 5502->5503 5504 401a06 5503->5504 5505 402c41 17 API calls 5504->5505 5506 401a0f 5505->5506 5507 401a16 lstrcmpiW 5506->5507 5508 401a28 lstrcmpW 5506->5508 5509 401a1c 5507->5509 5508->5509 5132 401000 5133 401037 BeginPaint GetClientRect 5132->5133 5134 40100c DefWindowProcW 5132->5134 5136 4010f3 5133->5136 5137 401179 5134->5137 5138 401073 CreateBrushIndirect FillRect DeleteObject 5136->5138 5139 4010fc 5136->5139 5138->5136 5140 401102 CreateFontIndirectW 5139->5140 5141 401167 EndPaint 5139->5141 5140->5141 5142 401112 6 API calls 5140->5142 5141->5137 5142->5141 5143 401503 5144 40150b 5143->5144 5146 40151e 5143->5146 5145 402c1f 17 API calls 5144->5145 5145->5146 5147 402104 5148 402c41 17 API calls 5147->5148 5149 40210b 5148->5149 5150 402c41 17 API calls 5149->5150 5151 402115 5150->5151 5152 402c41 17 API calls 5151->5152 5153 40211f 5152->5153 5154 402c41 17 API calls 5153->5154 5155 402129 5154->5155 5156 402c41 17 API calls 5155->5156 5158 402133 5156->5158 5157 402172 CoCreateInstance 5162 402191 5157->5162 5158->5157 5159 402c41 17 API calls 5158->5159 5159->5157 5160 401423 24 API calls 5161 402250 5160->5161 5162->5160 5162->5161 5510 402484 5511 402c81 17 API calls 5510->5511 5512 40248e 5511->5512 5513 402c41 17 API calls 5512->5513 5514 402497 5513->5514 5515 4024a2 RegQueryValueExW 5514->5515 5519 40288b 5514->5519 5516 4024c8 RegCloseKey 5515->5516 5517 4024c2 5515->5517 5516->5519 5517->5516 5521 406201 wsprintfW 5517->5521 5521->5516 5163 739116d4 5164 73911703 5163->5164 5165 73911b5f 22 API calls 5164->5165 5166 7391170a 5165->5166 5167 73911711 5166->5167 5168 7391171d 5166->5168 5171 73911272 2 API calls 5167->5171 5169 73911744 5168->5169 5170 73911727 5168->5170 5173 7391174a 5169->5173 5174 7391176e 5169->5174 5172 7391153d 3 API calls 5170->5172 5175 7391171b 5171->5175 5177 7391172c 5172->5177 5178 739115b4 3 API calls 5173->5178 5176 7391153d 3 API calls 5174->5176 5176->5175 5179 739115b4 3 API calls 5177->5179 5180 7391174f 5178->5180 5181 73911732 5179->5181 5182 73911272 2 API calls 5180->5182 5183 73911272 2 API calls 5181->5183 5184 73911755 GlobalFree 5182->5184 5185 73911738 GlobalFree 5183->5185 5184->5175 5186 73911769 GlobalFree 5184->5186 5185->5175 5186->5175 5187 401f06 5188 402c41 17 API calls 5187->5188 5189 401f0c 5188->5189 5190 405322 24 API calls 5189->5190 5191 401f16 5190->5191 5192 4058a3 2 API calls 5191->5192 5193 401f1c 5192->5193 5194 401f3f CloseHandle 5193->5194 5195 406745 5 API calls 5193->5195 5198 40288b 5193->5198 5194->5198 5197 401f31 5195->5197 5197->5194 5200 406201 wsprintfW 5197->5200 5200->5194 5522 73912c57 5523 73912c6f 5522->5523 5524 7391158f 2 API calls 5523->5524 5525 73912c8a 5524->5525 5201 739118d9 5202 739118fc 5201->5202 5203 73911931 GlobalFree 5202->5203 5204 73911943 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5202->5204 5203->5204 5205 73911272 2 API calls 5204->5205 5206 73911ace GlobalFree GlobalFree 5205->5206 4196 401389 4197 401390 4196->4197 4198 4013fe 4197->4198 4199 4013cb MulDiv SendMessageW 4197->4199 4199->4197 5526 73911058 5528 73911074 5526->5528 5527 739110dd 5528->5527 5529 73911516 GlobalFree 5528->5529 5530 73911092 5528->5530 5529->5530 5531 73911516 GlobalFree 5530->5531 5532 739110a2 5531->5532 5533 739110b2 5532->5533 5534 739110a9 GlobalSize 5532->5534 5535 739110b6 GlobalAlloc 5533->5535 5536 739110c7 5533->5536 5534->5533 5537 7391153d 3 API calls 5535->5537 5538 739110d2 GlobalFree 5536->5538 5537->5536 5538->5527 4227 40230c 4228 402314 4227->4228 4230 40231a 4227->4230 4229 402c41 17 API calls 4228->4229 4229->4230 4231 402c41 17 API calls 4230->4231 4233 402328 4230->4233 4231->4233 4232 402336 4235 402c41 17 API calls 4232->4235 4233->4232 4234 402c41 17 API calls 4233->4234 4234->4232 4236 40233f WritePrivateProfileStringW 4235->4236 5207 40190c 5208 401943 5207->5208 5209 402c41 17 API calls 5208->5209 5210 401948 5209->5210 5211 4059cc 67 API calls 5210->5211 5212 401951 5211->5212 5539 401f8c 5540 402c41 17 API calls 5539->5540 5541 401f93 5540->5541 5542 406694 5 API calls 5541->5542 5543 401fa2 5542->5543 5544 401fbe GlobalAlloc 5543->5544 5546 402026 5543->5546 5545 401fd2 5544->5545 5544->5546 5547 406694 5 API calls 5545->5547 5548 401fd9 5547->5548 5549 406694 5 API calls 5548->5549 5550 401fe3 5549->5550 5550->5546 5554 406201 wsprintfW 5550->5554 5552 402018 5555 406201 wsprintfW 5552->5555 5554->5552 5555->5546 4244 40238e 4245 4023c1 4244->4245 4246 402396 4244->4246 4248 402c41 17 API calls 4245->4248 4260 402c81 4246->4260 4250 4023c8 4248->4250 4256 402cff 4250->4256 4251 4023a7 4253 402c41 17 API calls 4251->4253 4254 4023ae RegDeleteValueW RegCloseKey 4253->4254 4255 4023d5 4254->4255 4257 402d13 4256->4257 4258 402d0c 4256->4258 4257->4258 4265 402d44 4257->4265 4258->4255 4261 402c41 17 API calls 4260->4261 4262 402c98 4261->4262 4263 406127 RegOpenKeyExW 4262->4263 4264 40239d 4263->4264 4264->4251 4264->4255 4266 406127 RegOpenKeyExW 4265->4266 4267 402d72 4266->4267 4268 402dec 4267->4268 4272 402d76 4267->4272 4268->4258 4269 402d98 RegEnumKeyW 4270 402daf RegCloseKey 4269->4270 4269->4272 4273 406694 5 API calls 4270->4273 4271 402dd0 RegCloseKey 4271->4268 4272->4269 4272->4270 4272->4271 4274 402d44 6 API calls 4272->4274 4275 402dbf 4273->4275 4274->4272 4276 402de0 RegDeleteKeyW 4275->4276 4277 402dc3 4275->4277 4276->4268 4277->4268 4357 40338f SetErrorMode GetVersion 4358 4033ce 4357->4358 4359 4033d4 4357->4359 4360 406694 5 API calls 4358->4360 4361 406624 3 API calls 4359->4361 4360->4359 4362 4033ea lstrlenA 4361->4362 4362->4359 4363 4033fa 4362->4363 4364 406694 5 API calls 4363->4364 4365 403401 4364->4365 4366 406694 5 API calls 4365->4366 4367 403408 4366->4367 4368 406694 5 API calls 4367->4368 4369 403414 #17 OleInitialize SHGetFileInfoW 4368->4369 4447 4062ba lstrcpynW 4369->4447 4372 403460 GetCommandLineW 4448 4062ba lstrcpynW 4372->4448 4374 403472 4375 405bbc CharNextW 4374->4375 4376 403497 CharNextW 4375->4376 4377 4035c1 GetTempPathW 4376->4377 4388 4034b0 4376->4388 4449 40335e 4377->4449 4379 4035d9 4380 403633 DeleteFileW 4379->4380 4381 4035dd GetWindowsDirectoryW lstrcatW 4379->4381 4459 402edd GetTickCount GetModuleFileNameW 4380->4459 4384 40335e 12 API calls 4381->4384 4382 405bbc CharNextW 4382->4388 4386 4035f9 4384->4386 4385 403647 4387 4036fa 4385->4387 4393 4036ea 4385->4393 4397 405bbc CharNextW 4385->4397 4386->4380 4389 4035fd GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4386->4389 4547 4038d0 4387->4547 4388->4382 4390 4035ac 4388->4390 4392 4035aa 4388->4392 4391 40335e 12 API calls 4389->4391 4544 4062ba lstrcpynW 4390->4544 4395 40362b 4391->4395 4392->4377 4487 4039aa 4393->4487 4395->4380 4395->4387 4414 403666 4397->4414 4400 403834 4402 4038b8 ExitProcess 4400->4402 4403 40383c GetCurrentProcess OpenProcessToken 4400->4403 4401 403714 4404 405920 MessageBoxIndirectW 4401->4404 4405 403854 LookupPrivilegeValueW AdjustTokenPrivileges 4403->4405 4406 403888 4403->4406 4410 403722 ExitProcess 4404->4410 4405->4406 4413 406694 5 API calls 4406->4413 4408 4036c4 4411 405c97 18 API calls 4408->4411 4409 40372a 4412 40588b 5 API calls 4409->4412 4415 4036d0 4411->4415 4416 40372f lstrcatW 4412->4416 4417 40388f 4413->4417 4414->4408 4414->4409 4415->4387 4545 4062ba lstrcpynW 4415->4545 4418 403740 lstrcatW 4416->4418 4419 40374b lstrcatW lstrcmpiW 4416->4419 4420 4038a4 ExitWindowsEx 4417->4420 4423 4038b1 4417->4423 4418->4419 4419->4387 4422 403767 4419->4422 4420->4402 4420->4423 4425 403773 4422->4425 4426 40376c 4422->4426 4559 40140b 4423->4559 4424 4036df 4546 4062ba lstrcpynW 4424->4546 4430 40586e 2 API calls 4425->4430 4429 4057f1 4 API calls 4426->4429 4431 403771 4429->4431 4432 403778 SetCurrentDirectoryW 4430->4432 4431->4432 4433 403793 4432->4433 4434 403788 4432->4434 4555 4062ba lstrcpynW 4433->4555 4554 4062ba lstrcpynW 4434->4554 4437 4062dc 17 API calls 4438 4037d2 DeleteFileW 4437->4438 4439 4037df CopyFileW 4438->4439 4444 4037a1 4438->4444 4439->4444 4440 403828 4442 406080 36 API calls 4440->4442 4441 406080 36 API calls 4441->4444 4442->4387 4443 4062dc 17 API calls 4443->4444 4444->4437 4444->4440 4444->4441 4444->4443 4446 403813 CloseHandle 4444->4446 4556 4058a3 CreateProcessW 4444->4556 4446->4444 4447->4372 4448->4374 4450 40654e 5 API calls 4449->4450 4452 40336a 4450->4452 4451 403374 4451->4379 4452->4451 4453 405b8f 3 API calls 4452->4453 4454 40337c 4453->4454 4455 40586e 2 API calls 4454->4455 4456 403382 4455->4456 4562 405ddf 4456->4562 4566 405db0 GetFileAttributesW CreateFileW 4459->4566 4461 402f1d 4481 402f2d 4461->4481 4567 4062ba lstrcpynW 4461->4567 4463 402f43 4464 405bdb 2 API calls 4463->4464 4465 402f49 4464->4465 4568 4062ba lstrcpynW 4465->4568 4467 402f54 GetFileSize 4468 403050 4467->4468 4486 402f6b 4467->4486 4569 402e79 4468->4569 4470 403059 4472 403089 GlobalAlloc 4470->4472 4470->4481 4581 403347 SetFilePointer 4470->4581 4471 403331 ReadFile 4471->4486 4580 403347 SetFilePointer 4472->4580 4474 4030bc 4478 402e79 6 API calls 4474->4478 4476 403072 4479 403331 ReadFile 4476->4479 4477 4030a4 4480 403116 31 API calls 4477->4480 4478->4481 4482 40307d 4479->4482 4484 4030b0 4480->4484 4481->4385 4482->4472 4482->4481 4483 402e79 6 API calls 4483->4486 4484->4481 4484->4484 4485 4030ed SetFilePointer 4484->4485 4485->4481 4486->4468 4486->4471 4486->4474 4486->4481 4486->4483 4488 406694 5 API calls 4487->4488 4489 4039be 4488->4489 4490 4039c4 4489->4490 4491 4039d6 4489->4491 4594 406201 wsprintfW 4490->4594 4492 406188 3 API calls 4491->4492 4493 403a06 4492->4493 4495 403a25 lstrcatW 4493->4495 4496 406188 3 API calls 4493->4496 4497 4039d4 4495->4497 4496->4495 4586 403c80 4497->4586 4500 405c97 18 API calls 4501 403a57 4500->4501 4502 403aeb 4501->4502 4504 406188 3 API calls 4501->4504 4503 405c97 18 API calls 4502->4503 4505 403af1 4503->4505 4506 403a89 4504->4506 4507 403b01 LoadImageW 4505->4507 4508 4062dc 17 API calls 4505->4508 4506->4502 4514 403aaa lstrlenW 4506->4514 4518 405bbc CharNextW 4506->4518 4509 403ba7 4507->4509 4510 403b28 RegisterClassW 4507->4510 4508->4507 4513 40140b 2 API calls 4509->4513 4511 403bb1 4510->4511 4512 403b5e SystemParametersInfoW CreateWindowExW 4510->4512 4511->4387 4512->4509 4517 403bad 4513->4517 4515 403ab8 lstrcmpiW 4514->4515 4516 403ade 4514->4516 4515->4516 4519 403ac8 GetFileAttributesW 4515->4519 4520 405b8f 3 API calls 4516->4520 4517->4511 4523 403c80 18 API calls 4517->4523 4521 403aa7 4518->4521 4522 403ad4 4519->4522 4524 403ae4 4520->4524 4521->4514 4522->4516 4525 405bdb 2 API calls 4522->4525 4526 403bbe 4523->4526 4595 4062ba lstrcpynW 4524->4595 4525->4516 4528 403bca ShowWindow 4526->4528 4529 403c4d 4526->4529 4531 406624 3 API calls 4528->4531 4596 4053f5 OleInitialize 4529->4596 4533 403be2 4531->4533 4532 403c53 4534 403c57 4532->4534 4535 403c6f 4532->4535 4536 403bf0 GetClassInfoW 4533->4536 4538 406624 3 API calls 4533->4538 4534->4511 4542 40140b 2 API calls 4534->4542 4537 40140b 2 API calls 4535->4537 4539 403c04 GetClassInfoW RegisterClassW 4536->4539 4540 403c1a DialogBoxParamW 4536->4540 4537->4511 4538->4536 4539->4540 4541 40140b 2 API calls 4540->4541 4543 403c42 4541->4543 4542->4511 4543->4511 4544->4392 4545->4424 4546->4393 4548 4038e8 4547->4548 4549 4038da CloseHandle 4547->4549 4614 403915 4548->4614 4549->4548 4552 4059cc 67 API calls 4553 403703 OleUninitialize 4552->4553 4553->4400 4553->4401 4554->4433 4555->4444 4557 4058e2 4556->4557 4558 4058d6 CloseHandle 4556->4558 4557->4444 4558->4557 4560 401389 2 API calls 4559->4560 4561 401420 4560->4561 4561->4402 4563 405dec GetTickCount GetTempFileNameW 4562->4563 4564 405e22 4563->4564 4565 40338d 4563->4565 4564->4563 4564->4565 4565->4379 4566->4461 4567->4463 4568->4467 4570 402e82 4569->4570 4571 402e9a 4569->4571 4572 402e92 4570->4572 4573 402e8b DestroyWindow 4570->4573 4574 402ea2 4571->4574 4575 402eaa GetTickCount 4571->4575 4572->4470 4573->4572 4582 4066d0 4574->4582 4577 402eb8 CreateDialogParamW ShowWindow 4575->4577 4578 402edb 4575->4578 4577->4578 4578->4470 4580->4477 4581->4476 4583 4066ed PeekMessageW 4582->4583 4584 4066e3 DispatchMessageW 4583->4584 4585 402ea8 4583->4585 4584->4583 4585->4470 4587 403c94 4586->4587 4603 406201 wsprintfW 4587->4603 4589 403d05 4604 403d39 4589->4604 4591 403a35 4591->4500 4592 403d0a 4592->4591 4593 4062dc 17 API calls 4592->4593 4593->4592 4594->4497 4595->4502 4607 40427d 4596->4607 4598 405418 4602 40543f 4598->4602 4610 401389 4598->4610 4599 40427d SendMessageW 4600 405451 OleUninitialize 4599->4600 4600->4532 4602->4599 4603->4589 4605 4062dc 17 API calls 4604->4605 4606 403d47 SetWindowTextW 4605->4606 4606->4592 4608 404295 4607->4608 4609 404286 SendMessageW 4607->4609 4608->4598 4609->4608 4611 401390 4610->4611 4612 4013fe 4611->4612 4613 4013cb MulDiv SendMessageW 4611->4613 4612->4598 4613->4611 4615 403923 4614->4615 4616 4038ed 4615->4616 4617 403928 FreeLibrary GlobalFree 4615->4617 4616->4552 4617->4616 4617->4617 5213 40190f 5214 402c41 17 API calls 5213->5214 5215 401916 5214->5215 5216 405920 MessageBoxIndirectW 5215->5216 5217 40191f 5216->5217 5556 401491 5557 405322 24 API calls 5556->5557 5558 401498 5557->5558 5218 401d14 5219 402c1f 17 API calls 5218->5219 5220 401d1b 5219->5220 5221 402c1f 17 API calls 5220->5221 5222 401d27 GetDlgItem 5221->5222 5223 402592 5222->5223 5559 405296 5560 4052a6 5559->5560 5561 4052ba 5559->5561 5562 4052ac 5560->5562 5571 405303 5560->5571 5563 4052c2 IsWindowVisible 5561->5563 5567 4052d9 5561->5567 5565 40427d SendMessageW 5562->5565 5566 4052cf 5563->5566 5563->5571 5564 405308 CallWindowProcW 5568 4052b6 5564->5568 5565->5568 5572 404bec SendMessageW 5566->5572 5567->5564 5577 404c6c 5567->5577 5571->5564 5573 404c4b SendMessageW 5572->5573 5574 404c0f GetMessagePos ScreenToClient SendMessageW 5572->5574 5576 404c43 5573->5576 5575 404c48 5574->5575 5574->5576 5575->5573 5576->5567 5586 4062ba lstrcpynW 5577->5586 5579 404c7f 5587 406201 wsprintfW 5579->5587 5581 404c89 5582 40140b 2 API calls 5581->5582 5583 404c92 5582->5583 5588 4062ba lstrcpynW 5583->5588 5585 404c99 5585->5571 5586->5579 5587->5581 5588->5585 5589 402598 5590 4025c7 5589->5590 5591 4025ac 5589->5591 5592 4025fb 5590->5592 5593 4025cc 5590->5593 5594 402c1f 17 API calls 5591->5594 5596 402c41 17 API calls 5592->5596 5595 402c41 17 API calls 5593->5595 5600 4025b3 5594->5600 5597 4025d3 WideCharToMultiByte lstrlenA 5595->5597 5598 402602 lstrlenW 5596->5598 5597->5600 5598->5600 5599 402645 5600->5599 5602 405e91 5 API calls 5600->5602 5603 40262f 5600->5603 5601 405e62 WriteFile 5601->5599 5602->5603 5603->5599 5603->5601 5604 404c9e GetDlgItem GetDlgItem 5605 404cf0 7 API calls 5604->5605 5612 404f09 5604->5612 5606 404d93 DeleteObject 5605->5606 5607 404d86 SendMessageW 5605->5607 5608 404d9c 5606->5608 5607->5606 5610 404dd3 5608->5610 5611 4062dc 17 API calls 5608->5611 5609 404fed 5614 405099 5609->5614 5615 404efc 5609->5615 5620 405046 SendMessageW 5609->5620 5613 404231 18 API calls 5610->5613 5616 404db5 SendMessageW SendMessageW 5611->5616 5612->5609 5623 404bec 5 API calls 5612->5623 5636 404f7a 5612->5636 5619 404de7 5613->5619 5617 4050a3 SendMessageW 5614->5617 5618 4050ab 5614->5618 5621 404298 8 API calls 5615->5621 5616->5608 5617->5618 5628 4050c4 5618->5628 5629 4050bd ImageList_Destroy 5618->5629 5633 4050d4 5618->5633 5624 404231 18 API calls 5619->5624 5620->5615 5626 40505b SendMessageW 5620->5626 5627 40528f 5621->5627 5622 404fdf SendMessageW 5622->5609 5623->5636 5637 404df5 5624->5637 5625 405243 5625->5615 5634 405255 ShowWindow GetDlgItem ShowWindow 5625->5634 5631 40506e 5626->5631 5632 4050cd GlobalFree 5628->5632 5628->5633 5629->5628 5630 404eca GetWindowLongW SetWindowLongW 5635 404ee3 5630->5635 5641 40507f SendMessageW 5631->5641 5632->5633 5633->5625 5647 404c6c 4 API calls 5633->5647 5651 40510f 5633->5651 5634->5615 5638 404f01 5635->5638 5639 404ee9 ShowWindow 5635->5639 5636->5609 5636->5622 5637->5630 5640 404e45 SendMessageW 5637->5640 5642 404ec4 5637->5642 5645 404e81 SendMessageW 5637->5645 5646 404e92 SendMessageW 5637->5646 5656 404266 SendMessageW 5638->5656 5655 404266 SendMessageW 5639->5655 5640->5637 5641->5614 5642->5630 5642->5635 5645->5637 5646->5637 5647->5651 5648 405219 InvalidateRect 5648->5625 5649 40522f 5648->5649 5652 404ba7 20 API calls 5649->5652 5650 40513d SendMessageW 5654 405153 5650->5654 5651->5650 5651->5654 5652->5625 5653 4051c7 SendMessageW SendMessageW 5653->5654 5654->5648 5654->5653 5655->5615 5656->5612 5657 40149e 5658 4022f7 5657->5658 5659 4014ac PostQuitMessage 5657->5659 5659->5658 5224 401c1f 5225 402c1f 17 API calls 5224->5225 5226 401c26 5225->5226 5227 402c1f 17 API calls 5226->5227 5228 401c33 5227->5228 5229 402c41 17 API calls 5228->5229 5233 401c48 5228->5233 5229->5233 5230 402c41 17 API calls 5234 401c58 5230->5234 5231 401c63 5235 402c1f 17 API calls 5231->5235 5232 401caf 5236 402c41 17 API calls 5232->5236 5233->5230 5233->5234 5234->5231 5234->5232 5237 401c68 5235->5237 5238 401cb4 5236->5238 5239 402c1f 17 API calls 5237->5239 5240 402c41 17 API calls 5238->5240 5241 401c74 5239->5241 5242 401cbd FindWindowExW 5240->5242 5243 401c81 SendMessageTimeoutW 5241->5243 5244 401c9f SendMessageW 5241->5244 5245 401cdf 5242->5245 5243->5245 5244->5245 5660 402aa0 SendMessageW 5661 402ac5 5660->5661 5662 402aba InvalidateRect 5660->5662 5662->5661 5246 402821 5247 402827 5246->5247 5248 402ac5 5247->5248 5249 40282f FindClose 5247->5249 5249->5248 5663 4043a1 lstrlenW 5664 4043c0 5663->5664 5665 4043c2 WideCharToMultiByte 5663->5665 5664->5665 5250 404722 5251 40474e 5250->5251 5252 40475f 5250->5252 5311 405904 GetDlgItemTextW 5251->5311 5253 40476b GetDlgItem 5252->5253 5258 4047ca 5252->5258 5255 40477f 5253->5255 5260 404793 SetWindowTextW 5255->5260 5263 405c3a 4 API calls 5255->5263 5256 4048ae 5309 404a5d 5256->5309 5313 405904 GetDlgItemTextW 5256->5313 5257 404759 5259 40654e 5 API calls 5257->5259 5258->5256 5265 4062dc 17 API calls 5258->5265 5258->5309 5259->5252 5264 404231 18 API calls 5260->5264 5262 404298 8 API calls 5267 404a71 5262->5267 5268 404789 5263->5268 5269 4047af 5264->5269 5270 40483e SHBrowseForFolderW 5265->5270 5266 4048de 5271 405c97 18 API calls 5266->5271 5268->5260 5275 405b8f 3 API calls 5268->5275 5272 404231 18 API calls 5269->5272 5270->5256 5273 404856 CoTaskMemFree 5270->5273 5274 4048e4 5271->5274 5276 4047bd 5272->5276 5277 405b8f 3 API calls 5273->5277 5314 4062ba lstrcpynW 5274->5314 5275->5260 5312 404266 SendMessageW 5276->5312 5279 404863 5277->5279 5283 40489a SetDlgItemTextW 5279->5283 5286 4062dc 17 API calls 5279->5286 5281 4048fb 5285 406694 5 API calls 5281->5285 5282 4047c3 5284 406694 5 API calls 5282->5284 5283->5256 5284->5258 5292 404902 5285->5292 5287 404882 lstrcmpiW 5286->5287 5287->5283 5289 404893 lstrcatW 5287->5289 5288 404943 5315 4062ba lstrcpynW 5288->5315 5289->5283 5291 40494a 5293 405c3a 4 API calls 5291->5293 5292->5288 5297 405bdb 2 API calls 5292->5297 5298 40499b 5292->5298 5294 404950 GetDiskFreeSpaceW 5293->5294 5296 404974 MulDiv 5294->5296 5294->5298 5296->5298 5297->5292 5299 404a0c 5298->5299 5316 404ba7 5298->5316 5300 404a2f 5299->5300 5303 40140b 2 API calls 5299->5303 5327 404253 EnableWindow 5300->5327 5303->5300 5304 404a0e SetDlgItemTextW 5304->5299 5305 4049fe 5319 404ade 5305->5319 5308 404a4b 5308->5309 5328 40467b 5308->5328 5309->5262 5311->5257 5312->5282 5313->5266 5314->5281 5315->5291 5317 404ade 20 API calls 5316->5317 5318 4049f9 5317->5318 5318->5304 5318->5305 5320 404af7 5319->5320 5321 4062dc 17 API calls 5320->5321 5322 404b5b 5321->5322 5323 4062dc 17 API calls 5322->5323 5324 404b66 5323->5324 5325 4062dc 17 API calls 5324->5325 5326 404b7c lstrlenW wsprintfW SetDlgItemTextW 5325->5326 5326->5299 5327->5308 5329 404689 5328->5329 5330 40468e SendMessageW 5328->5330 5329->5330 5330->5309 4192 4015a3 4193 402c41 17 API calls 4192->4193 4194 4015aa SetFileAttributesW 4193->4194 4195 4015bc 4194->4195 5331 739122fd 5332 73912367 5331->5332 5333 73912372 GlobalAlloc 5332->5333 5334 73912391 5332->5334 5333->5332 5666 4028ad 5667 402c41 17 API calls 5666->5667 5669 4028bb 5667->5669 5668 4028d1 5671 405d8b 2 API calls 5668->5671 5669->5668 5670 402c41 17 API calls 5669->5670 5670->5668 5672 4028d7 5671->5672 5694 405db0 GetFileAttributesW CreateFileW 5672->5694 5674 4028e4 5675 4028f0 GlobalAlloc 5674->5675 5676 402987 5674->5676 5677 402909 5675->5677 5678 40297e CloseHandle 5675->5678 5679 4029a2 5676->5679 5680 40298f DeleteFileW 5676->5680 5695 403347 SetFilePointer 5677->5695 5678->5676 5680->5679 5682 40290f 5683 403331 ReadFile 5682->5683 5684 402918 GlobalAlloc 5683->5684 5685 402928 5684->5685 5686 40295c 5684->5686 5687 403116 31 API calls 5685->5687 5688 405e62 WriteFile 5686->5688 5693 402935 5687->5693 5689 402968 GlobalFree 5688->5689 5690 403116 31 API calls 5689->5690 5692 40297b 5690->5692 5691 402953 GlobalFree 5691->5686 5692->5678 5693->5691 5694->5674 5695->5682 5335 401a30 5336 402c41 17 API calls 5335->5336 5337 401a39 ExpandEnvironmentStringsW 5336->5337 5338 401a4d 5337->5338 5340 401a60 5337->5340 5339 401a52 lstrcmpW 5338->5339 5338->5340 5339->5340 5341 739110e1 5350 73911111 5341->5350 5342 739111d8 GlobalFree 5343 739112ba 2 API calls 5343->5350 5344 739111d3 5344->5342 5345 739111f8 GlobalFree 5345->5350 5346 73911272 2 API calls 5349 739111c4 GlobalFree 5346->5349 5347 73911164 GlobalAlloc 5347->5350 5348 739112e1 lstrcpyW 5348->5350 5349->5350 5350->5342 5350->5343 5350->5344 5350->5345 5350->5346 5350->5347 5350->5348 5350->5349 4618 402032 4619 402044 4618->4619 4620 4020f6 4618->4620 4621 402c41 17 API calls 4619->4621 4623 401423 24 API calls 4620->4623 4622 40204b 4621->4622 4624 402c41 17 API calls 4622->4624 4629 402250 4623->4629 4625 402054 4624->4625 4626 40206a LoadLibraryExW 4625->4626 4627 40205c GetModuleHandleW 4625->4627 4626->4620 4628 40207b 4626->4628 4627->4626 4627->4628 4641 406703 WideCharToMultiByte 4628->4641 4632 4020c5 4634 405322 24 API calls 4632->4634 4633 40208c 4635 402094 4633->4635 4636 4020ab 4633->4636 4637 40209c 4634->4637 4638 401423 24 API calls 4635->4638 4644 73911777 4636->4644 4637->4629 4639 4020e8 FreeLibrary 4637->4639 4638->4637 4639->4629 4642 40672d GetProcAddress 4641->4642 4643 402086 4641->4643 4642->4643 4643->4632 4643->4633 4645 739117aa 4644->4645 4686 73911b5f 4645->4686 4647 739117b1 4648 739118d6 4647->4648 4649 739117c2 4647->4649 4650 739117c9 4647->4650 4648->4637 4736 73912352 4649->4736 4720 73912394 4650->4720 4655 7391182d 4661 73911833 4655->4661 4662 7391187e 4655->4662 4656 7391180f 4749 73912569 4656->4749 4657 739117f8 4671 739117ee 4657->4671 4746 73912d37 4657->4746 4658 739117df 4660 739117e5 4658->4660 4666 739117f0 4658->4666 4660->4671 4730 73912aac 4660->4730 4768 739115c6 4661->4768 4664 73912569 10 API calls 4662->4664 4669 7391186f 4664->4669 4665 73911815 4760 739115b4 4665->4760 4740 73912724 4666->4740 4685 739118c5 4669->4685 4774 7391252c 4669->4774 4671->4655 4671->4656 4674 73912569 10 API calls 4674->4669 4676 739117f6 4676->4671 4678 739118cf GlobalFree 4678->4648 4681 739118b1 4681->4685 4778 7391153d wsprintfW 4681->4778 4683 739118aa FreeLibrary 4683->4681 4685->4648 4685->4678 4781 7391121b GlobalAlloc 4686->4781 4688 73911b83 4782 7391121b GlobalAlloc 4688->4782 4690 73911da9 GlobalFree GlobalFree GlobalFree 4691 73911dc6 4690->4691 4706 73911e10 4690->4706 4692 73912192 4691->4692 4700 73911ddb 4691->4700 4691->4706 4694 739121b4 GetModuleHandleW 4692->4694 4692->4706 4693 73911c64 GlobalAlloc 4712 73911b8e 4693->4712 4697 739121c5 LoadLibraryW 4694->4697 4698 739121da 4694->4698 4695 73911caf lstrcpyW 4699 73911cb9 lstrcpyW 4695->4699 4696 73911ccd GlobalFree 4696->4712 4697->4698 4697->4706 4789 7391161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4698->4789 4699->4712 4700->4706 4785 7391122c 4700->4785 4702 7391222c 4704 73912239 lstrlenW 4702->4704 4702->4706 4790 7391161d WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4704->4790 4705 73912064 4788 7391121b GlobalAlloc 4705->4788 4706->4647 4707 739121ec 4707->4702 4718 73912216 GetProcAddress 4707->4718 4709 739120ec 4709->4706 4715 73912134 lstrcpyW 4709->4715 4711 73912253 4711->4706 4712->4690 4712->4693 4712->4695 4712->4696 4712->4699 4712->4705 4712->4706 4712->4709 4713 73911d0b 4712->4713 4714 73911fa5 GlobalFree 4712->4714 4716 7391122c 2 API calls 4712->4716 4713->4712 4783 7391158f GlobalSize GlobalAlloc 4713->4783 4714->4712 4715->4706 4716->4712 4718->4702 4719 7391206d 4719->4647 4728 739123ac 4720->4728 4721 7391122c GlobalAlloc lstrcpynW 4721->4728 4723 739124d5 GlobalFree 4726 739117cf 4723->4726 4723->4728 4724 73912454 GlobalAlloc WideCharToMultiByte 4724->4723 4725 7391247f GlobalAlloc CLSIDFromString 4725->4723 4726->4657 4726->4658 4726->4671 4727 7391249e 4727->4723 4796 739126b8 4727->4796 4728->4721 4728->4723 4728->4724 4728->4725 4728->4727 4792 739112ba 4728->4792 4732 73912abe 4730->4732 4731 73912b63 EnumWindows 4735 73912b81 4731->4735 4732->4731 4734 73912c4d 4734->4671 4799 73912a56 4735->4799 4737 73912367 4736->4737 4738 73912372 GlobalAlloc 4737->4738 4739 739117c8 4737->4739 4738->4737 4739->4650 4744 73912754 4740->4744 4741 73912802 4743 73912808 GlobalSize 4741->4743 4745 73912812 4741->4745 4742 739127ef GlobalAlloc 4742->4745 4743->4745 4744->4741 4744->4742 4745->4676 4747 73912d42 4746->4747 4748 73912d82 GlobalFree 4747->4748 4803 7391121b GlobalAlloc 4749->4803 4751 739125ec MultiByteToWideChar 4755 73912573 4751->4755 4752 7391261f lstrcpynW 4752->4755 4753 7391260e StringFromGUID2 4753->4755 4754 73912656 GlobalFree 4754->4755 4755->4751 4755->4752 4755->4753 4755->4754 4756 73912632 wsprintfW 4755->4756 4757 7391268b GlobalFree 4755->4757 4758 73911272 2 API calls 4755->4758 4804 739112e1 4755->4804 4756->4755 4757->4665 4758->4755 4808 7391121b GlobalAlloc 4760->4808 4762 739115b9 4763 739115c6 2 API calls 4762->4763 4764 739115c3 4763->4764 4765 73911272 4764->4765 4766 739112b5 GlobalFree 4765->4766 4767 7391127b GlobalAlloc lstrcpynW 4765->4767 4766->4669 4767->4766 4769 739115d2 wsprintfW 4768->4769 4770 739115ff lstrcpyW 4768->4770 4773 73911618 4769->4773 4770->4773 4773->4674 4775 73911891 4774->4775 4776 7391253a 4774->4776 4775->4681 4775->4683 4776->4775 4777 73912556 GlobalFree 4776->4777 4777->4776 4779 73911272 2 API calls 4778->4779 4780 7391155e 4779->4780 4780->4685 4781->4688 4782->4712 4784 739115ad 4783->4784 4784->4713 4791 7391121b GlobalAlloc 4785->4791 4787 7391123b lstrcpynW 4787->4706 4788->4719 4789->4707 4790->4711 4791->4787 4793 739112c1 4792->4793 4794 7391122c 2 API calls 4793->4794 4795 739112df 4794->4795 4795->4728 4797 739126c6 VirtualAlloc 4796->4797 4798 7391271c 4796->4798 4797->4798 4798->4727 4800 73912a61 4799->4800 4801 73912a71 4800->4801 4802 73912a66 GetLastError 4800->4802 4801->4734 4802->4801 4803->4755 4805 739112ea 4804->4805 4806 7391130c 4804->4806 4805->4806 4807 739112f0 lstrcpyW 4805->4807 4806->4755 4807->4806 4808->4762 5351 402a35 5352 402c1f 17 API calls 5351->5352 5353 402a3b 5352->5353 5354 402a72 5353->5354 5355 40288b 5353->5355 5357 402a4d 5353->5357 5354->5355 5356 4062dc 17 API calls 5354->5356 5356->5355 5357->5355 5359 406201 wsprintfW 5357->5359 5359->5355 5360 401735 5361 402c41 17 API calls 5360->5361 5362 40173c SearchPathW 5361->5362 5363 401757 5362->5363 5364 4029e6 5362->5364 5363->5364 5366 4062ba lstrcpynW 5363->5366 5366->5364 5701 4014b8 5702 4014be 5701->5702 5703 401389 2 API calls 5702->5703 5704 4014c6 5703->5704 5705 401db9 GetDC 5706 402c1f 17 API calls 5705->5706 5707 401dcb GetDeviceCaps MulDiv ReleaseDC 5706->5707 5708 402c1f 17 API calls 5707->5708 5709 401dfc 5708->5709 5710 4062dc 17 API calls 5709->5710 5711 401e39 CreateFontIndirectW 5710->5711 5712 402592 5711->5712 5367 40283b 5368 402843 5367->5368 5369 402847 FindNextFileW 5368->5369 5370 402859 5368->5370 5369->5370 5371 4029e6 5370->5371 5373 4062ba lstrcpynW 5370->5373 5373->5371 5713 7391166d 5714 73911516 GlobalFree 5713->5714 5716 73911685 5714->5716 5715 739116cb GlobalFree 5716->5715 5717 739116a0 5716->5717 5718 739116b7 VirtualFree 5716->5718 5717->5715 5718->5715

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 40338f-4033cc SetErrorMode GetVersion 1 4033ce-4033d6 call 406694 0->1 2 4033df 0->2 1->2 7 4033d8 1->7 4 4033e4-4033f8 call 406624 lstrlenA 2->4 9 4033fa-403416 call 406694 * 3 4->9 7->2 16 403427-403486 #17 OleInitialize SHGetFileInfoW call 4062ba GetCommandLineW call 4062ba 9->16 17 403418-40341e 9->17 24 403490-4034aa call 405bbc CharNextW 16->24 25 403488-40348f 16->25 17->16 21 403420 17->21 21->16 28 4034b0-4034b6 24->28 29 4035c1-4035db GetTempPathW call 40335e 24->29 25->24 30 4034b8-4034bd 28->30 31 4034bf-4034c3 28->31 38 403633-40364d DeleteFileW call 402edd 29->38 39 4035dd-4035fb GetWindowsDirectoryW lstrcatW call 40335e 29->39 30->30 30->31 33 4034c5-4034c9 31->33 34 4034ca-4034ce 31->34 33->34 36 4034d4-4034da 34->36 37 40358d-40359a call 405bbc 34->37 42 4034f5-40352e 36->42 43 4034dc-4034e4 36->43 52 40359c-40359d 37->52 53 40359e-4035a4 37->53 54 403653-403659 38->54 55 4036fe-40370e call 4038d0 OleUninitialize 38->55 39->38 58 4035fd-40362d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40335e 39->58 49 403530-403535 42->49 50 40354b-403585 42->50 47 4034e6-4034e9 43->47 48 4034eb 43->48 47->42 47->48 48->42 49->50 56 403537-40353f 49->56 50->37 57 403587-40358b 50->57 52->53 53->28 61 4035aa 53->61 62 4036ee-4036f5 call 4039aa 54->62 63 40365f-40366a call 405bbc 54->63 75 403834-40383a 55->75 76 403714-403724 call 405920 ExitProcess 55->76 65 403541-403544 56->65 66 403546 56->66 57->37 59 4035ac-4035ba call 4062ba 57->59 58->38 58->55 68 4035bf 59->68 61->68 74 4036fa 62->74 79 4036b8-4036c2 63->79 80 40366c-4036a1 63->80 65->50 65->66 66->50 68->29 74->55 77 4038b8-4038c0 75->77 78 40383c-403852 GetCurrentProcess OpenProcessToken 75->78 85 4038c2 77->85 86 4038c6-4038ca ExitProcess 77->86 82 403854-403882 LookupPrivilegeValueW AdjustTokenPrivileges 78->82 83 403888-403896 call 406694 78->83 87 4036c4-4036d2 call 405c97 79->87 88 40372a-40373e call 40588b lstrcatW 79->88 84 4036a3-4036a7 80->84 82->83 102 4038a4-4038af ExitWindowsEx 83->102 103 403898-4038a2 83->103 93 4036b0-4036b4 84->93 94 4036a9-4036ae 84->94 85->86 87->55 99 4036d4-4036ea call 4062ba * 2 87->99 100 403740-403746 lstrcatW 88->100 101 40374b-403765 lstrcatW lstrcmpiW 88->101 93->84 98 4036b6 93->98 94->93 94->98 98->79 99->62 100->101 101->55 105 403767-40376a 101->105 102->77 106 4038b1-4038b3 call 40140b 102->106 103->102 103->106 108 403773 call 40586e 105->108 109 40376c-403771 call 4057f1 105->109 106->77 117 403778-403786 SetCurrentDirectoryW 108->117 109->117 118 403793-4037bc call 4062ba 117->118 119 403788-40378e call 4062ba 117->119 123 4037c1-4037dd call 4062dc DeleteFileW 118->123 119->118 126 40381e-403826 123->126 127 4037df-4037ef CopyFileW 123->127 126->123 129 403828-40382f call 406080 126->129 127->126 128 4037f1-403811 call 406080 call 4062dc call 4058a3 127->128 128->126 138 403813-40381a CloseHandle 128->138 129->55 138->126
                            APIs
                            • SetErrorMode.KERNELBASE ref: 004033B2
                            • GetVersion.KERNEL32 ref: 004033B8
                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004033EB
                            • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403428
                            • OleInitialize.OLE32(00000000), ref: 0040342F
                            • SHGetFileInfoW.SHELL32(0042B208,00000000,?,000002B4,00000000), ref: 0040344B
                            • GetCommandLineW.KERNEL32(00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 00403460
                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000020,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000,?,00000006,00000008,0000000A), ref: 00403498
                              • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                              • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004035D2
                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004035E3
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004035EF
                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403603
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040360B
                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040361C
                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403624
                            • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403638
                              • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                            • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 00403703
                            • ExitProcess.KERNEL32 ref: 00403724
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403737
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403746
                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403751
                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040375D
                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403779
                            • DeleteFileW.KERNEL32(0042AA08,0042AA08,?,user32::EnumWindows(i r1 ,i 0),00000008,?,00000006,00000008,0000000A), ref: 004037D3
                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,0042AA08,00000001,?,00000006,00000008,0000000A), ref: 004037E7
                            • CloseHandle.KERNEL32(00000000,0042AA08,0042AA08,?,0042AA08,00000000,?,00000006,00000008,0000000A), ref: 00403814
                            • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 00403843
                            • OpenProcessToken.ADVAPI32(00000000), ref: 0040384A
                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040385F
                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403882
                            • ExitWindowsEx.USER32(00000002,80040002), ref: 004038A7
                            • ExitProcess.KERNEL32 ref: 004038CA
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: lstrcat$FileProcess$Exit$CurrentDeleteDirectoryEnvironmentHandlePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeModuleNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                            • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu
                            • API String ID: 3441113951-1266176814
                            • Opcode ID: c69f0a08dcb2e1d024cd1a682ba050e32cb95b0861efa09548cea5cd73a41d6c
                            • Instruction ID: 34b402965a056e7880f406cddf034ee68ffb155d70387f36a3cc73b0da0a8952
                            • Opcode Fuzzy Hash: c69f0a08dcb2e1d024cd1a682ba050e32cb95b0861efa09548cea5cd73a41d6c
                            • Instruction Fuzzy Hash: FBD11571500310ABE720BF659D45B2B3AACEB4074AF10447FF881B62E1DBBD9E45876E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 343 4059cc-4059f2 call 405c97 346 4059f4-405a06 DeleteFileW 343->346 347 405a0b-405a12 343->347 348 405b88-405b8c 346->348 349 405a14-405a16 347->349 350 405a25-405a35 call 4062ba 347->350 351 405b36-405b3b 349->351 352 405a1c-405a1f 349->352 356 405a44-405a45 call 405bdb 350->356 357 405a37-405a42 lstrcatW 350->357 351->348 354 405b3d-405b40 351->354 352->350 352->351 358 405b42-405b48 354->358 359 405b4a-405b52 call 4065fd 354->359 360 405a4a-405a4e 356->360 357->360 358->348 359->348 367 405b54-405b68 call 405b8f call 405984 359->367 363 405a50-405a58 360->363 364 405a5a-405a60 lstrcatW 360->364 363->364 366 405a65-405a81 lstrlenW FindFirstFileW 363->366 364->366 368 405a87-405a8f 366->368 369 405b2b-405b2f 366->369 383 405b80-405b83 call 405322 367->383 384 405b6a-405b6d 367->384 372 405a91-405a99 368->372 373 405aaf-405ac3 call 4062ba 368->373 369->351 371 405b31 369->371 371->351 375 405a9b-405aa3 372->375 376 405b0e-405b1e FindNextFileW 372->376 385 405ac5-405acd 373->385 386 405ada-405ae5 call 405984 373->386 375->373 379 405aa5-405aad 375->379 376->368 382 405b24-405b25 FindClose 376->382 379->373 379->376 382->369 383->348 384->358 389 405b6f-405b7e call 405322 call 406080 384->389 385->376 390 405acf-405ad8 call 4059cc 385->390 396 405b06-405b09 call 405322 386->396 397 405ae7-405aea 386->397 389->348 390->376 396->376 399 405aec-405afc call 405322 call 406080 397->399 400 405afe-405b04 397->400 399->376 400->376
                            APIs
                            • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 004059F5
                            • lstrcatW.KERNEL32(0042F250,\*.*,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A3D
                            • lstrcatW.KERNEL32(?,0040A014,?,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A60
                            • lstrlenW.KERNEL32(?,?,0040A014,?,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A66
                            • FindFirstFileW.KERNEL32(0042F250,?,?,?,0040A014,?,0042F250,?,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405A76
                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B16
                            • FindClose.KERNEL32(00000000), ref: 00405B25
                            Strings
                            • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 004059CC
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004059DA
                            • \*.*, xrefs: 00405A37
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                            • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                            • API String ID: 2035342205-776621379
                            • Opcode ID: b938c9d9068cedab339b19568100d2823c17cca8f6ff83e158d789dc8ab7bbfb
                            • Instruction ID: 87b7c1c15068e6398432f2de95375e915c3ae258b511550e47b187391169d043
                            • Opcode Fuzzy Hash: b938c9d9068cedab339b19568100d2823c17cca8f6ff83e158d789dc8ab7bbfb
                            • Instruction Fuzzy Hash: EE41E430900914BACB21AB618C89ABF7778EF45768F50427FF801B11D1D77CA982DE6E
                            APIs
                            • FindFirstFileW.KERNELBASE(?,00430298,0042FA50,00405CE0,0042FA50,0042FA50,00000000,0042FA50,0042FA50,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420), ref: 00406608
                            • FindClose.KERNEL32(00000000), ref: 00406614
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                            • Instruction ID: 1ab566c2093321911261fd6ef708f8cedd572ce36bb67071c96f4f7979b88ecc
                            • Opcode Fuzzy Hash: 09a722932e0a1bea88283b0440f714d8f88131f4b1bd488506181814d844a3ce
                            • Instruction Fuzzy Hash: 3AD012315051205BC3401B386E0C85B7A599F55331B159F37F86AF51E0DB758C72869C

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 139 4039aa-4039c2 call 406694 142 4039c4-4039d4 call 406201 139->142 143 4039d6-403a0d call 406188 139->143 151 403a30-403a59 call 403c80 call 405c97 142->151 148 403a25-403a2b lstrcatW 143->148 149 403a0f-403a20 call 406188 143->149 148->151 149->148 157 403aeb-403af3 call 405c97 151->157 158 403a5f-403a64 151->158 164 403b01-403b26 LoadImageW 157->164 165 403af5-403afc call 4062dc 157->165 158->157 159 403a6a-403a92 call 406188 158->159 159->157 166 403a94-403a98 159->166 168 403ba7-403baf call 40140b 164->168 169 403b28-403b58 RegisterClassW 164->169 165->164 173 403aaa-403ab6 lstrlenW 166->173 174 403a9a-403aa7 call 405bbc 166->174 181 403bb1-403bb4 168->181 182 403bb9-403bc4 call 403c80 168->182 170 403c76 169->170 171 403b5e-403ba2 SystemParametersInfoW CreateWindowExW 169->171 179 403c78-403c7f 170->179 171->168 175 403ab8-403ac6 lstrcmpiW 173->175 176 403ade-403ae6 call 405b8f call 4062ba 173->176 174->173 175->176 180 403ac8-403ad2 GetFileAttributesW 175->180 176->157 185 403ad4-403ad6 180->185 186 403ad8-403ad9 call 405bdb 180->186 181->179 192 403bca-403be4 ShowWindow call 406624 182->192 193 403c4d-403c55 call 4053f5 182->193 185->176 185->186 186->176 200 403bf0-403c02 GetClassInfoW 192->200 201 403be6-403beb call 406624 192->201 198 403c57-403c5d 193->198 199 403c6f-403c71 call 40140b 193->199 198->181 202 403c63-403c6a call 40140b 198->202 199->170 205 403c04-403c14 GetClassInfoW RegisterClassW 200->205 206 403c1a-403c4b DialogBoxParamW call 40140b call 4038fa 200->206 201->200 202->181 205->206 206->179
                            APIs
                              • Part of subcall function 00406694: GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                              • Part of subcall function 00406694: GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                            • lstrcatW.KERNEL32(1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75573420,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",00000000), ref: 00403A2B
                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403AAB
                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000), ref: 00403ABE
                            • GetFileAttributesW.KERNEL32(Call), ref: 00403AC9
                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes), ref: 00403B12
                              • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                            • RegisterClassW.USER32(00433E80), ref: 00403B4F
                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403B67
                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B9C
                            • ShowWindow.USER32(00000005,00000000), ref: 00403BD2
                            • GetClassInfoW.USER32(00000000,RichEdit20W,00433E80), ref: 00403BFE
                            • GetClassInfoW.USER32(00000000,RichEdit,00433E80), ref: 00403C0B
                            • RegisterClassW.USER32(00433E80), ref: 00403C14
                            • DialogBoxParamW.USER32(?,00000000,00403D58,00000000), ref: 00403C33
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                            • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                            • API String ID: 1975747703-2509760435
                            • Opcode ID: 2904cd21c70d62866cc327d96625cdd9032e7e4c90c5b4ba07f750359117e74a
                            • Instruction ID: 9f2b94ab3f1de80a41c8f53b965b22801f2352f665cd6d3f8e6571e1d6c0b700
                            • Opcode Fuzzy Hash: 2904cd21c70d62866cc327d96625cdd9032e7e4c90c5b4ba07f750359117e74a
                            • Instruction Fuzzy Hash: D861B9312407007ED720AF659D46E2B3A6CEB85B4AF40057FF945B51E2CBBD9941CB2D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 213 402edd-402f2b GetTickCount GetModuleFileNameW call 405db0 216 402f37-402f65 call 4062ba call 405bdb call 4062ba GetFileSize 213->216 217 402f2d-402f32 213->217 225 403052-403060 call 402e79 216->225 226 402f6b 216->226 218 40310f-403113 217->218 233 403062-403065 225->233 234 4030b5-4030ba 225->234 228 402f70-402f87 226->228 229 402f89 228->229 230 402f8b-402f94 call 403331 228->230 229->230 239 402f9a-402fa1 230->239 240 4030bc-4030c4 call 402e79 230->240 236 403067-40307f call 403347 call 403331 233->236 237 403089-4030b3 GlobalAlloc call 403347 call 403116 233->237 234->218 236->234 259 403081-403087 236->259 237->234 264 4030c6-4030d7 237->264 243 402fa3-402fb7 call 405d6b 239->243 244 40301d-403021 239->244 240->234 249 40302b-403031 243->249 262 402fb9-402fc0 243->262 248 403023-40302a call 402e79 244->248 244->249 248->249 255 403040-40304a 249->255 256 403033-40303d call 406787 249->256 255->228 263 403050 255->263 256->255 259->234 259->237 262->249 266 402fc2-402fc9 262->266 263->225 267 4030d9 264->267 268 4030df-4030e4 264->268 266->249 270 402fcb-402fd2 266->270 267->268 269 4030e5-4030eb 268->269 269->269 271 4030ed-403108 SetFilePointer call 405d6b 269->271 270->249 272 402fd4-402fdb 270->272 275 40310d 271->275 272->249 274 402fdd-402ffd 272->274 274->234 276 403003-403007 274->276 275->218 277 403009-40300d 276->277 278 40300f-403017 276->278 277->263 277->278 278->249 279 403019-40301b 278->279 279->249
                            APIs
                            • GetTickCount.KERNEL32 ref: 00402EEE
                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,00000400,?,00000006,00000008,0000000A), ref: 00402F0A
                              • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                              • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                            • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00402F56
                            Strings
                            • Error launching installer, xrefs: 00402F2D
                            • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 00402EDD
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402EE7
                            • Null, xrefs: 00402FD4
                            • Inst, xrefs: 00402FC2
                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004030B5
                            • C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe, xrefs: 00402EF4, 00402F03, 00402F17, 00402F37
                            • C:\Users\user\Desktop, xrefs: 00402F38, 00402F3D, 00402F43
                            • soft, xrefs: 00402FCB
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                            • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                            • API String ID: 4283519449-411526020
                            • Opcode ID: b750e8e4e7df36a99149f0ab2e150caf8403846cf59efbe219a1874bf977bdf0
                            • Instruction ID: dd9ea635540f9dffb1b2b479f8e1e5c18960c1b6140bd96a969558b27d112ec4
                            • Opcode Fuzzy Hash: b750e8e4e7df36a99149f0ab2e150caf8403846cf59efbe219a1874bf977bdf0
                            • Instruction Fuzzy Hash: C151F471901205ABDB20AF60DD85B9F7FA8FB0431AF15403BF910B62D5C7789E408BAD

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 280 4062dc-4062e7 281 4062e9-4062f8 280->281 282 4062fa-406310 280->282 281->282 283 406316-406323 282->283 284 406528-40652e 282->284 283->284 285 406329-406330 283->285 286 406534-40653f 284->286 287 406335-406342 284->287 285->284 288 406541-406545 call 4062ba 286->288 289 40654a-40654b 286->289 287->286 290 406348-406354 287->290 288->289 292 406515 290->292 293 40635a-406398 290->293 296 406523-406526 292->296 297 406517-406521 292->297 294 4064b8-4064bc 293->294 295 40639e-4063a9 293->295 300 4064be-4064c4 294->300 301 4064ef-4064f3 294->301 298 4063c2 295->298 299 4063ab-4063b0 295->299 296->284 297->284 304 4063c9-4063d0 298->304 299->298 307 4063b2-4063b5 299->307 302 4064d4-4064e0 call 4062ba 300->302 303 4064c6-4064d2 call 406201 300->303 305 406502-406513 lstrlenW 301->305 306 4064f5-4064fd call 4062dc 301->306 317 4064e5-4064eb 302->317 303->317 309 4063d2-4063d4 304->309 310 4063d5-4063d7 304->310 305->284 306->305 307->298 313 4063b7-4063ba 307->313 309->310 315 406412-406415 310->315 316 4063d9-406400 call 406188 310->316 313->298 318 4063bc-4063c0 313->318 321 406425-406428 315->321 322 406417-406423 GetSystemDirectoryW 315->322 328 4064a0-4064a3 316->328 329 406406-40640d call 4062dc 316->329 317->305 320 4064ed 317->320 318->304 324 4064b0-4064b6 call 40654e 320->324 326 406493-406495 321->326 327 40642a-406438 GetWindowsDirectoryW 321->327 325 406497-40649b 322->325 324->305 325->324 331 40649d 325->331 326->325 330 40643a-406444 326->330 327->326 328->324 334 4064a5-4064ab lstrcatW 328->334 329->325 336 406446-406449 330->336 337 40645e-406474 SHGetSpecialFolderLocation 330->337 331->328 334->324 336->337 338 40644b-406452 336->338 339 406476-40648d SHGetPathFromIDListW CoTaskMemFree 337->339 340 40648f 337->340 342 40645a-40645c 338->342 339->325 339->340 340->326 342->325 342->337
                            APIs
                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040641D
                            • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,0042C228,?,00405359,0042C228,00000000), ref: 00406430
                            • SHGetSpecialFolderLocation.SHELL32(00405359,0041DA00,00000000,0042C228,?,00405359,0042C228,00000000), ref: 0040646C
                            • SHGetPathFromIDListW.SHELL32(0041DA00,Call), ref: 0040647A
                            • CoTaskMemFree.OLE32(0041DA00), ref: 00406485
                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004064AB
                            • lstrlenW.KERNEL32(Call,00000000,0042C228,?,00405359,0042C228,00000000), ref: 00406503
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                            • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                            • API String ID: 717251189-3319343437
                            • Opcode ID: be842abed2e65b63b3d72d51674aff3c14f059aabebd99e4c76d62d1777cce00
                            • Instruction ID: 29f0adb049bea166a756856afc1b7ff582c4fdfd81cc2e884c30b49282791dbd
                            • Opcode Fuzzy Hash: be842abed2e65b63b3d72d51674aff3c14f059aabebd99e4c76d62d1777cce00
                            • Instruction Fuzzy Hash: E6611071A00111ABDF209F54DC41AAE37A9EF45318F26803FE943BA2D0D77D9AA1C79D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 407 40176f-401794 call 402c41 call 405c06 412 401796-40179c call 4062ba 407->412 413 40179e-4017b0 call 4062ba call 405b8f lstrcatW 407->413 418 4017b5-4017b6 call 40654e 412->418 413->418 422 4017bb-4017bf 418->422 423 4017c1-4017cb call 4065fd 422->423 424 4017f2-4017f5 422->424 431 4017dd-4017ef 423->431 432 4017cd-4017db CompareFileTime 423->432 425 4017f7-4017f8 call 405d8b 424->425 426 4017fd-401819 call 405db0 424->426 425->426 434 40181b-40181e 426->434 435 40188d-4018b6 call 405322 call 403116 426->435 431->424 432->431 436 401820-40185e call 4062ba * 2 call 4062dc call 4062ba call 405920 434->436 437 40186f-401879 call 405322 434->437 447 4018b8-4018bc 435->447 448 4018be-4018ca SetFileTime 435->448 436->422 469 401864-401865 436->469 449 401882-401888 437->449 447->448 451 4018d0-4018db CloseHandle 447->451 448->451 452 402ace 449->452 455 4018e1-4018e4 451->455 456 402ac5-402ac8 451->456 457 402ad0-402ad4 452->457 459 4018e6-4018f7 call 4062dc lstrcatW 455->459 460 4018f9-4018fc call 4062dc 455->460 456->452 466 401901-4022fc call 405920 459->466 460->466 466->457 469->449 471 401867-401868 469->471 471->437
                            APIs
                            • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes,?,?,00000031), ref: 004017B0
                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes,?,?,00000031), ref: 004017D5
                              • Part of subcall function 004062BA: lstrcpynW.KERNEL32(?,?,00000400,00403460,00433EE0,NSIS Error,?,00000006,00000008,0000000A), ref: 004062C7
                              • Part of subcall function 00405322: lstrlenW.KERNEL32(0042C228,00000000,0041DA00,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                              • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,0042C228,00000000,0041DA00,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                              • Part of subcall function 00405322: lstrcatW.KERNEL32(0042C228,0040327A,0040327A,0042C228,00000000,0041DA00,755723A0), ref: 0040537D
                              • Part of subcall function 00405322: SetWindowTextW.USER32(0042C228,0042C228), ref: 0040538F
                              • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                              • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                              • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes$C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp$C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dll$Call
                            • API String ID: 1941528284-14295844
                            • Opcode ID: b057a688d914eef7caf18a0e6fee2ba2bce91a0dfa11573c507a656315e6beb6
                            • Instruction ID: 24a82d921ca393d09b0f70664e9a68f54f64900ed4cc6ef124b6c19d11fe7a64
                            • Opcode Fuzzy Hash: b057a688d914eef7caf18a0e6fee2ba2bce91a0dfa11573c507a656315e6beb6
                            • Instruction Fuzzy Hash: 12419371900518BACF107BA5DD46DAF3A79EF45368F20423FF422B10E1DA3C8A519A6D

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 473 403116-40312d 474 403136-40313f 473->474 475 40312f 473->475 476 403141 474->476 477 403148-40314d 474->477 475->474 476->477 478 40315d-40316a call 403331 477->478 479 40314f-403158 call 403347 477->479 483 403170-403174 478->483 484 40331f 478->484 479->478 485 4032ca-4032cc 483->485 486 40317a-4031c3 GetTickCount 483->486 487 403321-403322 484->487 488 40330c-40330f 485->488 489 4032ce-4032d1 485->489 490 403327 486->490 491 4031c9-4031d1 486->491 492 40332a-40332e 487->492 496 403311 488->496 497 403314-40331d call 403331 488->497 489->490 493 4032d3 489->493 490->492 494 4031d3 491->494 495 4031d6-4031e4 call 403331 491->495 499 4032d6-4032dc 493->499 494->495 495->484 507 4031ea-4031f3 495->507 496->497 497->484 505 403324 497->505 502 4032e0-4032ee call 403331 499->502 503 4032de 499->503 502->484 510 4032f0-4032fc call 405e62 502->510 503->502 505->490 509 4031f9-403219 call 4067f5 507->509 515 4032c2-4032c4 509->515 516 40321f-403232 GetTickCount 509->516 517 4032c6-4032c8 510->517 518 4032fe-403308 510->518 515->487 519 403234-40323c 516->519 520 40327d-40327f 516->520 517->487 518->499 523 40330a 518->523 524 403244-40327a MulDiv wsprintfW call 405322 519->524 525 40323e-403242 519->525 521 403281-403285 520->521 522 4032b6-4032ba 520->522 527 403287-40328e call 405e62 521->527 528 40329c-4032a7 521->528 522->491 529 4032c0 522->529 523->490 524->520 525->520 525->524 533 403293-403295 527->533 532 4032aa-4032ae 528->532 529->490 532->509 534 4032b4 532->534 533->517 535 403297-40329a 533->535 534->490 535->532
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CountTick$wsprintf
                            • String ID: ... %d%%$@
                            • API String ID: 551687249-3859443358
                            • Opcode ID: 9edc88f8172c04292c3df671f1e4f215f71192327047457aae68a0603d3020a5
                            • Instruction ID: 5c504835c6c52170eea8577a9cac8da2a2598cbf1b76cdbdeb728d3f56fa2377
                            • Opcode Fuzzy Hash: 9edc88f8172c04292c3df671f1e4f215f71192327047457aae68a0603d3020a5
                            • Instruction Fuzzy Hash: AA517A71900219DBCB10DFA5DA84A9E7BB8AF04366F14417BEC14B72C0CB78DA40CBA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 536 40264a-402663 call 402c1f 539 402ac5-402ac8 536->539 540 402669-402670 536->540 541 402ace-402ad4 539->541 542 402672 540->542 543 402675-402678 540->543 542->543 544 4027dc-4027e4 543->544 545 40267e-40268d call 40621a 543->545 544->539 545->544 549 402693 545->549 550 402699-40269d 549->550 551 402732-402735 550->551 552 4026a3-4026be ReadFile 550->552 554 402737-40273a 551->554 555 40274d-40275d call 405e33 551->555 552->544 553 4026c4-4026c9 552->553 553->544 558 4026cf-4026dd 553->558 554->555 556 40273c-402747 call 405e91 554->556 555->544 564 40275f 555->564 556->544 556->555 561 4026e3-4026f5 MultiByteToWideChar 558->561 562 402798-4027a4 call 406201 558->562 561->564 565 4026f7-4026fa 561->565 562->541 567 402762-402765 564->567 568 4026fc-402707 565->568 567->562 570 402767-40276c 567->570 568->567 571 402709-40272e SetFilePointer MultiByteToWideChar 568->571 572 4027a9-4027ad 570->572 573 40276e-402773 570->573 571->568 574 402730 571->574 575 4027ca-4027d6 SetFilePointer 572->575 576 4027af-4027b3 572->576 573->572 577 402775-402788 573->577 574->564 575->544 578 4027b5-4027b9 576->578 579 4027bb-4027c8 576->579 577->544 580 40278a-402790 577->580 578->575 578->579 579->544 580->550 581 402796 580->581 581->544
                            APIs
                            • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B6
                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026F1
                            • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402714
                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040272A
                              • Part of subcall function 00405E91: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405EA7
                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: File$Pointer$ByteCharMultiWide$Read
                            • String ID: 9
                            • API String ID: 163830602-2366072709
                            • Opcode ID: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                            • Instruction ID: 0a1b8613d15e357d59cabb4a84863d73d9dad353ca9b6e0785da3ca47288b3a0
                            • Opcode Fuzzy Hash: 19438e2e62ba8aece1a895eee3c3762f252ce0cb36923fbe756b3879527f42a2
                            • Instruction Fuzzy Hash: 42511974D00219AEDF219F95DA88AAEB779FF04304F10443BE901B72D0DBB89982CB18

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 582 406624-406644 GetSystemDirectoryW 583 406646 582->583 584 406648-40664a 582->584 583->584 585 40665b-40665d 584->585 586 40664c-406655 584->586 588 40665e-406691 wsprintfW LoadLibraryExW 585->588 586->585 587 406657-406659 586->587 587->588
                            APIs
                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                            • wsprintfW.USER32 ref: 00406676
                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: DirectoryLibraryLoadSystemwsprintf
                            • String ID: %s%S.dll$UXTHEME$\
                            • API String ID: 2200240437-1946221925
                            • Opcode ID: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                            • Instruction ID: 9fa172bba6ca99a644905d2b6d7ed641771312ed853c50fe9922007c80c3d461
                            • Opcode Fuzzy Hash: fcd04411c5a1f64f7e9219edfc5ac0d332aa1f587fd7b062781a7321f30925af
                            • Instruction Fuzzy Hash: 7CF0FC70501119A6CF10BB64DD0EF9B365CA700304F10447AA54AF10D1EBB9DB64CB99

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 589 4057f1-40583c CreateDirectoryW 590 405842-40584f GetLastError 589->590 591 40583e-405840 589->591 592 405869-40586b 590->592 593 405851-405865 SetFileSecurityW 590->593 591->592 593->591 594 405867 GetLastError 593->594 594->592
                            APIs
                            • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405834
                            • GetLastError.KERNEL32 ref: 00405848
                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040585D
                            • GetLastError.KERNEL32 ref: 00405867
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 3449924974-1876063424
                            • Opcode ID: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                            • Instruction ID: d156970015101e62572267df52bf1fb018b172c5ebb67f048bc3511340661aba
                            • Opcode Fuzzy Hash: 817c7eeb2e6ade2cce28f3b9d2e4670c9c7091e2f59c9eba6f9578a5288f1365
                            • Instruction Fuzzy Hash: EB010872D00219EADF009FA1C944BEFBBB8EF14304F00803AE945B6280D7789618CFA9

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 595 405ddf-405deb 596 405dec-405e20 GetTickCount GetTempFileNameW 595->596 597 405e22-405e24 596->597 598 405e2f-405e31 596->598 597->596 599 405e26 597->599 600 405e29-405e2c 598->600 599->600
                            APIs
                            • GetTickCount.KERNEL32 ref: 00405DFD
                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",0040338D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9), ref: 00405E18
                            Strings
                            • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 00405DDF
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405DE4, 00405DE8
                            • nsa, xrefs: 00405DEC
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CountFileNameTempTick
                            • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                            • API String ID: 1716503409-1541355923
                            • Opcode ID: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                            • Instruction ID: af8b6ba947558e1b0daa3aed001b6e0f80e178ffca66ecedc63f3e0829e9a41e
                            • Opcode Fuzzy Hash: 579317ece081e1c49d3b274132234632dc0f80c8b4471fc5797a0d742f25062f
                            • Instruction Fuzzy Hash: 61F03076A00304FBEB009F69ED05E9FB7BCEB95710F10803AE941E7250E6B09A548B64

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 601 73911777-739117b6 call 73911b5f 605 739118d6-739118d8 601->605 606 739117bc-739117c0 601->606 607 739117c2-739117c8 call 73912352 606->607 608 739117c9-739117d6 call 73912394 606->608 607->608 613 73911806-7391180d 608->613 614 739117d8-739117dd 608->614 615 7391182d-73911831 613->615 616 7391180f-7391182b call 73912569 call 739115b4 call 73911272 GlobalFree 613->616 617 739117f8-739117fb 614->617 618 739117df-739117e0 614->618 623 73911833-7391187c call 739115c6 call 73912569 615->623 624 7391187e-73911884 call 73912569 615->624 640 73911885-73911889 616->640 617->613 619 739117fd-739117fe call 73912d37 617->619 621 739117e2-739117e3 618->621 622 739117e8-739117e9 call 73912aac 618->622 632 73911803 619->632 628 739117f0-739117f6 call 73912724 621->628 629 739117e5-739117e6 621->629 635 739117ee 622->635 623->640 624->640 639 73911805 628->639 629->613 629->622 632->639 635->632 639->613 644 739118c6-739118cd 640->644 645 7391188b-73911899 call 7391252c 640->645 644->605 647 739118cf-739118d0 GlobalFree 644->647 651 739118b1-739118b8 645->651 652 7391189b-7391189e 645->652 647->605 651->644 654 739118ba-739118c5 call 7391153d 651->654 652->651 653 739118a0-739118a8 652->653 653->651 655 739118aa-739118ab FreeLibrary 653->655 654->644 655->651
                            APIs
                              • Part of subcall function 73911B5F: GlobalFree.KERNEL32(?), ref: 73911DB2
                              • Part of subcall function 73911B5F: GlobalFree.KERNEL32(?), ref: 73911DB7
                              • Part of subcall function 73911B5F: GlobalFree.KERNEL32(?), ref: 73911DBC
                            • GlobalFree.KERNEL32(00000000), ref: 73911825
                            • FreeLibrary.KERNEL32(?), ref: 739118AB
                            • GlobalFree.KERNEL32(00000000), ref: 739118D0
                              • Part of subcall function 73912352: GlobalAlloc.KERNEL32(00000040,?), ref: 73912383
                              • Part of subcall function 73912724: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,739117F6,00000000), ref: 739127F4
                              • Part of subcall function 739115C6: wsprintfW.USER32 ref: 739115F4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc$Librarywsprintf
                            • String ID:
                            • API String ID: 3962662361-3916222277
                            • Opcode ID: bf7302b7f789fb173900fc7412bbc9572d36f97bca46513bc91a01f860c0a9e8
                            • Instruction ID: 116b60c0d5947e8c96d1d3b76095c38a406131a5c63dd13a666508dbb8c18a90
                            • Opcode Fuzzy Hash: bf7302b7f789fb173900fc7412bbc9572d36f97bca46513bc91a01f860c0a9e8
                            • Instruction Fuzzy Hash: 8141847250030FFBDB11AF649884BD537BCAB04354F1884B5E95ABE1CADBB891A4C762

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 658 402d44-402d6d call 406127 660 402d72-402d74 658->660 661 402d76-402d7c 660->661 662 402dec-402df0 660->662 663 402d98-402dad RegEnumKeyW 661->663 664 402d7e-402d80 663->664 665 402daf-402dc1 RegCloseKey call 406694 663->665 666 402dd0-402dde RegCloseKey 664->666 667 402d82-402d96 call 402d44 664->667 672 402de0-402de6 RegDeleteKeyW 665->672 673 402dc3-402dce 665->673 666->662 667->663 667->665 672->662 673->662
                            APIs
                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402DA9
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DB2
                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402DD3
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Close$Enum
                            • String ID:
                            • API String ID: 464197530-0
                            • Opcode ID: c72d40a864b89179d6177807711ca710c6d7a48354557ea1e55874adbd4ea6b3
                            • Instruction ID: fc7ade2e12cd9e993d25f9a328d8db16c9603ee1eb20de8c24b8f84b94a82c23
                            • Opcode Fuzzy Hash: c72d40a864b89179d6177807711ca710c6d7a48354557ea1e55874adbd4ea6b3
                            • Instruction Fuzzy Hash: B4116A32500109FBDF02AB90CE09FEE7B7DAF54340F100076B904B51E1E7B59E21AB68

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 675 4015c1-4015d5 call 402c41 call 405c3a 680 401631-401634 675->680 681 4015d7-4015ea call 405bbc 675->681 683 401663-402250 call 401423 680->683 684 401636-401655 call 401423 call 4062ba SetCurrentDirectoryW 680->684 688 401604-401607 call 40586e 681->688 689 4015ec-4015ef 681->689 696 402ac5-402ad4 683->696 697 40288b-402892 683->697 684->696 702 40165b-40165e 684->702 700 40160c-40160e 688->700 689->688 693 4015f1-4015f8 call 40588b 689->693 693->688 706 4015fa-4015fd call 4057f1 693->706 697->696 704 401610-401615 700->704 705 401627-40162f 700->705 702->696 708 401624 704->708 709 401617-401622 GetFileAttributesW 704->709 705->680 705->681 711 401602 706->711 708->705 709->705 709->708 711->700
                            APIs
                              • Part of subcall function 00405C3A: CharNextW.USER32(?,?,0042FA50,?,00405CAE,0042FA50,0042FA50,?,?,75573420,004059EC,?,C:\Users\user\AppData\Local\Temp\,75573420,00000000), ref: 00405C48
                              • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C4D
                              • Part of subcall function 00405C3A: CharNextW.USER32(00000000), ref: 00405C65
                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                              • Part of subcall function 004057F1: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405834
                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes,?,00000000,000000F0), ref: 0040164D
                            Strings
                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes, xrefs: 00401640
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes
                            • API String ID: 1892508949-736155189
                            • Opcode ID: ccc26fd8040a7d4b53b38cf61a52de36f24ca8f1ae9d4c3caa59a04d4873da4d
                            • Instruction ID: 4927223e19ece6e176e0ab471dddb7e32c8def581d8881840bcbc1854d235eeb
                            • Opcode Fuzzy Hash: ccc26fd8040a7d4b53b38cf61a52de36f24ca8f1ae9d4c3caa59a04d4873da4d
                            • Instruction Fuzzy Hash: 9711E231504505EBCF30AFA1CD0159F36A0EF14369B29493BFA45B22F1DB3E89519B5E

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 712 402032-40203e 713 402044-40205a call 402c41 * 2 712->713 714 4020fd-4020ff 712->714 724 40206a-402079 LoadLibraryExW 713->724 725 40205c-402068 GetModuleHandleW 713->725 716 40224b-402250 call 401423 714->716 721 402ac5-402ad4 716->721 722 40288b-402892 716->722 722->721 727 40207b-40208a call 406703 724->727 728 4020f6-4020f8 724->728 725->724 725->727 732 4020c5-4020ca call 405322 727->732 733 40208c-402092 727->733 728->716 737 4020cf-4020d2 732->737 735 402094-4020a0 call 401423 733->735 736 4020ab-4020be call 73911777 733->736 735->737 745 4020a2-4020a9 735->745 739 4020c0-4020c3 736->739 737->721 740 4020d8-4020e2 call 40394a 737->740 739->737 740->721 746 4020e8-4020f1 FreeLibrary 740->746 745->737 746->721
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040205D
                              • Part of subcall function 00405322: lstrlenW.KERNEL32(0042C228,00000000,0041DA00,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                              • Part of subcall function 00405322: lstrlenW.KERNEL32(0040327A,0042C228,00000000,0041DA00,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                              • Part of subcall function 00405322: lstrcatW.KERNEL32(0042C228,0040327A,0040327A,0042C228,00000000,0041DA00,755723A0), ref: 0040537D
                              • Part of subcall function 00405322: SetWindowTextW.USER32(0042C228,0042C228), ref: 0040538F
                              • Part of subcall function 00405322: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                              • Part of subcall function 00405322: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                              • Part of subcall function 00405322: SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                            • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040206E
                            • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020EB
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                            • String ID:
                            • API String ID: 334405425-0
                            • Opcode ID: 666f6d8ac427e58388e3d879615a983e5b51d40526e42ae90acfa13b1993aa0d
                            • Instruction ID: 732860e23109d101385e559ec06a1cde6071cd761d8e517fa4c79c7f2b675a05
                            • Opcode Fuzzy Hash: 666f6d8ac427e58388e3d879615a983e5b51d40526e42ae90acfa13b1993aa0d
                            • Instruction Fuzzy Hash: 4421B031D00205EACF20AFA5CE48A9E7A70BF04358F64413BF511B51E0DBBD8981DA6E
                            APIs
                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                            • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend
                            • String ID:
                            • API String ID: 3850602802-0
                            • Opcode ID: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                            • Instruction ID: eaafb4699c1cdf5c6f59fde68eca766a765a16907ebce13606274643e5ac5f14
                            • Opcode Fuzzy Hash: 819fad79445c3595f7b9f28f54206bfd84f40695cc559c75429dbb5a445ae89f
                            • Instruction Fuzzy Hash: 8D0128316242209FE7095B789D05B6A3698E710715F14463FF851F62F1D678CC429B4C
                            APIs
                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023B0
                            • RegCloseKey.ADVAPI32(00000000), ref: 004023B9
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CloseDeleteValue
                            • String ID:
                            • API String ID: 2831762973-0
                            • Opcode ID: 6e579435eca9b4b687e1d7b96289a1719cefcc3e0237eeeb9f7ae371a7a8e2b7
                            • Instruction ID: 2791961e855c801182d2f4b3e101f078c994d4f4985963d794b0561754721dd9
                            • Opcode Fuzzy Hash: 6e579435eca9b4b687e1d7b96289a1719cefcc3e0237eeeb9f7ae371a7a8e2b7
                            • Instruction Fuzzy Hash: E6F09632E045119BE704BBA49B8EABE72A89B44354F29403FFE42F71C1CAF85D41676D
                            APIs
                            • GetModuleHandleA.KERNEL32(?,00000020,?,00403401,0000000A), ref: 004066A6
                            • GetProcAddress.KERNEL32(00000000,?), ref: 004066C1
                              • Part of subcall function 00406624: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040663B
                              • Part of subcall function 00406624: wsprintfW.USER32 ref: 00406676
                              • Part of subcall function 00406624: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040668A
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                            • String ID:
                            • API String ID: 2547128583-0
                            • Opcode ID: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                            • Instruction ID: 155b38c425e345f43688a0673e138072f65e923c2ca09dacbbabb210d44f0fbf
                            • Opcode Fuzzy Hash: c77725e8978f6dbc308834741f2b8f5018f4a929a6ea22720db737a721ff7b5c
                            • Instruction Fuzzy Hash: 50E0863250461156D31197709E4487762EC9B95750307483EF946F2091DB399C36A66D
                            APIs
                            • GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: File$AttributesCreate
                            • String ID:
                            • API String ID: 415043291-0
                            • Opcode ID: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                            • Instruction ID: 684cdbd871a87963be1dc25f749e3f1c2e3aca1a790447dc63e6e481d8426dbe
                            • Opcode Fuzzy Hash: e3266cf20b616526e148e4639a7b0fb2c73eec3b674a7d239963b130731368bc
                            • Instruction Fuzzy Hash: 5DD09E31254301AFEF098F20DE16F2EBBA2EB84B05F11552CB786940E0DA7158199B15
                            APIs
                            • CreateDirectoryW.KERNELBASE(?,00000000,00403382,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 00405874
                            • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405882
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CreateDirectoryErrorLast
                            • String ID:
                            • API String ID: 1375471231-0
                            • Opcode ID: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                            • Instruction ID: b5712d1dc6f90c91938fb9970759bfac189bcafefc635788875416fd9ee2894b
                            • Opcode Fuzzy Hash: 5aaa147db34fee021f71137ce00f1128120fffe197b4e0338bd4cd09c611a0b2
                            • Instruction Fuzzy Hash: 2FC04C712155019ED7546F619F08B277A50EB60781F158839A946E10E0DB348465ED2D
                            APIs
                            • EnumWindows.USER32(00000000), ref: 73912B6B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: EnumWindows
                            • String ID:
                            • API String ID: 1129996299-0
                            • Opcode ID: 9bf59a235672cf4b08eb73d0a293d9820632e96d862d7571ef8e9feb2cccde66
                            • Instruction ID: e947bf0b295f35a007221a45fc9b22f175276e3b5de25b3ec14fcef588aa953d
                            • Opcode Fuzzy Hash: 9bf59a235672cf4b08eb73d0a293d9820632e96d862d7571ef8e9feb2cccde66
                            • Instruction Fuzzy Hash: B74191F290420EEFFB21FFA9D9417D937A9EB04358F314426E54DBB180D63599A0CB92
                            APIs
                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 0040280D
                              • Part of subcall function 00406201: wsprintfW.USER32 ref: 0040620E
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: FilePointerwsprintf
                            • String ID:
                            • API String ID: 327478801-0
                            • Opcode ID: 2074296acf118ace0f9b9ab2ab8615e2fe297c7dd6636d95e153eafbd2080ce7
                            • Instruction ID: 7f9197a1b1888ebfd6de04269447b21ffcaf0972564048b2e7bc6ee4a29003df
                            • Opcode Fuzzy Hash: 2074296acf118ace0f9b9ab2ab8615e2fe297c7dd6636d95e153eafbd2080ce7
                            • Instruction Fuzzy Hash: 29E06D71E04104AAD710EBA5AE098AEB768DB84318B24407FF201B50D1CA7949119E2D
                            APIs
                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: PrivateProfileStringWrite
                            • String ID:
                            • API String ID: 390214022-0
                            • Opcode ID: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                            • Instruction ID: c1725c34c84eed099ded2eadaed0aef72a921931f8640c1422412bc8ca1d20e4
                            • Opcode Fuzzy Hash: 8d5bed1eaa9c21b7d608f8919ca3b143956f4a650d469f74d9cd9ecffb6d68ea
                            • Instruction Fuzzy Hash: 89E086315046246BEB1436F10F8DABF10589B54305B19053FBE46B61D7D9FC0D81526D
                            APIs
                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,004032FA,000000FF,00416A00,?,00416A00,?,?,00000004,00000000), ref: 00405E76
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: FileWrite
                            • String ID:
                            • API String ID: 3934441357-0
                            • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                            • Instruction ID: 8754e0b6f25d564075f0081c534dd79b85a2df0f0bc88b3642164a4a3ec1e455
                            • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                            • Instruction Fuzzy Hash: FDE0B63221065AAFDF109F95DC00AAB7B6CEB052A0F044437FD59E7150D671EA21DAE4
                            APIs
                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,00403344,00000000,00000000,00403168,?,00000004,00000000,00000000,00000000), ref: 00405E47
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: FileRead
                            • String ID:
                            • API String ID: 2738559852-0
                            • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                            • Instruction ID: bd732019988057c431ec21c3a2c50b1292625b962aa4d7912315599e48db2a91
                            • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                            • Instruction Fuzzy Hash: A9E08C3220021AABCF20AF54DC00FEB3B6CEB05760F004832FD65E6040E230EA219BE8
                            APIs
                            • VirtualProtect.KERNELBASE(7391505C,00000004,00000040,7391504C), ref: 739129B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: ProtectVirtual
                            • String ID:
                            • API String ID: 544645111-0
                            • Opcode ID: 777e1ec94f91260cb86d1dd0267d40826f3dbb32199feabab8da735c2f16465e
                            • Instruction ID: ba0b083898ce09703dc32058e4d9d7254b9fe8da6899f3e603c118d6ecafb2cf
                            • Opcode Fuzzy Hash: 777e1ec94f91260cb86d1dd0267d40826f3dbb32199feabab8da735c2f16465e
                            • Instruction Fuzzy Hash: 70F092F2628285FEC351EFAEC4447193BE0B748204B66463AE19CFF241E3344944CF92
                            APIs
                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040237F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: PrivateProfileString
                            • String ID:
                            • API String ID: 1096422788-0
                            • Opcode ID: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                            • Instruction ID: 3d6fae6e588f42459dd5c721a8c471f59e455a0f8de0d1d47597fcd0a09f6ae9
                            • Opcode Fuzzy Hash: 3f3571743ae8bb518db273e1d5473214efdc558287c9048febf32fba17a38326
                            • Instruction Fuzzy Hash: 68E04830804208AADF106FA1CE499AE3A64AF00341F144439F9957B0D1E6F8C4816745
                            APIs
                            • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,0042C228,?,?,004061B5,0042C228,00000000,?,?,Call,?), ref: 0040614B
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Open
                            • String ID:
                            • API String ID: 71445658-0
                            • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction ID: b908bd292ce434c6339c018d18c1e3bfafdd2f7559b63d477f04a141d62eba1a
                            • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                            • Instruction Fuzzy Hash: 94D0123214020DFBDF119E909D01FAB775DAB08350F014426FE06A9191D776D530AB14
                            APIs
                            • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: AttributesFile
                            • String ID:
                            • API String ID: 3188754299-0
                            • Opcode ID: 36851d47f29f4e5f8caad751ec2fdfbff3eb3ab123f48471e652e243bc97ec45
                            • Instruction ID: 6c8b7a7afc7aeb3e996b6e5dc2b2c32cd2e79b991574bcf3a276c199f91445cd
                            • Opcode Fuzzy Hash: 36851d47f29f4e5f8caad751ec2fdfbff3eb3ab123f48471e652e243bc97ec45
                            • Instruction Fuzzy Hash: C1D01232B04100D7DB10DBA4AF4899D73A49B84369B344577E102F11D0D6B9D9416A29
                            APIs
                            • SetFilePointer.KERNELBASE(?,00000000,00000000,004030A4,?,?,00000006,00000008,0000000A), ref: 00403355
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: FilePointer
                            • String ID:
                            • API String ID: 973152223-0
                            • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                            • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                            • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                            • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                            APIs
                            • Sleep.KERNELBASE(00000000), ref: 004014EA
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Sleep
                            • String ID:
                            • API String ID: 3472027048-0
                            • Opcode ID: 0bc635984c6f466b42bf69b1192a92afab3c6d6232f2671ab24b9074207b237f
                            • Instruction ID: 4fc8e819a9ec015efa4fb87cb4f3efb4dacce27a9684fd7b71b6c066277d8bf2
                            • Opcode Fuzzy Hash: 0bc635984c6f466b42bf69b1192a92afab3c6d6232f2671ab24b9074207b237f
                            • Instruction Fuzzy Hash: 19D0A773F142008BD710DBB8BE8949E73E8E780329330883BE102F10D1E978D8424E2C
                            APIs
                            • GlobalAlloc.KERNELBASE(00000040,?,7391123B,?,739112DF,00000019,739111BE,-000000A0), ref: 73911225
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: AllocGlobal
                            • String ID:
                            • API String ID: 3761449716-0
                            • Opcode ID: 00704d6e8e26557e4c674d028683ca888489e5efa8a46ed5782407db844b207a
                            • Instruction ID: 3263e1dc616c4f09d13d843eba89427dc9df07418fba7d9749140fcccbbf0929
                            • Opcode Fuzzy Hash: 00704d6e8e26557e4c674d028683ca888489e5efa8a46ed5782407db844b207a
                            • Instruction Fuzzy Hash: 40B002B2E48110EFEF40ABEACD46F353664E744705F554060F60DEA185D5645814C575
                            APIs
                            • GetDlgItem.USER32(?,00000403), ref: 004054BF
                            • GetDlgItem.USER32(?,000003EE), ref: 004054CE
                            • GetClientRect.USER32(?,?), ref: 0040550B
                            • GetSystemMetrics.USER32(00000002), ref: 00405512
                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405533
                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405544
                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405557
                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405565
                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405578
                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040559A
                            • ShowWindow.USER32(?,00000008), ref: 004055AE
                            • GetDlgItem.USER32(?,000003EC), ref: 004055CF
                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004055DF
                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004055F8
                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405604
                            • GetDlgItem.USER32(?,000003F8), ref: 004054DD
                              • Part of subcall function 00404266: SendMessageW.USER32(00000028,?,00000001,00404091), ref: 00404274
                            • GetDlgItem.USER32(?,000003EC), ref: 00405621
                            • CreateThread.KERNEL32(00000000,00000000,Function_000053F5,00000000), ref: 0040562F
                            • CloseHandle.KERNEL32(00000000), ref: 00405636
                            • ShowWindow.USER32(00000000), ref: 0040565A
                            • ShowWindow.USER32(?,00000008), ref: 0040565F
                            • ShowWindow.USER32(00000008), ref: 004056A9
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004056DD
                            • CreatePopupMenu.USER32 ref: 004056EE
                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405702
                            • GetWindowRect.USER32(?,?), ref: 00405722
                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040573B
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405773
                            • OpenClipboard.USER32(00000000), ref: 00405783
                            • EmptyClipboard.USER32 ref: 00405789
                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405795
                            • GlobalLock.KERNEL32(00000000), ref: 0040579F
                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057B3
                            • GlobalUnlock.KERNEL32(00000000), ref: 004057D3
                            • SetClipboardData.USER32(0000000D,00000000), ref: 004057DE
                            • CloseClipboard.USER32 ref: 004057E4
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                            • String ID: {
                            • API String ID: 590372296-366298937
                            • Opcode ID: d79c0185c0728b850bacb0f939067e3749861c5126489aa4a3835004506ab0c2
                            • Instruction ID: 0d33ea325d25f8e5d5623e6ebdd73ca6fcd7ab1b09301a5b30cdd6c49ec902ff
                            • Opcode Fuzzy Hash: d79c0185c0728b850bacb0f939067e3749861c5126489aa4a3835004506ab0c2
                            • Instruction Fuzzy Hash: D7B15770900608FFDB119FA0DD89AAE7BB9FB48355F00403AFA41BA1A0CB755E51DF68
                            APIs
                            • GetDlgItem.USER32(?,000003F9), ref: 00404CB6
                            • GetDlgItem.USER32(?,00000408), ref: 00404CC1
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D0B
                            • LoadBitmapW.USER32(0000006E), ref: 00404D1E
                            • SetWindowLongW.USER32(?,000000FC,00405296), ref: 00404D37
                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404D4B
                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404D5D
                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404D73
                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404D7F
                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404D91
                            • DeleteObject.GDI32(00000000), ref: 00404D94
                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404DBF
                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404DCB
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404E61
                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404E8C
                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404EA0
                            • GetWindowLongW.USER32(?,000000F0), ref: 00404ECF
                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404EDD
                            • ShowWindow.USER32(?,00000005), ref: 00404EEE
                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404FEB
                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405050
                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405065
                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405089
                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004050A9
                            • ImageList_Destroy.COMCTL32(?), ref: 004050BE
                            • GlobalFree.KERNEL32(?), ref: 004050CE
                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405147
                            • SendMessageW.USER32(?,00001102,?,?), ref: 004051F0
                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004051FF
                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0040521F
                            • ShowWindow.USER32(?,00000000), ref: 0040526D
                            • GetDlgItem.USER32(?,000003FE), ref: 00405278
                            • ShowWindow.USER32(00000000), ref: 0040527F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                            • String ID: $M$N
                            • API String ID: 1638840714-813528018
                            • Opcode ID: d7fb2f4892de50fbc14c1a930a22a2945486bdf273952240de52388985094c93
                            • Instruction ID: f888d98cc81d7f01a919363da6f821789f230268a52e2f70c0503caf05bd5b25
                            • Opcode Fuzzy Hash: d7fb2f4892de50fbc14c1a930a22a2945486bdf273952240de52388985094c93
                            • Instruction Fuzzy Hash: BB026FB0900209EFDB109FA4DD85AAE7BB5FB84314F14857AF610BA2E0C7799D52CF58
                            APIs
                            • GetDlgItem.USER32(?,000003FB), ref: 00404771
                            • SetWindowTextW.USER32(00000000,?), ref: 0040479B
                            • SHBrowseForFolderW.SHELL32(?), ref: 0040484C
                            • CoTaskMemFree.OLE32(00000000), ref: 00404857
                            • lstrcmpiW.KERNEL32(Call,0042D248,00000000,?,?), ref: 00404889
                            • lstrcatW.KERNEL32(?,Call), ref: 00404895
                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004048A7
                              • Part of subcall function 00405904: GetDlgItemTextW.USER32(?,?,00000400,004048DE), ref: 00405917
                              • Part of subcall function 0040654E: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                              • Part of subcall function 0040654E: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                              • Part of subcall function 0040654E: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                              • Part of subcall function 0040654E: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                            • GetDiskFreeSpaceW.KERNEL32(0042B218,?,?,0000040F,?,0042B218,0042B218,?,00000001,0042B218,?,?,000003FB,?), ref: 0040496A
                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404985
                              • Part of subcall function 00404ADE: lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                              • Part of subcall function 00404ADE: wsprintfW.USER32 ref: 00404B88
                              • Part of subcall function 00404ADE: SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                            • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes$Call$user32::EnumWindows(i r1 ,i 0)
                            • API String ID: 2624150263-129677526
                            • Opcode ID: 68aa07a1fe6bf47594d6bed69479b5c606ba263e933e44afd0ace3f0572c8061
                            • Instruction ID: 9ce2ccc5872d7715d19bac2dec5c0444f9ce2fea2c0a51142092d54e0f15b7c0
                            • Opcode Fuzzy Hash: 68aa07a1fe6bf47594d6bed69479b5c606ba263e933e44afd0ace3f0572c8061
                            • Instruction Fuzzy Hash: F8A165B1A00208ABDB11AFA5CD45AAFB7B8EF84314F10847BF601B62D1D77C99418F6D
                            APIs
                              • Part of subcall function 7391121B: GlobalAlloc.KERNELBASE(00000040,?,7391123B,?,739112DF,00000019,739111BE,-000000A0), ref: 73911225
                            • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 73911C6B
                            • lstrcpyW.KERNEL32(00000008,?), ref: 73911CB3
                            • lstrcpyW.KERNEL32(00000808,?), ref: 73911CBD
                            • GlobalFree.KERNEL32(00000000), ref: 73911CD0
                            • GlobalFree.KERNEL32(?), ref: 73911DB2
                            • GlobalFree.KERNEL32(?), ref: 73911DB7
                            • GlobalFree.KERNEL32(?), ref: 73911DBC
                            • GlobalFree.KERNEL32(00000000), ref: 73911FA6
                            • lstrcpyW.KERNEL32(?,?), ref: 73912140
                            • GetModuleHandleW.KERNEL32(00000008), ref: 739121B5
                            • LoadLibraryW.KERNEL32(00000008), ref: 739121C6
                            • GetProcAddress.KERNEL32(?,?), ref: 73912220
                            • lstrlenW.KERNEL32(00000808), ref: 7391223A
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                            • String ID:
                            • API String ID: 245916457-0
                            • Opcode ID: acf1bf1439acaca62174896b48680df8f7db77e69c8feeb42ca97d8ff80b6b14
                            • Instruction ID: 1a6c2af2e717a05b1016ddf4260fd8c421f75eb36d5a36b52dee8a7be23b64e1
                            • Opcode Fuzzy Hash: acf1bf1439acaca62174896b48680df8f7db77e69c8feeb42ca97d8ff80b6b14
                            • Instruction Fuzzy Hash: B222AA76D0420FEBDB25DFA489807EEB7B9FB08345F50452AD1A6B7284D77096A0CB43
                            APIs
                            • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                            Strings
                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes, xrefs: 004021C3
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CreateInstance
                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Livmoderens15\Skuespilforfatternes
                            • API String ID: 542301482-736155189
                            • Opcode ID: c79f9aaaf2aa45103f2785abe1c238f1ff8b7e426493679be1bb18482ad01322
                            • Instruction ID: 47658dbbd12ee8008517b47355d5d9d52026a5fb35fba2bce99957a22e6c3eef
                            • Opcode Fuzzy Hash: c79f9aaaf2aa45103f2785abe1c238f1ff8b7e426493679be1bb18482ad01322
                            • Instruction Fuzzy Hash: 8B414C71A00208AFCF04DFE4C988A9D7BB5FF48314B24457AF915EB2E0DBB99981CB44
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID:
                            • String ID: p!C$p!C
                            • API String ID: 0-3125587631
                            • Opcode ID: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                            • Instruction ID: 7c26ffe8835462b5285d43e9ad3b72979f058f3642fe5300250d3649f4ae0bba
                            • Opcode Fuzzy Hash: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                            • Instruction Fuzzy Hash: 9BC15831E04219DBDF18CF68C8905EEBBB2BF88314F25866AC85677380D734A942CF95
                            APIs
                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402877
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: FileFindFirst
                            • String ID:
                            • API String ID: 1974802433-0
                            • Opcode ID: d976f7a25d9b6cda02430a9c4c43dcf534a7d9685ff1e4a5993e34d41637e130
                            • Instruction ID: 0cd4a400be5c1b2ce6ea5bbb35e8853c3f48bcc8ff45a2cab7902aaadd26400c
                            • Opcode Fuzzy Hash: d976f7a25d9b6cda02430a9c4c43dcf534a7d9685ff1e4a5993e34d41637e130
                            • Instruction Fuzzy Hash: C8F08271A14104EFDB00EBA4DA499ADB378EF04314F6045BBF515F21D1DBB45D409B29
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                            • Instruction ID: 703def0becceeecb9d8561ea32c53bcab4b84ebc773a8a1d0b412cad538f794c
                            • Opcode Fuzzy Hash: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                            • Instruction Fuzzy Hash: 1EE1797190470ADFDB24CF99C880BAAB7F5FF44305F15852EE497A7291E378AA91CB04
                            Memory Dump Source
                            • Source File: 00000000.00000002.3843484881.0000000003392000.00000040.00001000.00020000.00000000.sdmp, Offset: 03392000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_3392000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fe136019684b61499cfd5d49b0794ce8f6e2dd2705c12c5a51e334a54c29f0c2
                            • Instruction ID: 3308c0690d1b94369044fe12b66e992bac7cf4adc7869e229798d9e0c2fa2d93
                            • Opcode Fuzzy Hash: fe136019684b61499cfd5d49b0794ce8f6e2dd2705c12c5a51e334a54c29f0c2
                            • Instruction Fuzzy Hash: FB71AE366043418FEB249E398EA87CB77A7AF553A0F56816ECC959F1D5D730C482CB06
                            APIs
                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403D94
                            • ShowWindow.USER32(?), ref: 00403DB1
                            • DestroyWindow.USER32 ref: 00403DC5
                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403DE1
                            • GetDlgItem.USER32(?,?), ref: 00403E02
                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403E16
                            • IsWindowEnabled.USER32(00000000), ref: 00403E1D
                            • GetDlgItem.USER32(?,00000001), ref: 00403ECB
                            • GetDlgItem.USER32(?,00000002), ref: 00403ED5
                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403EEF
                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403F40
                            • GetDlgItem.USER32(?,00000003), ref: 00403FE6
                            • ShowWindow.USER32(00000000,?), ref: 00404007
                            • EnableWindow.USER32(?,?), ref: 00404019
                            • EnableWindow.USER32(?,?), ref: 00404034
                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040404A
                            • EnableMenuItem.USER32(00000000), ref: 00404051
                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404069
                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040407C
                            • lstrlenW.KERNEL32(0042D248,?,0042D248,00000000), ref: 004040A6
                            • SetWindowTextW.USER32(?,0042D248), ref: 004040BA
                            • ShowWindow.USER32(?,0000000A), ref: 004041EE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                            • String ID:
                            • API String ID: 184305955-0
                            • Opcode ID: 7123d0eaadf85c37b7798e08e10b1c5fe4a9df0faa1dcc76925985b39ebaeda9
                            • Instruction ID: e03fc219ec92158800d4d40d681534e4389e9639ccb8e5563fa4604b390d03ca
                            • Opcode Fuzzy Hash: 7123d0eaadf85c37b7798e08e10b1c5fe4a9df0faa1dcc76925985b39ebaeda9
                            • Instruction Fuzzy Hash: 29C1D171600300ABDB216F61ED89E2B3AB8FB95746F04053EF641B51F0CB799982DB6D
                            APIs
                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040448E
                            • GetDlgItem.USER32(?,000003E8), ref: 004044A2
                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004044BF
                            • GetSysColor.USER32(?), ref: 004044D0
                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004044DE
                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004044EC
                            • lstrlenW.KERNEL32(?), ref: 004044F1
                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004044FE
                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404513
                            • GetDlgItem.USER32(?,0000040A), ref: 0040456C
                            • SendMessageW.USER32(00000000), ref: 00404573
                            • GetDlgItem.USER32(?,000003E8), ref: 0040459E
                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004045E1
                            • LoadCursorW.USER32(00000000,00007F02), ref: 004045EF
                            • SetCursor.USER32(00000000), ref: 004045F2
                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040460B
                            • SetCursor.USER32(00000000), ref: 0040460E
                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040463D
                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040464F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                            • String ID: Call$N$gC@
                            • API String ID: 3103080414-2733886405
                            • Opcode ID: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                            • Instruction ID: 67960cbe9d5dd80a83daf25f2437327cccbb0fafcef4e9f4d39b28ee92a42e65
                            • Opcode Fuzzy Hash: 353f568027e9435f0b10a007412a0fb7b671a4650aedb506db2b7bc5b58b0be6
                            • Instruction Fuzzy Hash: ED618FB1900209BFDB109F60DD85EAA7B79FB84345F00853AF605B62D0D77DA951CFA8
                            APIs
                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                            • BeginPaint.USER32(?,?), ref: 00401047
                            • GetClientRect.USER32(?,?), ref: 0040105B
                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                            • DeleteObject.GDI32(?), ref: 004010ED
                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                            • SelectObject.GDI32(00000000,?), ref: 00401140
                            • DrawTextW.USER32(00000000,00433EE0,000000FF,00000010,00000820), ref: 00401156
                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                            • DeleteObject.GDI32(?), ref: 00401165
                            • EndPaint.USER32(?,?), ref: 0040116E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                            • String ID: F
                            • API String ID: 941294808-1304234792
                            • Opcode ID: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                            • Instruction ID: 68187ad06c86d7515f13608b457f8be07a0117cb3bcf177897c910b083aea3f1
                            • Opcode Fuzzy Hash: e215112caf94b1f54c3d659d29471f2010c28c8ad64a223ce82802b434a3cd12
                            • Instruction Fuzzy Hash: 9A418C71800209AFCF058F95DE459AF7BB9FF44315F00842AF591AA1A0C778EA54DFA4
                            APIs
                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004060A1,?,?), ref: 00405F41
                            • GetShortPathNameW.KERNEL32(?,004308E8,00000400), ref: 00405F4A
                              • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                              • Part of subcall function 00405D15: lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                            • GetShortPathNameW.KERNEL32(?,004310E8,00000400), ref: 00405F67
                            • wsprintfA.USER32 ref: 00405F85
                            • GetFileSize.KERNEL32(00000000,00000000,004310E8,C0000000,00000004,004310E8,?,?,?,?,?), ref: 00405FC0
                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FCF
                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406007
                            • SetFilePointer.KERNEL32(0040A560,00000000,00000000,00000000,00000000,004304E8,00000000,-0000000A,0040A560,00000000,[Rename],00000000,00000000,00000000), ref: 0040605D
                            • GlobalFree.KERNEL32(00000000), ref: 0040606E
                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406075
                              • Part of subcall function 00405DB0: GetFileAttributesW.KERNELBASE(?,00402F1D,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405DB4
                              • Part of subcall function 00405DB0: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,00000006,00000008,0000000A), ref: 00405DD6
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                            • String ID: %ls=%ls$[Rename]
                            • API String ID: 2171350718-461813615
                            • Opcode ID: 19ce75182fe0bcfe9ef27c5950cf2d0ac50ba1a4511b366fbaff45796f309885
                            • Instruction ID: 4536b0422d5dde00314373cba87b6dc9e05edcb010d47b65b9eea0f1bfd6f862
                            • Opcode Fuzzy Hash: 19ce75182fe0bcfe9ef27c5950cf2d0ac50ba1a4511b366fbaff45796f309885
                            • Instruction Fuzzy Hash: 5A313531641B04BBC220AB659D48F6B3AACEF45744F15003FFA46F62D2DB7C98118ABD
                            APIs
                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065B1
                            • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004065C0
                            • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065C5
                            • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe",0040336A,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 004065D8
                            Strings
                            • "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe", xrefs: 0040654E
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040654F, 00406554
                            • *?|<>/":, xrefs: 004065A0
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Char$Next$Prev
                            • String ID: "C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                            • API String ID: 589700163-2696618645
                            • Opcode ID: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                            • Instruction ID: 36fae6fd7d65e337959ab81909abbfc549fe516cf0b4c9ff473ab524d2c4c229
                            • Opcode Fuzzy Hash: f2dbc7d310367101a7bf5127f564121aa95c210a65fb008c6410ea5a4ac792ac
                            • Instruction Fuzzy Hash: B611B65580061279DB302B14BC40EB762F8EF54764F56403FED86732C8EBBC5C9292AD
                            APIs
                            • GetWindowLongW.USER32(?,000000EB), ref: 004042B5
                            • GetSysColor.USER32(00000000), ref: 004042F3
                            • SetTextColor.GDI32(?,00000000), ref: 004042FF
                            • SetBkMode.GDI32(?,?), ref: 0040430B
                            • GetSysColor.USER32(?), ref: 0040431E
                            • SetBkColor.GDI32(?,?), ref: 0040432E
                            • DeleteObject.GDI32(?), ref: 00404348
                            • CreateBrushIndirect.GDI32(?), ref: 00404352
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                            • String ID:
                            • API String ID: 2320649405-0
                            • Opcode ID: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                            • Instruction ID: a3c6a1d12b74a4a342abaca89036a15a37f51972f1e3113ed1cbee018e9c0b42
                            • Opcode Fuzzy Hash: cedac81959eb3ef19a74f908d68e4e703a61b794166ebd5b231b869c6a402091
                            • Instruction Fuzzy Hash: 772156716007059BC724DF78D948B5B77F4AF81710B04893DED96A26E0D734E544CB54
                            APIs
                            • lstrlenW.KERNEL32(0042C228,00000000,0041DA00,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000,?), ref: 0040535A
                            • lstrlenW.KERNEL32(0040327A,0042C228,00000000,0041DA00,755723A0,?,?,?,?,?,?,?,?,?,0040327A,00000000), ref: 0040536A
                            • lstrcatW.KERNEL32(0042C228,0040327A,0040327A,0042C228,00000000,0041DA00,755723A0), ref: 0040537D
                            • SetWindowTextW.USER32(0042C228,0042C228), ref: 0040538F
                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004053B5
                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004053CF
                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 004053DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                            • String ID:
                            • API String ID: 2531174081-0
                            • Opcode ID: 74e9fe34f80c9fd4ff69564e83979c50d7f5e186eca222eace7b8ab87805a7eb
                            • Instruction ID: 851cb2e595d07e8670ef4c489cf40fd5108cb81fe88e509cf6dd9e4b353e565e
                            • Opcode Fuzzy Hash: 74e9fe34f80c9fd4ff69564e83979c50d7f5e186eca222eace7b8ab87805a7eb
                            • Instruction Fuzzy Hash: 20218371900518BACF11AFA5DD859CFBFB9EF45350F14807AF904B62A0C7B94A40DFA8
                            APIs
                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C07
                            • GetMessagePos.USER32 ref: 00404C0F
                            • ScreenToClient.USER32(?,?), ref: 00404C29
                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404C3B
                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404C61
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Message$Send$ClientScreen
                            • String ID: f
                            • API String ID: 41195575-1993550816
                            • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                            • Instruction ID: 457ccdd811883e010b73e4973708530e0d9e00004b69c5e73a61d7a3cd07de8f
                            • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                            • Instruction Fuzzy Hash: CF015271900218BAEB10DBA4DD85BFEBBBCAF95711F10412BBA50B71D0D7B499018BA4
                            APIs
                            • GetDC.USER32(?), ref: 00401DBC
                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD6
                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DDE
                            • ReleaseDC.USER32(?,00000000), ref: 00401DEF
                            • CreateFontIndirectW.GDI32(0040CDD0), ref: 00401E3E
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CapsCreateDeviceFontIndirectRelease
                            • String ID: Calibri
                            • API String ID: 3808545654-1409258342
                            • Opcode ID: f18babf6a3f54167651d4878a138e52fe532a855dc2a3d8ed9c0da916718800c
                            • Instruction ID: ba082d56d8bf6e999078db2812661e05c0675f9cd89887cb5e118dc0f9610a58
                            • Opcode Fuzzy Hash: f18babf6a3f54167651d4878a138e52fe532a855dc2a3d8ed9c0da916718800c
                            • Instruction Fuzzy Hash: CF015E71944240EFE700ABB0AF4AAD97FB4AF55301F10457EE242F61E2DAB904458B2D
                            APIs
                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E11
                            • MulDiv.KERNEL32(000BA9AF,00000064,000BA9B3), ref: 00402E3C
                            • wsprintfW.USER32 ref: 00402E4C
                            • SetWindowTextW.USER32(?,?), ref: 00402E5C
                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E6E
                            Strings
                            • verifying installer: %d%%, xrefs: 00402E46
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Text$ItemTimerWindowwsprintf
                            • String ID: verifying installer: %d%%
                            • API String ID: 1451636040-82062127
                            • Opcode ID: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                            • Instruction ID: 97abdd23f95b89fa957f28f44bfdcbbe1494948371ff671501e6f707f2390605
                            • Opcode Fuzzy Hash: e1d542de2cd716b5e5aca43617af61348071ba80885408b45aa8db9304e84829
                            • Instruction Fuzzy Hash: B7014F7164020CBBEF209F60DE49FAA3B69AB04304F008439FA06B91E0DBB885558B98
                            APIs
                              • Part of subcall function 7391121B: GlobalAlloc.KERNELBASE(00000040,?,7391123B,?,739112DF,00000019,739111BE,-000000A0), ref: 73911225
                            • GlobalFree.KERNEL32(?), ref: 73912657
                            • GlobalFree.KERNEL32(00000000), ref: 7391268C
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: a90eb48719415e466a4aab77a1418ec743df7e984c87151310ec5437362f8780
                            • Instruction ID: ac56154d2020126dc6e919e49d39be4803533051cfba187e3228c5c8963faa64
                            • Opcode Fuzzy Hash: a90eb48719415e466a4aab77a1418ec743df7e984c87151310ec5437362f8780
                            • Instruction Fuzzy Hash: 8A31057221810EEFDB16BF55C884FAA77BAFB85384324053AF185B7194C7309825CB53
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402901
                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040291D
                            • GlobalFree.KERNEL32(?), ref: 00402956
                            • GlobalFree.KERNEL32(00000000), ref: 00402969
                            • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402981
                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402995
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                            • String ID:
                            • API String ID: 2667972263-0
                            • Opcode ID: 597e252258520be259e8a88870ae804dc8dc3ce230a627ed07a3ee4bfd89a876
                            • Instruction ID: 46c72067781f24dbae578634f425dbba750e376c3d5c902d6f733973cd64d3bf
                            • Opcode Fuzzy Hash: 597e252258520be259e8a88870ae804dc8dc3ce230a627ed07a3ee4bfd89a876
                            • Instruction Fuzzy Hash: 9621AEB1800128BBDF116FA5DE89DDE7E79AF08364F14423AF960762E0CB794C418B98
                            APIs
                            • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dll,00000400,?,?,00000021), ref: 004025E8
                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dll,00000400,?,?,00000021), ref: 004025F3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: ByteCharMultiWidelstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp$C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp\System.dll
                            • API String ID: 3109718747-3933649940
                            • Opcode ID: 18a92599d19568ff8bc05a4b5855478ddca432145c4c7b47034acc93206d5566
                            • Instruction ID: 4af4a56a495a7247eb1268c7c56f37f79310e300d8c273c1dd4748c0a8a00d57
                            • Opcode Fuzzy Hash: 18a92599d19568ff8bc05a4b5855478ddca432145c4c7b47034acc93206d5566
                            • Instruction Fuzzy Hash: 41110872A04301BADB046FB18E89A9F7664AF44398F24443FF103F61D0DAFC89416B5E
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: FreeGlobal
                            • String ID:
                            • API String ID: 2979337801-0
                            • Opcode ID: 9797e6dc0f6b9e91b2374a10f9e3067e7f82842c47ca63b57d37d6df448c53c6
                            • Instruction ID: 8a76e3da2966ac09d06ab7db55873396a0b708551a1d73959f0ff509f539673f
                            • Opcode Fuzzy Hash: 9797e6dc0f6b9e91b2374a10f9e3067e7f82842c47ca63b57d37d6df448c53c6
                            • Instruction Fuzzy Hash: 3851C432D0415FFBEB129FA485407ADBFBEEB44294F08425AD406B3284D670AEF18797
                            APIs
                            • GlobalFree.KERNEL32(00000000), ref: 739124D6
                              • Part of subcall function 7391122C: lstrcpynW.KERNEL32(00000000,?,739112DF,00000019,739111BE,-000000A0), ref: 7391123C
                            • GlobalAlloc.KERNEL32(00000040), ref: 7391245C
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 73912477
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                            • String ID:
                            • API String ID: 4216380887-0
                            • Opcode ID: 19f392ca3efcda186646be2839a7d104a90dd783e7bc90d3709d4ac90918042c
                            • Instruction ID: e218fddac631077c110bf4c33bf88b184037173013d7658b01d6ed86079d89c7
                            • Opcode Fuzzy Hash: 19f392ca3efcda186646be2839a7d104a90dd783e7bc90d3709d4ac90918042c
                            • Instruction Fuzzy Hash: E841D1B100830EEFD315FF65D844BA677B8EB58310B10482DE48AAB584EB30A465DBA3
                            APIs
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,739121EC,?,00000808), ref: 73911635
                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,739121EC,?,00000808), ref: 7391163C
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,739121EC,?,00000808), ref: 73911650
                            • GetProcAddress.KERNEL32(739121EC,00000000), ref: 73911657
                            • GlobalFree.KERNEL32(00000000), ref: 73911660
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                            • String ID:
                            • API String ID: 1148316912-0
                            • Opcode ID: 980dcbe141eeaeb584ba7770f3e7dabd79fad73c0866b790e0747735f2a25049
                            • Instruction ID: f0aa3edaf2775df93a00a215cb6b34d97a64ff200d12194eb040a7478f52492f
                            • Opcode Fuzzy Hash: 980dcbe141eeaeb584ba7770f3e7dabd79fad73c0866b790e0747735f2a25049
                            • Instruction Fuzzy Hash: 23F0127310A1387BD62026A78C4CD9B7EACDF8F6F5B120221F61CA219095618D01D7F1
                            APIs
                            • GetDlgItem.USER32(?,?), ref: 00401D63
                            • GetClientRect.USER32(00000000,?), ref: 00401D70
                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D91
                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D9F
                            • DeleteObject.GDI32(00000000), ref: 00401DAE
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                            • String ID:
                            • API String ID: 1849352358-0
                            • Opcode ID: 0f39d9f12d53ff93ed05ad22e5c2654e25c024a76bc5e8eaad46146554dabe63
                            • Instruction ID: f6b005b132729ba5a1909f4a704d5e159ac18246d791616e3be01574202a0a4f
                            • Opcode Fuzzy Hash: 0f39d9f12d53ff93ed05ad22e5c2654e25c024a76bc5e8eaad46146554dabe63
                            • Instruction Fuzzy Hash: 4EF0FF72A04518AFDB01DBE4DF88CEEB7BCEB48301B14047AF641F61A0CA749D419B38
                            APIs
                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C8F
                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA7
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: MessageSend$Timeout
                            • String ID: !
                            • API String ID: 1777923405-2657877971
                            • Opcode ID: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                            • Instruction ID: 9b2162bbfebbb1b7b3748198b6c02d748cac4cdb6124cb19748b2f92d1b33cd7
                            • Opcode Fuzzy Hash: 7e3eeff1b63bcc2d517f183bf836ef2b026841584b0bf51ee9d38dd24623c36e
                            • Instruction Fuzzy Hash: 8E219371948209AEEF059FB5DE4AABE7BB5EF84304F14443EF605B61D0D7B889409B18
                            APIs
                            • lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404B7F
                            • wsprintfW.USER32 ref: 00404B88
                            • SetDlgItemTextW.USER32(?,0042D248), ref: 00404B9B
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: ItemTextlstrlenwsprintf
                            • String ID: %u.%u%s%s
                            • API String ID: 3540041739-3551169577
                            • Opcode ID: 667e92691d3a32f7dc764ef490f0f11e5b3d1f36831efa1286417e207b6162a7
                            • Instruction ID: 49dacc2217062e77d4dc452dcd456e10a33323318ced1260d8f84a7edb165714
                            • Opcode Fuzzy Hash: 667e92691d3a32f7dc764ef490f0f11e5b3d1f36831efa1286417e207b6162a7
                            • Instruction Fuzzy Hash: D911C3736041283ADB00656D9C46F9E369C9B85334F254237FA25F21D1E979D82182E8
                            APIs
                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp,00000023,00000011,00000002), ref: 0040242F
                            • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp,00000000,00000011,00000002), ref: 0040246F
                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp,00000000,00000011,00000002), ref: 00402557
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CloseValuelstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\nsfCF9A.tmp
                            • API String ID: 2655323295-1415516051
                            • Opcode ID: 476ed8c7c4dcb631ffcdca5b1d3dc3ea86019fa5d160a259efe562ff2e5954af
                            • Instruction ID: 076fdad28fc4eb621c0ae83062707e46e05f76c541c0890e85279b1380dde0ba
                            • Opcode Fuzzy Hash: 476ed8c7c4dcb631ffcdca5b1d3dc3ea86019fa5d160a259efe562ff2e5954af
                            • Instruction Fuzzy Hash: F1118471D00108BEEB10AFA5DE89EAEBA74EB44754F15803BF504F71D1DBB48D409B28
                            APIs
                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 00405B95
                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040337C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75573420,004035D9,?,00000006,00000008,0000000A), ref: 00405B9F
                            • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405BB1
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B8F
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CharPrevlstrcatlstrlen
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 2659869361-4083868402
                            • Opcode ID: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                            • Instruction ID: 9f579dd6f6e84daacee8b4087b975d8f345068127d43d06e1f6a06445f68851b
                            • Opcode Fuzzy Hash: cc3b6fad2320eb0d125534955cb1fe8af3638bf69e103b669ecb1462063790d4
                            • Instruction Fuzzy Hash: C8D05E31101534AAC111BF448D04CDF72ACAE45344742007AF501B20A2C7B82D5186FE
                            APIs
                            • DestroyWindow.USER32(00000000,00000000,00403059,00000001,?,00000006,00000008,0000000A), ref: 00402E8C
                            • GetTickCount.KERNEL32 ref: 00402EAA
                            • CreateDialogParamW.USER32(0000006F,00000000,00402DF3,00000000), ref: 00402EC7
                            • ShowWindow.USER32(00000000,00000005,?,00000006,00000008,0000000A), ref: 00402ED5
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                            • String ID:
                            • API String ID: 2102729457-0
                            • Opcode ID: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                            • Instruction ID: ba23c68ca914eac1f4c080bcf69ea635dc5c4ffa9688b42209883b937cdf97fb
                            • Opcode Fuzzy Hash: 5c4e852214d6767aab513baeadf18d74bcc02012da70e31d5af0b3f9b2778c41
                            • Instruction Fuzzy Hash: 7FF03A30541630FBC6706B20FE0DA8B7B65FB44B02B42497AF002A19A4C7B849818ADC
                            APIs
                            • IsWindowVisible.USER32(?), ref: 004052C5
                            • CallWindowProcW.USER32(?,?,?,?), ref: 00405316
                              • Part of subcall function 0040427D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040428F
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Window$CallMessageProcSendVisible
                            • String ID:
                            • API String ID: 3748168415-3916222277
                            • Opcode ID: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                            • Instruction ID: 81d983181078a42bdaaa38d141d1896fcab4c42a172a92442cc7f35772e796f5
                            • Opcode Fuzzy Hash: 724b08e39b448c58c7649a37dc1be8b90ebc0ba8e0923a3b5611d97535f2409a
                            • Instruction Fuzzy Hash: 8E018431200709EBDF205F51DDD4A5B7B25EB84794F50507BFA00751D0D7BA8C929E2E
                            APIs
                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,0042C228,00000000,?,?,Call,?,?,004063FC,80000002), ref: 004061CE
                            • RegCloseKey.ADVAPI32(?,?,004063FC,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,0042C228), ref: 004061D9
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CloseQueryValue
                            • String ID: Call
                            • API String ID: 3356406503-1824292864
                            • Opcode ID: 10557ccebddc974baa13a8be622e9b5680c4afd7942ecc434493cd2fadbdf3ae
                            • Instruction ID: dbe656cbcd6f76d760dfbfd9a3b1c67a2d3549b4381969b9bec3f5648691b042
                            • Opcode Fuzzy Hash: 10557ccebddc974baa13a8be622e9b5680c4afd7942ecc434493cd2fadbdf3ae
                            • Instruction Fuzzy Hash: 22017C72500209EADF218F51CD09EDB3BA8EB55364F01803AFD16A61A1D778D964EBA4
                            APIs
                            • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 004058CC
                            • CloseHandle.KERNEL32(?), ref: 004058D9
                            Strings
                            • Error launching installer, xrefs: 004058B6
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CloseCreateHandleProcess
                            • String ID: Error launching installer
                            • API String ID: 3712363035-66219284
                            • Opcode ID: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                            • Instruction ID: eef1ad79794a30a774d0e472c728ed5028324d39c85b098150df6d3db2f5c38f
                            • Opcode Fuzzy Hash: 26b27946013451d7cc559816144a6cf351020ce627575371dc693c6ec487af4b
                            • Instruction Fuzzy Hash: 93E092B5600209BFEB00AB64ED49F7BBBACEB04704F508565BD51F2290D778EC148A78
                            APIs
                            • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75573420,004038ED,00403703,00000006,?,00000006,00000008,0000000A), ref: 0040392F
                            • GlobalFree.KERNEL32(?), ref: 00403936
                            Strings
                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403927
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Free$GlobalLibrary
                            • String ID: C:\Users\user\AppData\Local\Temp\
                            • API String ID: 1100898210-4083868402
                            • Opcode ID: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                            • Instruction ID: cd662c2fc9a96c5040b18d0515cf0ea54f7952519699f51ce209c07819915f51
                            • Opcode Fuzzy Hash: 458fb59c7289fd05ef48150b7000eed9d6dd19151a6e1d3204a1ea3f1dd8076b
                            • Instruction Fuzzy Hash: 20E0C2335016209BC6215F04ED08B5E776CAF58B32F05447AF8807B26087B81C838FD8
                            APIs
                            • lstrlenW.KERNEL32(?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BE1
                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\Desktop,00402F49,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,C:\Users\user\Desktop\DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exe,80000000,00000003,?,00000006,00000008,0000000A), ref: 00405BF1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: CharPrevlstrlen
                            • String ID: C:\Users\user\Desktop
                            • API String ID: 2709904686-1876063424
                            • Opcode ID: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                            • Instruction ID: aeb767edbde6605fb3f6e877d1e8e55744b908c0e0c9ef55a7edb7ad10a4fca3
                            • Opcode Fuzzy Hash: e4f7a16c0d3aeb27420e4918e5816bacf7b9900a4c75110623d7ea7fd9e9117e
                            • Instruction Fuzzy Hash: D9D05EB2414920DAC3126B04DC40D9F73ACEF11300B4A446AE440A61A1D7786C8186AD
                            APIs
                            • GlobalAlloc.KERNEL32(00000040,?), ref: 7391116A
                            • GlobalFree.KERNEL32(00000000), ref: 739111C7
                            • GlobalFree.KERNEL32(00000000), ref: 739111D9
                            • GlobalFree.KERNEL32(?), ref: 73911203
                            Memory Dump Source
                            • Source File: 00000000.00000002.3845191510.0000000073911000.00000020.00000001.01000000.00000005.sdmp, Offset: 73910000, based on PE: true
                            • Associated: 00000000.00000002.3845140622.0000000073910000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845206386.0000000073914000.00000002.00000001.01000000.00000005.sdmpDownload File
                            • Associated: 00000000.00000002.3845219748.0000000073916000.00000002.00000001.01000000.00000005.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_73910000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: Global$Free$Alloc
                            • String ID:
                            • API String ID: 1780285237-0
                            • Opcode ID: 64ee4f3c392431b641f4823e16b21b8c413f68b03594cc2f658bc9a3e9cb5b55
                            • Instruction ID: f410e1cc925ad590f830f5ee6497cd66a4d518303b5aa3678d17ae11a67931ae
                            • Opcode Fuzzy Hash: 64ee4f3c392431b641f4823e16b21b8c413f68b03594cc2f658bc9a3e9cb5b55
                            • Instruction Fuzzy Hash: B431A1B250820BFFE7419FAAC944B2AB7FCEB452507150529E84AFB254E734D860CB62
                            APIs
                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D25
                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D3D
                            • CharNextA.USER32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D4E
                            • lstrlenA.KERNEL32(00000000,?,00000000,00405FFA,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D57
                            Memory Dump Source
                            • Source File: 00000000.00000002.3842989084.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                            • Associated: 00000000.00000002.3842968880.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843014488.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843033507.0000000000450000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3843184990.0000000000453000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_400000_DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.jbxd
                            Similarity
                            • API ID: lstrlen$CharNextlstrcmpi
                            • String ID:
                            • API String ID: 190613189-0
                            • Opcode ID: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                            • Instruction ID: cc601e2af81a4130f3690bf6756e9ae730db34a97aa71f580e1783f9e5236296
                            • Opcode Fuzzy Hash: 6db5b03da17fe1faae21ad7e2c869b7ed7bb68520138c246bcc2ad94f2104a67
                            • Instruction Fuzzy Hash: 3DF0F631200818FFC7129FA4DD049AFBBA8EF06354B2580BAE840F7211D634DE02AF98