Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DHL_67329033929228____________________________.exe

Overview

General Information

Sample name:DHL_67329033929228____________________________.exe
Analysis ID:1446075
MD5:4b772cc6a4b591eff3de738e5cc5aca5
SHA1:38f2aa48812118afc7631b2cf898832621228554
SHA256:1115e56ad66e65c4934967fc18da11d5caceb4e96cc9567366764c93d47beeb7
Tags:AgentTeslaDHLexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension File Execution
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • DHL_67329033929228____________________________.exe (PID: 4296 cmdline: "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe" MD5: 4B772CC6A4B591EFF3DE738E5CC5ACA5)
    • RegSvcs.exe (PID: 3172 cmdline: "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.worlorderbillions.top", "Username": "nwammuoocha@worlorderbillions.top", "Password": "vqpF.#;cCodu                                   "}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2497826249.000000000259A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.DHL_67329033929228____________________________.exe.d30000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.DHL_67329033929228____________________________.exe.d30000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.DHL_67329033929228____________________________.exe.d30000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x320af:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32121:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x321ab:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x3223d:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x322a7:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x32319:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x323af:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x3243f:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 4 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe", CommandLine: "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe", CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\DHL_67329033929228____________________________.exe, NewProcessName: C:\Users\user\Desktop\DHL_67329033929228____________________________.exe, OriginalFileName: C:\Users\user\Desktop\DHL_67329033929228____________________________.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe", ProcessId: 4296, ProcessName: DHL_67329033929228____________________________.exe
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.244.151.84, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 3172, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49699
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: DHL_67329033929228____________________________.exeAvira: detected
                    Source: http://mail.worlorderbillions.topAvira URL Cloud: Label: phishing
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.worlorderbillions.top", "Username": "nwammuoocha@worlorderbillions.top", "Password": "vqpF.#;cCodu "}
                    Source: DHL_67329033929228____________________________.exeReversingLabs: Detection: 50%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                    Source: DHL_67329033929228____________________________.exeJoe Sandbox ML: detected
                    Source: DHL_67329033929228____________________________.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: DHL_67329033929228____________________________.exe, 00000000.00000003.1258174555.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, DHL_67329033929228____________________________.exe, 00000000.00000003.1257015443.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: DHL_67329033929228____________________________.exe, 00000000.00000003.1258174555.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, DHL_67329033929228____________________________.exe, 00000000.00000003.1257015443.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E24696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E24696
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E2F200
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E2F35D
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E2F65E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00E2C9C7
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2C93C FindFirstFileW,FindClose,0_2_00E2C93C
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E23A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E23A2B
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E23D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E23D4E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E2BF27
                    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 185.244.151.84:587
                    Source: Joe Sandbox ViewIP Address: 185.244.151.84 185.244.151.84
                    Source: Joe Sandbox ViewIP Address: 185.244.151.84 185.244.151.84
                    Source: global trafficTCP traffic: 192.168.2.7:49699 -> 185.244.151.84:587
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E325E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00E325E2
                    Source: global trafficDNS traffic detected: DNS query: mail.worlorderbillions.top
                    Source: RegSvcs.exe, 00000002.00000002.2499701664.0000000005790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2499701664.00000000057B6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                    Source: RegSvcs.exe, 00000002.00000002.2499701664.00000000057F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: RegSvcs.exe, 00000002.00000002.2499701664.00000000057B6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2499701664.000000000580D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                    Source: RegSvcs.exe, 00000002.00000002.2499701664.0000000005790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2499701664.00000000057B6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
                    Source: RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.worlorderbillions.top
                    Source: RegSvcs.exe, 00000002.00000002.2499701664.0000000005790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2499701664.00000000057B6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2499701664.000000000580D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://worlorderbillions.top
                    Source: DHL_67329033929228____________________________.exe, 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                    Source: RegSvcs.exe, 00000002.00000002.2499701664.0000000005790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2499701664.00000000057B6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, gmBpn1ecBmQ.cs.Net Code: ouKZnILwf
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E3425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E3425A
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E34458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00E34458
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E3425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00E3425A
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E21121 GetKeyState,GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00E21121
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E4CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00E4CDAC

                    System Summary

                    barindex
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 2.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: This is a third-party compiled AutoIt script.0_2_00DC3B4C
                    Source: DHL_67329033929228____________________________.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: DHL_67329033929228____________________________.exe, 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_cab1ca4c-0
                    Source: DHL_67329033929228____________________________.exe, 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ba3ec6ce-5
                    Source: DHL_67329033929228____________________________.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_db75966c-6
                    Source: DHL_67329033929228____________________________.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c3f76648-b
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E240B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00E240B1
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E18858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00E18858
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00E2545F
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DCE8000_2_00DCE800
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DEDBB50_2_00DEDBB5
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E4804A0_2_00E4804A
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DCE0600_2_00DCE060
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF70060_2_00DF7006
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DD31900_2_00DD3190
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DD41400_2_00DD4140
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DD710E0_2_00DD710E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DC12870_2_00DC1287
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DEF4190_2_00DEF419
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF65220_2_00DF6522
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DE16C40_2_00DE16C4
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DD56800_2_00DD5680
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E406650_2_00E40665
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF267E0_2_00DF267E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DE78D30_2_00DE78D3
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DD58C00_2_00DD58C0
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DD68430_2_00DD6843
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF89DF0_2_00DF89DF
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E40AE20_2_00E40AE2
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF6A940_2_00DF6A94
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DD8A0E0_2_00DD8A0E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E1EB070_2_00E1EB07
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E28B130_2_00E28B13
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DECD610_2_00DECD61
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF9D050_2_00DF9D05
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DCFE400_2_00DCFE40
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DEBFE60_2_00DEBFE6
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00D236800_2_00D23680
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00924A982_2_00924A98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00929B502_2_00929B50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0092CE902_2_0092CE90
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00923E802_2_00923E80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_009241C82_2_009241C8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0599A0682_2_0599A068
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0599BB582_2_0599BB58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B56D02_2_059B56D0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B00402_2_059B0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059BDC8D2_2_059BDC8D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059BBCF82_2_059BBCF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B3F482_2_059B3F48
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B8B802_2_059B8B80
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B2AF82_2_059B2AF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B9AE02_2_059B9AE0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B32372_2_059B3237
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B4FF02_2_059B4FF0
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: String function: 00DE0D27 appears 70 times
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: String function: 00DE8B40 appears 37 times
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: String function: 00DC7F41 appears 34 times
                    Source: DHL_67329033929228____________________________.exe, 00000000.00000003.1255513891.0000000003D8D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL_67329033929228____________________________.exe
                    Source: DHL_67329033929228____________________________.exe, 00000000.00000003.1254345124.0000000003BE3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL_67329033929228____________________________.exe
                    Source: DHL_67329033929228____________________________.exe, 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameda505e73-ce6a-4c37-8e7a-d349dd39df37.exe4 vs DHL_67329033929228____________________________.exe
                    Source: DHL_67329033929228____________________________.exe, 00000000.00000003.1258934272.0000000003C33000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs DHL_67329033929228____________________________.exe
                    Source: DHL_67329033929228____________________________.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 2.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, roEs93G.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, roEs93G.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, JQn0Aia1.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, JQn0Aia1.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, YsrmZ97b.csCryptographic APIs: 'TransformFinalBlock'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2A2D5 GetLastError,FormatMessageW,0_2_00E2A2D5
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E18713 AdjustTokenPrivileges,CloseHandle,0_2_00E18713
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E18CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00E18CC3
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00E2B59E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E3F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00E3F121
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E386D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00E386D0
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DC4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00DC4FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeFile created: C:\Users\user~1\AppData\Local\Temp\autEFD.tmpJump to behavior
                    Source: DHL_67329033929228____________________________.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: DHL_67329033929228____________________________.exeReversingLabs: Detection: 50%
                    Source: unknownProcess created: C:\Users\user\Desktop\DHL_67329033929228____________________________.exe "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: DHL_67329033929228____________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: DHL_67329033929228____________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: DHL_67329033929228____________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: DHL_67329033929228____________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: DHL_67329033929228____________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: DHL_67329033929228____________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: DHL_67329033929228____________________________.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: DHL_67329033929228____________________________.exe, 00000000.00000003.1258174555.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, DHL_67329033929228____________________________.exe, 00000000.00000003.1257015443.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: DHL_67329033929228____________________________.exe, 00000000.00000003.1258174555.0000000003CB0000.00000004.00001000.00020000.00000000.sdmp, DHL_67329033929228____________________________.exe, 00000000.00000003.1257015443.0000000003B10000.00000004.00001000.00020000.00000000.sdmp
                    Source: DHL_67329033929228____________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: DHL_67329033929228____________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: DHL_67329033929228____________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: DHL_67329033929228____________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: DHL_67329033929228____________________________.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E41072 LoadLibraryA,GetProcAddress,0_2_00E41072
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DE8B85 push ecx; ret 0_2_00DE8B98
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_059B60E5 push ebp; iretd 2_2_059B60E8
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E455FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00E455FD
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DC4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00DC4A35
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1908Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 5408Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeAPI coverage: 5.0 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E24696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00E24696
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E2F200
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00E2F35D
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E2F65E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00E2C9C7
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2C93C FindFirstFileW,FindClose,0_2_00E2C93C
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E23A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E23A2B
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E23D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00E23D4E
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E2BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00E2BF27
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DC4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DC4AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99858Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99749Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99640Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99531Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99421Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99312Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99170Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 99062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98946Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98785Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98670Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98559Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98373Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98259Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98151Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 98046Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97937Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97828Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97718Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97606Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97500Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97390Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97281Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97171Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 97062Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96953Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96843Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96734Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96625Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96515Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96406Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96296Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96187Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 96074Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95968Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95782Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 95609Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: RegSvcs.exe, 00000002.00000002.2499701664.00000000057B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllz
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeAPI call chain: ExitProcess graph end nodegraph_0-62966
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E341FD BlockInput,0_2_00E341FD
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DC3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DC3B4C
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00DF5CCC
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E41072 LoadLibraryA,GetProcAddress,0_2_00E41072
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00D23570 mov eax, dword ptr fs:[00000030h]0_2_00D23570
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00D23510 mov eax, dword ptr fs:[00000030h]0_2_00D23510
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00D21ED0 mov eax, dword ptr fs:[00000030h]0_2_00D21ED0
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E181F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00E181F7
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DEA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00DEA395
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DEA364 SetUnhandledExceptionFilter,0_2_00DEA364
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 262008Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E18C93 LogonUserW,0_2_00E18C93
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DC3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00DC3B4C
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E217D7 SendInput,keybd_event,0_2_00E217D7
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E373B1 GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00E373B1
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E181F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00E181F7
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E24C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00E24C03
                    Source: DHL_67329033929228____________________________.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: DHL_67329033929228____________________________.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DE886B cpuid 0_2_00DE886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00DF50D7
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DF418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00DF418A
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00DC4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00DC4AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2497826249.000000000259A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2497826249.0000000002521000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL_67329033929228____________________________.exe PID: 4296, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3172, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2497826249.0000000002521000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL_67329033929228____________________________.exe PID: 4296, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3172, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.DHL_67329033929228____________________________.exe.d30000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 2.2.RegSvcs.exe.530000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000002.00000002.2497826249.000000000259A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000002.00000002.2497826249.0000000002521000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: DHL_67329033929228____________________________.exe PID: 4296, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3172, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E36596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00E36596
                    Source: C:\Users\user\Desktop\DHL_67329033929228____________________________.exeCode function: 0_2_00E36A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00E36A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    2
                    File and Directory Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    38
                    System Information Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS141
                    Security Software Discovery
                    Distributed Component Object Model121
                    Input Capture
                    1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets121
                    Virtualization/Sandbox Evasion
                    SSH3
                    Clipboard Data
                    11
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts121
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials2
                    Process Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync11
                    Application Window Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    DHL_67329033929228____________________________.exe50%ReversingLabsWin32.Spyware.Negasteal
                    DHL_67329033929228____________________________.exe100%AviraTR/AD.ShellcodeCrypter.grbod
                    DHL_67329033929228____________________________.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://sectigo.com/CPS00%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://mail.worlorderbillions.top100%Avira URL Cloudphishing
                    http://worlorderbillions.top0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    worlorderbillions.top
                    185.244.151.84
                    truefalse
                      unknown
                      mail.worlorderbillions.top
                      unknown
                      unknowntrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://sectigo.com/CPS0RegSvcs.exe, 00000002.00000002.2499701664.0000000005790000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2499701664.00000000057B6000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://mail.worlorderbillions.topRegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: phishing
                        unknown
                        https://account.dyn.com/DHL_67329033929228____________________________.exe, 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://worlorderbillions.topRegSvcs.exe, 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        185.244.151.84
                        worlorderbillions.topNetherlands
                        60117HSAEfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1446075
                        Start date and time:2024-05-22 22:19:01 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 21s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:19
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:DHL_67329033929228____________________________.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 99%
                        • Number of executed functions: 54
                        • Number of non-executed functions: 269
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): www.bing.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, crl3.digicert.com, time.windows.com, crl4.digicert.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: DHL_67329033929228____________________________.exe
                        TimeTypeDescription
                        16:19:58API Interceptor38x Sleep call for process: RegSvcs.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        185.244.151.84https://apiservices.krxd.net/click_tracker/track?kxconfid=whjxbtb0h&_knopii=1&kxcampaignid=P.C.C-Class.W206.L.MI&kxplacementid=module2findmycar&kxbrand=MB&clk=http://WMUHS.penseldraget.com/?email=projectassistant@gheenirrigation.comGet hashmaliciousHTMLPhisherBrowse
                        • wmuhs.penseldraget.com/?email=projectassistant@gheenirrigation.com&_knopii=1
                        https://sites.google.com/view/man-energy-solutions/halaman-mukaGet hashmaliciousHTMLPhisherBrowse
                        • man-energy-solution.duerbcek.com/
                        https://sites.google.com/view/asiatic-lloyd-maritime-llp/halaman-mukaGet hashmaliciousHTMLPhisherBrowse
                        • asiatic-lloyd-maritime.duerbcek.com/
                        https://sites.google.com/view/dnvlimited/halaman-mukaGet hashmaliciousUnknownBrowse
                        • dnv-limited.duerbcek.com/
                        https://veolia-dot-yamm-track.appspot.com/Redirect?ukey=1rYd-S6h21KvcEPO5BLkBWp1KOKV2-Rm-t86fM2DfnMk-177924590&key=YAMMID-18720160&link=http%3A%2F%2Fthrh.tumyphie.com%2FGet hashmaliciousUnknownBrowse
                        • thrh.tumyphie.com/
                        http://mollkiss.mekythkit.onlineGet hashmaliciousUnknownBrowse
                        • mollkiss.mekythkit.online/
                        Friday_ February 5th_ 2021 64427 a.m._ 20210205064427.64791275BD060468@juidine.com.htmlGet hashmaliciousHTMLPhisherBrowse
                        • 185.244.151.84/cgi-sys/suspendedpage.cgi
                        Thursday, February 4th, 2021 103440 p.m., 20210204223440.464D4D4AD1BFDE50@juidine.com.htmlGet hashmaliciousHTMLPhisherBrowse
                        • 185.244.151.84/cgi-sys/suspendedpage.cgi
                        Adjunto-30.docGet hashmaliciousUnknownBrowse
                        • alkamefood.com/y/P/
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        HSAE986eOBuN16.exeGet hashmaliciousAgentTeslaBrowse
                        • 185.244.151.84
                        fGLzN2VXGA.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 185.244.151.84
                        EAP.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 185.244.151.84
                        HVC.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 185.244.151.84
                        SecuriteInfo.com.W32.AutoIt.YE.gen.Eldorado.16327.12658.exeGet hashmaliciousAgentTeslaBrowse
                        • 194.36.191.196
                        PDFT_5347480048_9037734883489_________________________.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 185.244.151.84
                        EKP.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 185.244.151.84
                        1l76GsiiSU.exeGet hashmaliciousAgentTeslaBrowse
                        • 194.36.191.196
                        PO-TR726276201-00538845 GHM-REFU-2024.exeGet hashmaliciousAgentTeslaBrowse
                        • 194.36.191.196
                        Form No 07491227.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        • 185.198.59.26
                        No context
                        No context
                        Process:C:\Users\user\Desktop\DHL_67329033929228____________________________.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):149960
                        Entropy (8bit):7.941189466445465
                        Encrypted:false
                        SSDEEP:3072:B7A5pNxewh0okdnLCoDnAiS7fYyIWt8/2VPu/hW+ROtshKOFBWiXj0:WpNxjh0ZLb7Atc6QphZROyn+
                        MD5:4F782407B391F73C07DFA6EB62684085
                        SHA1:4A64A1639CDA75CA1B5C67795FD03A7EEC24D87F
                        SHA-256:8BFBEF455ADC1CDD81990A8A88C61463C7E8C62FE00664B2E8065B3891308DA4
                        SHA-512:61E1092346CF18055D507E370933D38B31739DC6D3969460FD1AABB125EC0F75F84A3B3F2CAE1AC10FFFFEEA781B34B478B19A101028F78C6F013764A7D5704B
                        Malicious:false
                        Reputation:low
                        Preview:EA06.....@.5..F.R....>.gZ..k5..V.Z.M..I."gZ.....#....J4..A..j.K.....D.3...'*......9..k.)$bUV.Of.{..wq.Gl.9...-...T...&lp....2........].D.D.T.5..J.R..;.I..Vk7..#e4../..... ..j.P....&uq.T.....Sh...f.A.T...MbgZ..]....B.U..":...6..........#..@...#Tn...h...yl.S..3)?...f>...F.......(..}"...........& .FZ....Cj..DvQ*..U..t.".N)...#.Z...!.Z.l............"LkT.,'.[..m.9.......T.....Gr.{...mq.=.{Q.cc..n.....YF.;8.V7.:......3.}^.{u.Mx..Ryj......3...t.L.U..x8...JI_.@h....U..b.{%.[..{......m..]~...}...Ca...'..wE.....j;,.R$.k.rI?.J..l.2.xy......%1.DjaB.C+T.g....[h.g.O..K.3...a+..'`..(.0..n.p..^..S@..p.q...,@..H.T.......N..tiS..{...J|......@...O.K.......A..[*7\/.'W.A2.:.+.^.g(..._....7r....W.7.]*.>.M....j.d.....J.T.Sf5.]..d...<4[.k...;\.vi..o..|......?...uz5.h...r&}.x....T{U.D...R,.It.k<..g..J.".S..8.n#...d.....)3....Q....n.P.P.=..~.Y...f..e..R&.H...]..*5..*.M.O,Z...'Y....pD.ce..)...7w_.Vj.yM.o3..k...z.[..UZ.z.....0...q.Vj...Jo2....i.3cD...0..j....b.]%:...\
                        Process:C:\Users\user\Desktop\DHL_67329033929228____________________________.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):9922
                        Entropy (8bit):7.593609348894606
                        Encrypted:false
                        SSDEEP:192:eyaFcTokbCKr+mfv76SgtVppx6Rs67F/wAvdoYW:AFxkeU+m2SgnppUR97F/JvdjW
                        MD5:D57055B470B1A9211CB8BD81EC8EAA81
                        SHA1:25A20E1DB61846C84796063AD39D43C92F7EDB0D
                        SHA-256:F305180FB7C51D21333084F9140BF2620C0240B08814E3C83047047C3F4C4D15
                        SHA-512:EC3C1E8F3B03435634E0829BBCA53C7F899F805CEB1A174875D88F420C9D9E92907AA4F304AE4630725877401965867FF0729FA2FEB0FF4A6C56665B14F646FE
                        Malicious:false
                        Reputation:low
                        Preview:EA06..t4.M(...aD..fT)..D.Mh.z,.gA....5.......B.Mh..%.mF.Mf....qb.....-..c.L...$.m5...k..c0.M....k8.X.3i...l..%.o2....A8.6,.........3k....e.N&s0.oNf.)...k.K$.eb....5..f.........6.0.o.p....l39....V0...S..$.if...6....f.I...@.....i8........X@.4.1..........$.P...0z.5..$}3Y.....=5..`d....!d..V...7f.[$..8...|.I..W.d...|vI..W.d...|vK..W.d...|vK(.W.e...|vY..W,.O...k.`..X@..9..^.8..F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn.
                        Process:C:\Users\user\Desktop\DHL_67329033929228____________________________.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):243200
                        Entropy (8bit):6.620449499746569
                        Encrypted:false
                        SSDEEP:6144:eKhcq+Feii51FJcz626wNkVFjDz2jLgXR+vV5:eKeIiuv2z626+kVp2jLgXRS
                        MD5:120180CD53EA845C56FB043B30EBB1A5
                        SHA1:63C864A72399B9A115F43D13166F978541713B64
                        SHA-256:019F76C4F132C10B03B278DD92279CE28547D9A2ABD8AD6FAD571DF8CA398692
                        SHA-512:1480EF9B3B574B06C4A0D3160427BA351BF04EED749FED0E0FD7250BBAA1253C674BD4C81FF07FD1736AE3EBD356CC77539F2A78AD7EAE3218793A6A13921CF3
                        Malicious:false
                        Reputation:low
                        Preview:...YVQZR33MP.3Z.EYYYUQZ.73MP8H3ZOEYYYUQZR73MP8H3ZOEYYYUQZR7.MP8F,.AE.P.t.[....8Q;.*=*>+88q93Y]"$.*Vz=07y0;q..d. ?\-.WBO}YYUQZR7c.P8.2YO.).?UQZR73MP.H1[DDRYY.RZR?3MP8H3..FYYyUQZ.43MPxH3zOEY[YUUZR73MP8L3ZOEYYYUq^R71MP8H3ZME..YUAZR'3MP8X3Z_EYYYUQJR73MP8H3ZOE.ZU.ZR73.S8.6ZOEYYYUQZR73MP8H3ZOE]YUUQZR73MP8H3ZOEYYYUQZR73MP8H3ZOEYYYUQZR73MP8H3ZOEYYYUqZR?3MP8H3ZOEYYQuQZ.73MP8H3ZOEYw-0).R73I.;H3zOEY.ZUQXR73MP8H3ZOEYYYuQZ2.A>"[H3Z.@YYY.RZR13MP.K3ZOEYYYUQZR73.P8..(*)6:YU]ZR73MT8H1ZOE.ZYUQZR73MP8H3Z.EY.YUQZR73MP8H3ZOEY..VQZR73.P8H1ZJE..[U.nS70MP8I3ZIEYYYUQZR73MP8H3ZOEYYYUQZR73MP8H3ZOEYYYUQZR73MP8H.....k.'l=QJ...T.L..J..(..8rX.C\....T....uB5..8.<j..P...'.;H)9.....a9R$_2.@.B1.U....dx-...TY.7..Mh.+_}.|.........<.....-..9=Z., H$Vt.$?8+<.X.63MP8.......<)...0BN.ZK....mG).....8H3>OEY+YUQ;R73.P8H\ZOE7YYU/ZR7MMP8.3ZO.YYYbQZR.3MPUH3ZkEYY'UQZ.J<B..Z).YYYUQo....=....r..c .,lQu..W....\..^2.@p....=....N.:\qykJQ>L6XHAZUd[.....OT<M1]KFUdW......k..q...4...+..73MP8H.ZO.YYY..Z.73M.8.3..EYY.Q.R.3..H
                        Process:C:\Users\user\Desktop\DHL_67329033929228____________________________.exe
                        File Type:ASCII text, with very long lines (29748), with no line terminators
                        Category:modified
                        Size (bytes):29748
                        Entropy (8bit):3.548047349839188
                        Encrypted:false
                        SSDEEP:768:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbQE+I+h6584vfF3if6gc:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RZ
                        MD5:B84C6C29B43A29C2CAD4E9B6FF5B8165
                        SHA1:E2DC2D5DD84D8B0C18833363FE5D28BDBAF5AE40
                        SHA-256:23482368A1B3912168D129B15273EBE1F4FE471B0A712EB561D15F2210A84831
                        SHA-512:633DB42875356A861A422B91FCF43A3A8836C1C2BC14881E73547DF06576D6070C067C470B4218F04C70A21DD5EC1A521E21996A3984B7436F46F7554FE3568D
                        Malicious:false
                        Reputation:low
                        Preview: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
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.933976975029563
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:DHL_67329033929228____________________________.exe
                        File size:1'036'288 bytes
                        MD5:4b772cc6a4b591eff3de738e5cc5aca5
                        SHA1:38f2aa48812118afc7631b2cf898832621228554
                        SHA256:1115e56ad66e65c4934967fc18da11d5caceb4e96cc9567366764c93d47beeb7
                        SHA512:d75726768d22087d93e003e9f526c7d96c96f443e4db13726efdecd366278c8982ea8527899b58a072e59033567718ef24bd46dc002ffb1db11e02e1d6fcaf85
                        SSDEEP:24576:sAHnh+eWsN3skA4RV1Hom2KXMmHazxjVHGLkdjd6pa5:Lh+ZkldoPK8YazxRHG0B
                        TLSH:9025AD0273D2C036FFAB92739B6AF60556BD79254123852F13982DB9BC701B2273D663
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                        Icon Hash:aaf3e3e3938382a0
                        Entrypoint:0x42800a
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                        Time Stamp:0x664B8BFA [Mon May 20 17:44:26 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                        Instruction
                        call 00007FF59930A45Dh
                        jmp 00007FF5992FD214h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        push edi
                        push esi
                        mov esi, dword ptr [esp+10h]
                        mov ecx, dword ptr [esp+14h]
                        mov edi, dword ptr [esp+0Ch]
                        mov eax, ecx
                        mov edx, ecx
                        add eax, esi
                        cmp edi, esi
                        jbe 00007FF5992FD39Ah
                        cmp edi, eax
                        jc 00007FF5992FD6FEh
                        bt dword ptr [004C41FCh], 01h
                        jnc 00007FF5992FD399h
                        rep movsb
                        jmp 00007FF5992FD6ACh
                        cmp ecx, 00000080h
                        jc 00007FF5992FD564h
                        mov eax, edi
                        xor eax, esi
                        test eax, 0000000Fh
                        jne 00007FF5992FD3A0h
                        bt dword ptr [004BF324h], 01h
                        jc 00007FF5992FD870h
                        bt dword ptr [004C41FCh], 00000000h
                        jnc 00007FF5992FD53Dh
                        test edi, 00000003h
                        jne 00007FF5992FD54Eh
                        test esi, 00000003h
                        jne 00007FF5992FD52Dh
                        bt edi, 02h
                        jnc 00007FF5992FD39Fh
                        mov eax, dword ptr [esi]
                        sub ecx, 04h
                        lea esi, dword ptr [esi+04h]
                        mov dword ptr [edi], eax
                        lea edi, dword ptr [edi+04h]
                        bt edi, 03h
                        jnc 00007FF5992FD3A3h
                        movq xmm1, qword ptr [esi]
                        sub ecx, 08h
                        lea esi, dword ptr [esi+08h]
                        movq qword ptr [edi], xmm1
                        lea edi, dword ptr [edi+08h]
                        test esi, 00000007h
                        je 00007FF5992FD3F5h
                        bt esi, 03h
                        Programming Language:
                        • [ASM] VS2013 build 21005
                        • [ C ] VS2013 build 21005
                        • [C++] VS2013 build 21005
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        • [ASM] VS2013 UPD5 build 40629
                        • [RES] VS2013 build 21005
                        • [LNK] VS2013 UPD5 build 40629
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x3298c.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xfb0000x7134.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xc80000x3298c0x32a0071448869f5596d0d82211d696ec85b5fFalse0.8704812885802469data7.746141349983385IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xfb0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                        RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                        RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                        RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                        RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                        RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                        RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                        RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                        RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                        RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                        RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                        RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                        RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                        RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                        RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                        RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                        RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                        RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                        RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                        RT_RCDATA0xd07b80x29c24data1.0003566333808844
                        RT_GROUP_ICON0xfa3dc0x76dataEnglishGreat Britain0.6610169491525424
                        RT_GROUP_ICON0xfa4540x14dataEnglishGreat Britain1.25
                        RT_GROUP_ICON0xfa4680x14dataEnglishGreat Britain1.15
                        RT_GROUP_ICON0xfa47c0x14dataEnglishGreat Britain1.25
                        RT_VERSION0xfa4900x10cdataEnglishGreat Britain0.5932835820895522
                        RT_MANIFEST0xfa59c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                        DLLImport
                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                        PSAPI.DLLGetProcessMemoryInfo
                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                        UxTheme.dllIsThemeActive
                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                        Language of compilation systemCountry where language is spokenMap
                        EnglishGreat Britain
                        TimestampSource PortDest PortSource IPDest IP
                        May 22, 2024 22:19:59.983843088 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:19:59.992563963 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:19:59.992722034 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:00.887489080 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:00.898638964 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:00.906060934 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.184503078 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.190862894 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:01.214395046 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.409913063 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.416510105 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:01.439420938 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.666604996 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.673582077 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.673604965 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.673625946 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.673686981 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:01.673744917 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:01.776537895 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:01.825453997 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:01.837599993 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.120304108 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.138015985 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:02.152409077 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.356054068 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.357345104 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:02.371629953 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.582159042 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.583250046 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:02.588618040 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.803427935 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:02.803772926 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:02.821125984 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.028177977 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.028407097 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:03.042613983 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.260469913 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.260665894 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:03.274883032 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.474836111 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.483546972 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:03.487020016 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:03.487087011 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:03.487087011 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:20:03.496025085 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.496047020 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.496054888 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.496062994 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.827161074 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:20:03.874243021 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:21:39.436292887 CEST49699587192.168.2.7185.244.151.84
                        May 22, 2024 22:21:39.442747116 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:21:39.650613070 CEST58749699185.244.151.84192.168.2.7
                        May 22, 2024 22:21:39.659074068 CEST49699587192.168.2.7185.244.151.84
                        TimestampSource PortDest PortSource IPDest IP
                        May 22, 2024 22:19:59.417027950 CEST5190053192.168.2.71.1.1.1
                        May 22, 2024 22:19:59.975923061 CEST53519001.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        May 22, 2024 22:19:59.417027950 CEST192.168.2.71.1.1.10xa303Standard query (0)mail.worlorderbillions.topA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        May 22, 2024 22:19:59.975923061 CEST1.1.1.1192.168.2.70xa303No error (0)mail.worlorderbillions.topworlorderbillions.topCNAME (Canonical name)IN (0x0001)false
                        May 22, 2024 22:19:59.975923061 CEST1.1.1.1192.168.2.70xa303No error (0)worlorderbillions.top185.244.151.84A (IP address)IN (0x0001)false
                        TimestampSource PortDest PortSource IPDest IPCommands
                        May 22, 2024 22:20:00.887489080 CEST58749699185.244.151.84192.168.2.7220-hosting2.ro.hostsailor.com ESMTP Exim 4.96.2 #2 Wed, 22 May 2024 22:20:00 +0200
                        220-We do not authorize the use of this system to transport unsolicited,
                        220 and/or bulk e-mail.
                        May 22, 2024 22:20:00.898638964 CEST49699587192.168.2.7185.244.151.84EHLO 965543
                        May 22, 2024 22:20:01.184503078 CEST58749699185.244.151.84192.168.2.7250-hosting2.ro.hostsailor.com Hello 965543 [8.46.123.175]
                        250-SIZE 52428800
                        250-8BITMIME
                        250-PIPELINING
                        250-PIPECONNECT
                        250-STARTTLS
                        250 HELP
                        May 22, 2024 22:20:01.190862894 CEST49699587192.168.2.7185.244.151.84STARTTLS
                        May 22, 2024 22:20:01.409913063 CEST58749699185.244.151.84192.168.2.7220 TLS go ahead

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:16:19:54
                        Start date:22/05/2024
                        Path:C:\Users\user\Desktop\DHL_67329033929228____________________________.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
                        Imagebase:0xdc0000
                        File size:1'036'288 bytes
                        MD5 hash:4B772CC6A4B591EFF3DE738E5CC5ACA5
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1273415604.0000000000D30000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:16:19:55
                        Start date:22/05/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\DHL_67329033929228____________________________.exe"
                        Imagebase:0x160000
                        File size:45'984 bytes
                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2497826249.000000000259A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2495105894.0000000000532000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2497826249.000000000256E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2497826249.0000000002521000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.2497826249.0000000002521000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:5.7%
                          Dynamic/Decrypted Code Coverage:0.4%
                          Signature Coverage:2.9%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:30
                          execution_graph 62812 dc107d 62817 dc71eb 62812->62817 62814 dc108c 62848 de2f80 62814->62848 62818 dc71fb __ftell_nolock 62817->62818 62851 dc77c7 62818->62851 62822 dc72ba 62863 de074f 62822->62863 62829 dc77c7 59 API calls 62830 dc72eb 62829->62830 62882 dc7eec 62830->62882 62832 dc72f4 RegOpenKeyExW 62833 dfecda RegQueryValueExW 62832->62833 62837 dc7316 Mailbox 62832->62837 62834 dfed6c RegCloseKey 62833->62834 62835 dfecf7 62833->62835 62834->62837 62847 dfed7e _wcscat Mailbox __NMSG_WRITE 62834->62847 62886 de0ff6 62835->62886 62837->62814 62838 dfed10 62896 dc538e 62838->62896 62841 dfed38 62899 dc7d2c 62841->62899 62843 dc7b52 59 API calls 62843->62847 62844 dfed52 62844->62834 62846 dc3f84 59 API calls 62846->62847 62847->62837 62847->62843 62847->62846 62908 dc7f41 62847->62908 62973 de2e84 62848->62973 62850 dc1096 62852 de0ff6 Mailbox 59 API calls 62851->62852 62853 dc77e8 62852->62853 62854 de0ff6 Mailbox 59 API calls 62853->62854 62855 dc72b1 62854->62855 62856 dc4864 62855->62856 62912 df1b90 62856->62912 62859 dc7f41 59 API calls 62860 dc4897 62859->62860 62914 dc48ae 62860->62914 62862 dc48a1 Mailbox 62862->62822 62864 df1b90 __ftell_nolock 62863->62864 62865 de075c GetFullPathNameW 62864->62865 62866 de077e 62865->62866 62867 dc7d2c 59 API calls 62866->62867 62868 dc72c5 62867->62868 62869 dc7e0b 62868->62869 62870 dc7e1f 62869->62870 62871 dff173 62869->62871 62936 dc7db0 62870->62936 62941 dc8189 62871->62941 62874 dc72d3 62876 dc3f84 62874->62876 62875 dff17e __NMSG_WRITE _memmove 62877 dc3f92 62876->62877 62881 dc3fb4 _memmove 62876->62881 62879 de0ff6 Mailbox 59 API calls 62877->62879 62878 de0ff6 Mailbox 59 API calls 62880 dc3fc8 62878->62880 62879->62881 62880->62829 62881->62878 62883 dc7f06 62882->62883 62885 dc7ef9 62882->62885 62884 de0ff6 Mailbox 59 API calls 62883->62884 62884->62885 62885->62832 62888 de0ffe 62886->62888 62889 de1018 62888->62889 62891 de101c std::exception::exception 62888->62891 62944 de594c 62888->62944 62961 de35e1 DecodePointer 62888->62961 62889->62838 62962 de87db RaiseException 62891->62962 62893 de1046 62963 de8711 58 API calls _free 62893->62963 62895 de1058 62895->62838 62897 de0ff6 Mailbox 59 API calls 62896->62897 62898 dc53a0 RegQueryValueExW 62897->62898 62898->62841 62898->62844 62900 dc7d38 __NMSG_WRITE 62899->62900 62901 dc7da5 62899->62901 62903 dc7d4e 62900->62903 62904 dc7d73 62900->62904 62902 dc7e8c 59 API calls 62901->62902 62907 dc7d56 _memmove 62902->62907 62972 dc8087 59 API calls Mailbox 62903->62972 62905 dc8189 59 API calls 62904->62905 62905->62907 62907->62844 62909 dc7f50 __NMSG_WRITE _memmove 62908->62909 62910 de0ff6 Mailbox 59 API calls 62909->62910 62911 dc7f8e 62910->62911 62911->62847 62913 dc4871 GetModuleFileNameW 62912->62913 62913->62859 62915 df1b90 __ftell_nolock 62914->62915 62916 dc48bb GetFullPathNameW 62915->62916 62917 dc48da 62916->62917 62918 dc48f7 62916->62918 62920 dc7d2c 59 API calls 62917->62920 62919 dc7eec 59 API calls 62918->62919 62921 dc48e6 62919->62921 62920->62921 62924 dc7886 62921->62924 62925 dc7894 62924->62925 62928 dc7e8c 62925->62928 62927 dc48f2 62927->62862 62929 dc7e9a 62928->62929 62930 dc7ea3 _memmove 62928->62930 62929->62930 62932 dc7faf 62929->62932 62930->62927 62933 dc7fc2 62932->62933 62935 dc7fbf _memmove 62932->62935 62934 de0ff6 Mailbox 59 API calls 62933->62934 62934->62935 62935->62930 62937 dc7dbf __NMSG_WRITE 62936->62937 62938 dc7dd0 _memmove 62937->62938 62939 dc8189 59 API calls 62937->62939 62938->62874 62940 dff130 _memmove 62939->62940 62942 de0ff6 Mailbox 59 API calls 62941->62942 62943 dc8193 62942->62943 62943->62875 62945 de59c7 62944->62945 62954 de5958 62944->62954 62970 de35e1 DecodePointer 62945->62970 62947 de59cd 62971 de8d68 58 API calls __getptd_noexit 62947->62971 62950 de598b RtlAllocateHeap 62951 de59bf 62950->62951 62950->62954 62951->62888 62953 de5963 62953->62954 62964 dea3ab 58 API calls __NMSG_WRITE 62953->62964 62965 dea408 58 API calls 5 library calls 62953->62965 62966 de32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 62953->62966 62954->62950 62954->62953 62955 de59b3 62954->62955 62959 de59b1 62954->62959 62967 de35e1 DecodePointer 62954->62967 62968 de8d68 58 API calls __getptd_noexit 62955->62968 62969 de8d68 58 API calls __getptd_noexit 62959->62969 62961->62888 62962->62893 62963->62895 62964->62953 62965->62953 62967->62954 62968->62959 62969->62951 62970->62947 62971->62951 62972->62907 62974 de2e90 __tzset_nolock 62973->62974 62981 de3457 62974->62981 62980 de2eb7 __tzset_nolock 62980->62850 62998 de9e4b 62981->62998 62983 de2e99 62984 de2ec8 DecodePointer DecodePointer 62983->62984 62985 de2ea5 62984->62985 62986 de2ef5 62984->62986 62995 de2ec2 62985->62995 62986->62985 63044 de89e4 59 API calls __swprintf 62986->63044 62988 de2f58 EncodePointer EncodePointer 62988->62985 62989 de2f07 62989->62988 62990 de2f2c 62989->62990 63045 de8aa4 61 API calls 2 library calls 62989->63045 62990->62985 62993 de2f46 EncodePointer 62990->62993 63046 de8aa4 61 API calls 2 library calls 62990->63046 62993->62988 62994 de2f40 62994->62985 62994->62993 63047 de3460 62995->63047 62999 de9e6f EnterCriticalSection 62998->62999 63000 de9e5c 62998->63000 62999->62983 63005 de9ed3 63000->63005 63002 de9e62 63002->62999 63029 de32f5 58 API calls 4 library calls 63002->63029 63004 de9e6e 63004->62999 63006 de9edf __tzset_nolock 63005->63006 63007 de9ee8 63006->63007 63008 de9f00 63006->63008 63030 dea3ab 58 API calls __NMSG_WRITE 63007->63030 63020 de9f21 __tzset_nolock 63008->63020 63033 de8a5d 58 API calls 2 library calls 63008->63033 63011 de9eed 63031 dea408 58 API calls 5 library calls 63011->63031 63012 de9f15 63014 de9f1c 63012->63014 63015 de9f2b 63012->63015 63034 de8d68 58 API calls __getptd_noexit 63014->63034 63018 de9e4b __lock 58 API calls 63015->63018 63016 de9ef4 63032 de32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 63016->63032 63021 de9f32 63018->63021 63020->63002 63023 de9f3f 63021->63023 63024 de9f57 63021->63024 63035 dea06b InitializeCriticalSectionAndSpinCount 63023->63035 63036 de2f95 63024->63036 63027 de9f4b 63042 de9f73 LeaveCriticalSection _doexit 63027->63042 63029->63004 63030->63011 63031->63016 63033->63012 63034->63020 63035->63027 63037 de2f9e RtlFreeHeap 63036->63037 63038 de2fc7 _free 63036->63038 63037->63038 63039 de2fb3 63037->63039 63038->63027 63043 de8d68 58 API calls __getptd_noexit 63039->63043 63041 de2fb9 GetLastError 63041->63038 63042->63020 63043->63041 63044->62989 63045->62990 63046->62994 63050 de9fb5 LeaveCriticalSection 63047->63050 63049 de2ec7 63049->62980 63050->63049 63051 de332f 63053 de333b __IsNonwritableInCurrentImage 63051->63053 63057 dea711 63053->63057 63054 de3359 __initterm_e 63055 de2f80 __cinit 67 API calls 63054->63055 63056 de3378 __IsNonwritableInCurrentImage __initterm 63054->63056 63055->63056 63058 dea714 EncodePointer 63057->63058 63058->63058 63059 dea72e 63058->63059 63059->63054 63060 d22410 63074 d20000 63060->63074 63062 d224e4 63077 d22300 63062->63077 63080 d23510 GetPEB 63074->63080 63076 d2068b 63076->63062 63078 d22309 Sleep 63077->63078 63079 d22317 63078->63079 63081 d2353a 63080->63081 63081->63076 63082 dcafae 63086 dcafc2 63082->63086 63083 de0ff6 Mailbox 59 API calls 63083->63086 63084 dcb007 63096 dcac90 Mailbox _memmove 63084->63096 63342 dc81a7 63084->63342 63086->63083 63086->63084 63087 dc81a7 59 API calls 63086->63087 63087->63086 63092 dcb685 63348 e2a0b5 89 API calls 4 library calls 63092->63348 63094 de0ff6 59 API calls Mailbox 63105 dca097 Mailbox 63094->63105 63095 dca1b7 63096->63092 63096->63095 63100 dc7f41 59 API calls 63096->63100 63096->63105 63116 dcb416 63096->63116 63119 e00c94 63096->63119 63121 e00ca2 63096->63121 63123 e00c86 63096->63123 63124 dcb37c 63096->63124 63126 de0ff6 59 API calls Mailbox 63096->63126 63128 e17405 59 API calls 63096->63128 63135 dca000 63096->63135 63156 dd2123 63096->63156 63196 e3474d 63096->63196 63205 e2d2e6 63096->63205 63252 e3e237 63096->63252 63255 e3c5f4 63096->63255 63287 e27be0 63096->63287 63293 e3bf80 63096->63293 63333 e166f4 63096->63333 63338 dc9df0 59 API calls Mailbox 63096->63338 63346 e3c4a7 85 API calls 2 library calls 63096->63346 63097 e0047f 63347 e2a0b5 89 API calls 4 library calls 63097->63347 63098 dcb5da 63353 e2a0b5 89 API calls 4 library calls 63098->63353 63100->63096 63101 dc77c7 59 API calls 63101->63105 63103 dc81a7 59 API calls 63103->63105 63105->63094 63105->63095 63105->63097 63105->63098 63105->63101 63105->63103 63106 e17405 59 API calls 63105->63106 63110 e00e00 63105->63110 63112 de2f80 67 API calls __cinit 63105->63112 63115 dca6ba 63105->63115 63336 dcca20 341 API calls 2 library calls 63105->63336 63337 dcba60 60 API calls Mailbox 63105->63337 63106->63105 63107 e0048e 63109 e166f4 Mailbox 59 API calls 63109->63095 63352 e2a0b5 89 API calls 4 library calls 63110->63352 63112->63105 63351 e2a0b5 89 API calls 4 library calls 63115->63351 63341 dcf803 341 API calls 63116->63341 63349 dc9df0 59 API calls Mailbox 63119->63349 63350 e2a0b5 89 API calls 4 library calls 63121->63350 63123->63095 63123->63109 63339 dc9e9c 60 API calls Mailbox 63124->63339 63126->63096 63127 dcb38d 63340 dc9e9c 60 API calls Mailbox 63127->63340 63128->63096 63136 dca01f 63135->63136 63151 dca04d Mailbox 63135->63151 63137 de0ff6 Mailbox 59 API calls 63136->63137 63137->63151 63138 e17405 59 API calls 63138->63151 63139 de0ff6 59 API calls Mailbox 63139->63151 63140 dc77c7 59 API calls 63140->63151 63143 de2f80 67 API calls __cinit 63143->63151 63144 dc81a7 59 API calls 63144->63151 63145 e0047f 63356 e2a0b5 89 API calls 4 library calls 63145->63356 63149 e0048e 63149->63096 63150 dca1b7 63150->63096 63151->63138 63151->63139 63151->63140 63151->63143 63151->63144 63151->63145 63151->63150 63152 e00e00 63151->63152 63154 dca6ba 63151->63154 63155 dcb5da 63151->63155 63354 dcca20 341 API calls 2 library calls 63151->63354 63355 dcba60 60 API calls Mailbox 63151->63355 63358 e2a0b5 89 API calls 4 library calls 63152->63358 63357 e2a0b5 89 API calls 4 library calls 63154->63357 63359 e2a0b5 89 API calls 4 library calls 63155->63359 63360 dc9bf8 63156->63360 63160 de0ff6 Mailbox 59 API calls 63161 dd2154 63160->63161 63163 dd2164 63161->63163 63393 dc5906 60 API calls Mailbox 63161->63393 63162 dd2189 63172 dd2196 63162->63172 63433 dc9c9c 59 API calls 63162->63433 63394 dc9997 63163->63394 63166 e069af 63166->63162 63432 e2f7df 59 API calls 63166->63432 63170 e069f7 63170->63172 63173 e069ff 63170->63173 63373 dc5e3f 63172->63373 63434 dc9c9c 59 API calls 63173->63434 63177 dd219d 63178 e06a11 63177->63178 63179 dd21b7 63177->63179 63180 de0ff6 Mailbox 59 API calls 63178->63180 63181 dc77c7 59 API calls 63179->63181 63182 e06a17 63180->63182 63183 dd21bf 63181->63183 63184 e06a2b 63182->63184 63435 dc59b0 ReadFile SetFilePointerEx 63182->63435 63378 dc56d2 63183->63378 63190 e06a2f _memmove 63184->63190 63436 e2794e 59 API calls 2 library calls 63184->63436 63186 dd21ce 63186->63190 63425 dc9b9c 59 API calls Mailbox 63186->63425 63191 dd21e2 Mailbox 63192 dd221c 63191->63192 63426 dc5dcf 63191->63426 63192->63096 63197 dc9997 84 API calls 63196->63197 63198 e34787 63197->63198 63520 dc63a0 63198->63520 63200 e34797 63201 e347bc 63200->63201 63202 dca000 341 API calls 63200->63202 63203 dc9bf8 59 API calls 63201->63203 63204 e347c0 63201->63204 63202->63201 63203->63204 63204->63096 63206 e2d310 63205->63206 63207 e2d305 63205->63207 63211 dc77c7 59 API calls 63206->63211 63250 e2d3ea Mailbox 63206->63250 63558 dc9c9c 59 API calls 63207->63558 63209 de0ff6 Mailbox 59 API calls 63210 e2d433 63209->63210 63212 e2d43f 63210->63212 63624 dc5906 60 API calls Mailbox 63210->63624 63213 e2d334 63211->63213 63217 dc9997 84 API calls 63212->63217 63214 dc77c7 59 API calls 63213->63214 63216 e2d33d 63214->63216 63219 dc9997 84 API calls 63216->63219 63218 e2d457 63217->63218 63220 dc5956 67 API calls 63218->63220 63221 e2d349 63219->63221 63222 e2d466 63220->63222 63559 dc46f9 63221->63559 63224 e2d46a GetLastError 63222->63224 63225 e2d49e 63222->63225 63227 e2d483 63224->63227 63229 e2d500 63225->63229 63230 e2d4c9 63225->63230 63226 e2d35e 63610 dc7c8e 63226->63610 63247 e2d3f3 Mailbox 63227->63247 63625 dc5a1a CloseHandle 63227->63625 63234 de0ff6 Mailbox 59 API calls 63229->63234 63232 de0ff6 Mailbox 59 API calls 63230->63232 63235 e2d4ce 63232->63235 63233 e2d3e3 63623 dc9c9c 59 API calls 63233->63623 63239 e2d505 63234->63239 63240 e2d4df 63235->63240 63242 dc77c7 59 API calls 63235->63242 63244 dc77c7 59 API calls 63239->63244 63239->63247 63626 e2f835 59 API calls 2 library calls 63240->63626 63242->63240 63243 e2d3a5 63246 dc7f41 59 API calls 63243->63246 63244->63247 63248 e2d3b2 63246->63248 63247->63096 63622 e23c66 63 API calls Mailbox 63248->63622 63250->63209 63250->63247 63251 e2d3bb Mailbox 63251->63233 63656 e3cdf1 63252->63656 63254 e3e247 63254->63096 63256 dc77c7 59 API calls 63255->63256 63257 e3c608 63256->63257 63258 dc77c7 59 API calls 63257->63258 63259 e3c610 63258->63259 63260 dc77c7 59 API calls 63259->63260 63261 e3c618 63260->63261 63262 dc9997 84 API calls 63261->63262 63274 e3c626 63262->63274 63263 dc7d2c 59 API calls 63263->63274 63264 dc7a84 59 API calls 63264->63274 63265 e3c83c Mailbox 63265->63096 63266 e3c7f6 63270 dc7e0b 59 API calls 63266->63270 63268 e3c811 63272 dc7e0b 59 API calls 63268->63272 63269 dc81a7 59 API calls 63269->63274 63271 e3c803 63270->63271 63273 dc7c8e 59 API calls 63271->63273 63275 e3c820 63272->63275 63277 e3c80f 63273->63277 63274->63263 63274->63264 63274->63265 63274->63266 63274->63268 63274->63269 63276 dc7faf 59 API calls 63274->63276 63274->63277 63279 dc7faf 59 API calls 63274->63279 63284 dc9997 84 API calls 63274->63284 63285 dc7e0b 59 API calls 63274->63285 63286 dc7c8e 59 API calls 63274->63286 63278 dc7c8e 59 API calls 63275->63278 63280 e3c6bd CharUpperBuffW 63276->63280 63277->63265 63769 dc9b9c 59 API calls Mailbox 63277->63769 63278->63277 63281 e3c77d CharUpperBuffW 63279->63281 63767 dc859a 68 API calls 63280->63767 63768 dcc707 69 API calls 2 library calls 63281->63768 63284->63274 63285->63274 63286->63274 63288 e27bec 63287->63288 63289 de0ff6 Mailbox 59 API calls 63288->63289 63290 e27bfa 63289->63290 63291 e27c08 63290->63291 63292 dc77c7 59 API calls 63290->63292 63291->63096 63292->63291 63294 e3bfc5 63293->63294 63295 e3bfab 63293->63295 63771 e3a528 59 API calls Mailbox 63294->63771 63770 e2a0b5 89 API calls 4 library calls 63295->63770 63298 e3bfd0 63299 dca000 340 API calls 63298->63299 63300 e3c031 63299->63300 63301 e3bfbd Mailbox 63300->63301 63302 e3c0c3 63300->63302 63305 e3c072 63300->63305 63301->63096 63303 e3c119 63302->63303 63304 e3c0c9 63302->63304 63303->63301 63306 dc9997 84 API calls 63303->63306 63792 e27ba4 59 API calls 63304->63792 63772 e27581 59 API calls Mailbox 63305->63772 63308 e3c12b 63306->63308 63311 dc7faf 59 API calls 63308->63311 63309 e3c0ec 63793 dc5ea1 59 API calls Mailbox 63309->63793 63314 e3c14f CharUpperBuffW 63311->63314 63313 e3c0a2 63773 dcf5c0 63313->63773 63317 e3c169 63314->63317 63315 e3c0f4 Mailbox 63794 dcfe40 341 API calls 2 library calls 63315->63794 63318 e3c170 63317->63318 63319 e3c1bc 63317->63319 63795 e27581 59 API calls Mailbox 63318->63795 63321 dc9997 84 API calls 63319->63321 63322 e3c1c4 63321->63322 63796 dc9fbd 60 API calls 63322->63796 63325 e3c19e 63326 dcf5c0 340 API calls 63325->63326 63326->63301 63327 e3c1ce 63327->63301 63328 dc9997 84 API calls 63327->63328 63329 e3c1e9 63328->63329 63797 dc5ea1 59 API calls Mailbox 63329->63797 63331 e3c1f9 63798 dcfe40 341 API calls 2 library calls 63331->63798 64857 e16636 63333->64857 63335 e16702 63335->63096 63336->63105 63337->63105 63338->63096 63339->63127 63340->63116 63341->63092 63343 dc81ba 63342->63343 63344 dc81b2 63342->63344 63343->63096 64862 dc80d7 59 API calls 2 library calls 63344->64862 63346->63096 63347->63107 63348->63123 63349->63123 63350->63123 63351->63095 63352->63098 63353->63095 63354->63151 63355->63151 63356->63149 63357->63150 63358->63155 63359->63150 63361 dffbff 63360->63361 63362 dc9c08 63360->63362 63363 dffc10 63361->63363 63364 dc7d2c 59 API calls 63361->63364 63367 de0ff6 Mailbox 59 API calls 63362->63367 63365 dc7eec 59 API calls 63363->63365 63364->63363 63366 dffc1a 63365->63366 63370 dc9c34 63366->63370 63372 dc77c7 59 API calls 63366->63372 63368 dc9c1b 63367->63368 63368->63366 63369 dc9c26 63368->63369 63369->63370 63371 dc7f41 59 API calls 63369->63371 63370->63160 63370->63166 63371->63370 63372->63370 63437 dc5c4e 63373->63437 63376 dc5c4e 2 API calls 63377 dc5e74 63376->63377 63377->63177 63379 dc56dd 63378->63379 63380 dc5702 63378->63380 63379->63380 63384 dc56ec 63379->63384 63381 dc7eec 59 API calls 63380->63381 63385 e2349a 63381->63385 63382 e234c9 63382->63186 63449 dc5c18 63384->63449 63385->63382 63447 e23436 ReadFile SetFilePointerEx 63385->63447 63448 dc7a84 59 API calls 2 library calls 63385->63448 63392 e235d8 Mailbox 63392->63186 63393->63163 63395 dc99b1 63394->63395 63406 dc99ab 63394->63406 63396 dff9fc __i64tow 63395->63396 63397 dc99f9 63395->63397 63398 dff903 63395->63398 63400 dc99b7 __itow 63395->63400 63491 de38d8 83 API calls 3 library calls 63397->63491 63404 de0ff6 Mailbox 59 API calls 63398->63404 63410 dff97b Mailbox _wcscpy 63398->63410 63402 de0ff6 Mailbox 59 API calls 63400->63402 63403 dc99d1 63402->63403 63405 dc7f41 59 API calls 63403->63405 63403->63406 63407 dff948 63404->63407 63405->63406 63412 dc5956 63406->63412 63408 de0ff6 Mailbox 59 API calls 63407->63408 63409 dff96e 63408->63409 63409->63410 63411 dc7f41 59 API calls 63409->63411 63492 de38d8 83 API calls 3 library calls 63410->63492 63411->63410 63413 dc5dcf CloseHandle 63412->63413 63414 dc5962 63413->63414 63493 dc5df9 63414->63493 63416 dc59a4 63416->63162 63416->63166 63431 dc5a1a CloseHandle 63416->63431 63417 dc5981 63417->63416 63501 dc5770 63417->63501 63419 dc5993 63518 dc53db SetFilePointerEx SetFilePointerEx 63419->63518 63421 dc599a 63421->63416 63422 dfe030 63421->63422 63519 e23696 SetFilePointerEx SetFilePointerEx WriteFile 63422->63519 63424 dfe060 63424->63416 63425->63191 63427 dc5de8 63426->63427 63428 dc5dd9 63426->63428 63427->63428 63429 dc5ded CloseHandle 63427->63429 63428->63192 63430 dc5a1a CloseHandle 63428->63430 63429->63428 63430->63192 63431->63166 63432->63166 63433->63170 63434->63177 63435->63184 63436->63190 63444 dc5c68 63437->63444 63438 dc5cef SetFilePointerEx 63445 dc5dae SetFilePointerEx 63438->63445 63439 dfe151 63446 dc5dae SetFilePointerEx 63439->63446 63442 dc5cc3 63442->63376 63443 dfe16b 63444->63438 63444->63439 63444->63442 63445->63442 63446->63443 63447->63385 63448->63385 63450 de0ff6 Mailbox 59 API calls 63449->63450 63451 dc5c2b 63450->63451 63452 de0ff6 Mailbox 59 API calls 63451->63452 63453 dc5c37 63452->63453 63454 dc5632 63453->63454 63461 dc5a2f 63454->63461 63456 dc5674 63456->63392 63460 dc793a 61 API calls Mailbox 63456->63460 63458 dc5643 63458->63456 63468 dc5d20 63458->63468 63474 dc5bda 63458->63474 63460->63392 63462 dfe065 63461->63462 63463 dc5a40 63461->63463 63483 e16443 59 API calls Mailbox 63462->63483 63463->63458 63465 dfe06f 63466 de0ff6 Mailbox 59 API calls 63465->63466 63467 dfe07b 63466->63467 63469 dc5d93 63468->63469 63473 dc5d2e 63468->63473 63484 dc5dae SetFilePointerEx 63469->63484 63470 dc5d56 63470->63458 63472 dc5d66 ReadFile 63472->63470 63472->63473 63473->63470 63473->63472 63475 dc5bee 63474->63475 63476 dfe117 63474->63476 63485 dc5b19 63475->63485 63490 e16443 59 API calls Mailbox 63476->63490 63479 dc5bfa 63479->63458 63480 dfe122 63481 de0ff6 Mailbox 59 API calls 63480->63481 63482 dfe137 _memmove 63481->63482 63483->63465 63484->63473 63486 dc5b31 63485->63486 63489 dc5b2a _memmove 63485->63489 63487 dfe0a7 63486->63487 63488 de0ff6 Mailbox 59 API calls 63486->63488 63488->63489 63489->63479 63490->63480 63491->63400 63492->63396 63494 dfe181 63493->63494 63495 dc5e12 CreateFileW 63493->63495 63496 dfe187 CreateFileW 63494->63496 63498 dc5e34 63494->63498 63495->63498 63497 dfe1ad 63496->63497 63496->63498 63499 dc5c4e 2 API calls 63497->63499 63498->63417 63500 dfe1b8 63499->63500 63500->63498 63502 dfdfce 63501->63502 63503 dc578b 63501->63503 63507 dc5e3f 2 API calls 63502->63507 63513 dc581a 63502->63513 63504 dc5c4e 2 API calls 63503->63504 63503->63513 63505 dc57ad 63504->63505 63506 dc538e 59 API calls 63505->63506 63508 dc57b7 63506->63508 63507->63513 63508->63502 63509 dc57c4 63508->63509 63510 de0ff6 Mailbox 59 API calls 63509->63510 63511 dc57cf 63510->63511 63512 dc538e 59 API calls 63511->63512 63514 dc57da 63512->63514 63513->63419 63515 dc5d20 2 API calls 63514->63515 63516 dc5807 63515->63516 63517 dc5c4e 2 API calls 63516->63517 63517->63513 63518->63421 63519->63424 63545 dc7b76 63520->63545 63522 dc65ca 63552 dc766f 59 API calls 2 library calls 63522->63552 63526 dfe41f 63555 e1fdba 91 API calls 4 library calls 63526->63555 63529 dc65e4 Mailbox 63529->63200 63531 dc766f 59 API calls 63539 dc63c5 63531->63539 63532 dfe42d 63556 dc766f 59 API calls 2 library calls 63532->63556 63533 dc7eec 59 API calls 63533->63539 63535 dfe443 63535->63529 63536 dc68f9 _memmove 63557 e1fdba 91 API calls 4 library calls 63536->63557 63537 dfe3bb 63538 dc8189 59 API calls 63537->63538 63540 dfe3c6 63538->63540 63539->63522 63539->63526 63539->63531 63539->63533 63539->63536 63539->63537 63542 dc7faf 59 API calls 63539->63542 63550 dc60cc 60 API calls 63539->63550 63551 dc5ea1 59 API calls Mailbox 63539->63551 63553 dc5fd2 60 API calls 63539->63553 63554 dc7a84 59 API calls 2 library calls 63539->63554 63544 de0ff6 Mailbox 59 API calls 63540->63544 63543 dc659b CharUpperBuffW 63542->63543 63543->63539 63544->63536 63546 de0ff6 Mailbox 59 API calls 63545->63546 63547 dc7b9b 63546->63547 63548 dc8189 59 API calls 63547->63548 63549 dc7baa 63548->63549 63549->63539 63550->63539 63551->63539 63552->63529 63553->63539 63554->63539 63555->63532 63556->63535 63557->63529 63558->63206 63560 dc77c7 59 API calls 63559->63560 63561 dc470f 63560->63561 63562 dc77c7 59 API calls 63561->63562 63563 dc4717 63562->63563 63564 dc77c7 59 API calls 63563->63564 63565 dc471f 63564->63565 63566 dc77c7 59 API calls 63565->63566 63567 dc4727 63566->63567 63568 dfd8fb 63567->63568 63569 dc475b 63567->63569 63570 dc81a7 59 API calls 63568->63570 63571 dc79ab 59 API calls 63569->63571 63572 dfd904 63570->63572 63573 dc4769 63571->63573 63574 dc7eec 59 API calls 63572->63574 63575 dc7e8c 59 API calls 63573->63575 63577 dc479e 63574->63577 63576 dc4773 63575->63576 63576->63577 63578 dc79ab 59 API calls 63576->63578 63579 dc47de 63577->63579 63581 dc47bd 63577->63581 63592 dfd924 63577->63592 63582 dc4794 63578->63582 63627 dc79ab 63579->63627 63640 dc7b52 63581->63640 63586 dc7e8c 59 API calls 63582->63586 63584 dc47ef 63588 dc4801 63584->63588 63590 dc81a7 59 API calls 63584->63590 63585 dfd9f4 63589 dc7d2c 59 API calls 63585->63589 63586->63577 63591 dc4811 63588->63591 63595 dc81a7 59 API calls 63588->63595 63609 dfd9b1 63589->63609 63590->63588 63593 dc4818 63591->63593 63596 dc81a7 59 API calls 63591->63596 63592->63585 63599 dfd9dd 63592->63599 63604 dfd95b 63592->63604 63597 dc81a7 59 API calls 63593->63597 63606 dc481f Mailbox 63593->63606 63594 dc79ab 59 API calls 63594->63579 63595->63591 63596->63593 63597->63606 63598 dc7b52 59 API calls 63598->63609 63599->63585 63601 dfd9c8 63599->63601 63600 dfd9b9 63602 dc7d2c 59 API calls 63600->63602 63603 dc7d2c 59 API calls 63601->63603 63602->63609 63603->63609 63604->63600 63607 dfd9a4 63604->63607 63606->63226 63608 dc7d2c 59 API calls 63607->63608 63608->63609 63609->63579 63609->63598 63643 dc7a84 59 API calls 2 library calls 63609->63643 63611 dff094 63610->63611 63612 dc7ca0 63610->63612 63651 e18123 59 API calls _memmove 63611->63651 63645 dc7bb1 63612->63645 63615 dc7cac 63615->63233 63619 e23e73 63615->63619 63616 dff09e 63617 dc81a7 59 API calls 63616->63617 63618 dff0a6 Mailbox 63617->63618 63652 e24696 GetFileAttributesW 63619->63652 63622->63251 63623->63250 63624->63212 63625->63247 63626->63247 63628 dc79ba 63627->63628 63629 dc7a17 63627->63629 63628->63629 63630 dc79c5 63628->63630 63631 dc7e8c 59 API calls 63629->63631 63632 dc79e0 63630->63632 63633 dfef32 63630->63633 63636 dc79e8 _memmove 63631->63636 63644 dc8087 59 API calls Mailbox 63632->63644 63635 dc8189 59 API calls 63633->63635 63637 dfef3c 63635->63637 63636->63584 63638 de0ff6 Mailbox 59 API calls 63637->63638 63639 dfef5c 63638->63639 63641 dc7faf 59 API calls 63640->63641 63642 dc47c7 63641->63642 63642->63579 63642->63594 63643->63609 63644->63636 63646 dc7be5 _memmove 63645->63646 63647 dc7bbf 63645->63647 63646->63615 63646->63646 63647->63646 63648 de0ff6 Mailbox 59 API calls 63647->63648 63649 dc7c34 63648->63649 63650 de0ff6 Mailbox 59 API calls 63649->63650 63650->63646 63651->63616 63653 e23e7a 63652->63653 63654 e246b1 FindFirstFileW 63652->63654 63653->63233 63653->63243 63654->63653 63655 e246c6 FindClose 63654->63655 63655->63653 63657 dc9997 84 API calls 63656->63657 63658 e3ce2e 63657->63658 63682 e3ce75 Mailbox 63658->63682 63694 e3dab9 63658->63694 63660 e3d0cd 63661 e3d242 63660->63661 63665 e3d0db 63660->63665 63744 e3dbdc 92 API calls Mailbox 63661->63744 63664 e3d251 63664->63665 63666 e3d25d 63664->63666 63707 e3cc82 63665->63707 63666->63682 63667 dc9997 84 API calls 63672 e3cec6 Mailbox 63667->63672 63672->63660 63672->63667 63672->63682 63726 e2f835 59 API calls 2 library calls 63672->63726 63727 e3d2f3 61 API calls 2 library calls 63672->63727 63673 e3d114 63722 de0e48 63673->63722 63676 e3d147 63729 dc942e 63676->63729 63677 e3d12e 63728 e2a0b5 89 API calls 4 library calls 63677->63728 63680 e3d139 GetCurrentProcess TerminateProcess 63680->63676 63682->63254 63686 e3d2b8 63686->63682 63689 e3d2cc FreeLibrary 63686->63689 63687 e3d17f 63741 e3d95d 107 API calls _free 63687->63741 63689->63682 63693 e3d190 63693->63686 63742 dc8ea0 59 API calls Mailbox 63693->63742 63743 dc9e9c 60 API calls Mailbox 63693->63743 63745 e3d95d 107 API calls _free 63693->63745 63695 dc7faf 59 API calls 63694->63695 63696 e3dad4 CharLowerBuffW 63695->63696 63746 e1f658 63696->63746 63700 dc77c7 59 API calls 63701 e3db0d 63700->63701 63702 dc79ab 59 API calls 63701->63702 63703 e3db24 63702->63703 63704 dc7e8c 59 API calls 63703->63704 63705 e3db30 Mailbox 63704->63705 63706 e3db6c Mailbox 63705->63706 63753 e3d2f3 61 API calls 2 library calls 63705->63753 63706->63672 63708 e3ccf2 63707->63708 63709 e3cc9d 63707->63709 63713 e3dd64 63708->63713 63710 de0ff6 Mailbox 59 API calls 63709->63710 63712 e3ccbf 63710->63712 63711 de0ff6 Mailbox 59 API calls 63711->63712 63712->63708 63712->63711 63714 e3df8d Mailbox 63713->63714 63718 e3dd87 _wcscpy __NMSG_WRITE 63713->63718 63714->63673 63715 dc9d46 59 API calls 63715->63718 63716 dc9c9c 59 API calls 63716->63718 63717 dc9cf8 59 API calls 63717->63718 63718->63714 63718->63715 63718->63716 63718->63717 63719 de594c 58 API calls _malloc 63718->63719 63720 dc9997 84 API calls 63718->63720 63756 e25b29 61 API calls 2 library calls 63718->63756 63719->63718 63720->63718 63723 de0e5d 63722->63723 63724 de0ef5 VirtualAlloc 63723->63724 63725 de0ec3 63723->63725 63724->63725 63725->63676 63725->63677 63726->63672 63727->63672 63728->63680 63730 dc9436 63729->63730 63731 de0ff6 Mailbox 59 API calls 63730->63731 63732 dc9444 63731->63732 63733 dc9450 63732->63733 63757 dc935c 59 API calls Mailbox 63732->63757 63735 dc91b0 63733->63735 63758 dc92c0 63735->63758 63737 de0ff6 Mailbox 59 API calls 63739 dc925b 63737->63739 63738 dc91bf 63738->63737 63738->63739 63739->63693 63740 dc8ea0 59 API calls Mailbox 63739->63740 63740->63687 63741->63693 63742->63693 63743->63693 63744->63664 63745->63693 63747 e1f683 __NMSG_WRITE 63746->63747 63748 e1f6c2 63747->63748 63751 e1f6b8 63747->63751 63752 e1f769 63747->63752 63748->63700 63748->63705 63751->63748 63754 dc7a24 61 API calls 63751->63754 63752->63748 63755 dc7a24 61 API calls 63752->63755 63753->63706 63754->63751 63755->63752 63756->63718 63757->63733 63759 dc92c9 Mailbox 63758->63759 63760 dff5c8 63759->63760 63765 dc92d3 63759->63765 63761 de0ff6 Mailbox 59 API calls 63760->63761 63763 dff5d4 63761->63763 63762 dc92da 63762->63738 63765->63762 63766 dc9df0 59 API calls Mailbox 63765->63766 63766->63765 63767->63274 63768->63274 63769->63265 63770->63301 63771->63298 63772->63313 63774 dcf61a 63773->63774 63775 dcf7b0 63773->63775 63776 e04848 63774->63776 63777 dcf626 63774->63777 63778 dc7f41 59 API calls 63775->63778 63779 e3bf80 341 API calls 63776->63779 63888 dcf3f0 341 API calls 2 library calls 63777->63888 63784 dcf6ec Mailbox 63778->63784 63781 e04856 63779->63781 63785 dcf790 63781->63785 63890 e2a0b5 89 API calls 4 library calls 63781->63890 63783 dcf65d 63783->63781 63783->63784 63783->63785 63788 e23e73 3 API calls 63784->63788 63799 e2cde5 63784->63799 63879 e3e24b 63784->63879 63882 dc4faa 63784->63882 63785->63301 63787 dcf743 63787->63785 63889 dc9df0 59 API calls Mailbox 63787->63889 63788->63787 63792->63309 63793->63315 63794->63301 63795->63325 63796->63327 63797->63331 63798->63301 63800 dc77c7 59 API calls 63799->63800 63801 e2ce1a 63800->63801 63802 dc77c7 59 API calls 63801->63802 63803 e2ce23 63802->63803 63804 e2ce37 63803->63804 64024 dc9c9c 59 API calls 63803->64024 63806 dc9997 84 API calls 63804->63806 63807 e2ce54 63806->63807 63808 e2ce76 63807->63808 63809 e2cf55 63807->63809 63816 e2cf85 Mailbox 63807->63816 63811 dc9997 84 API calls 63808->63811 63891 dc4f3d 63809->63891 63812 e2ce82 63811->63812 63814 dc81a7 59 API calls 63812->63814 63817 e2ce8e 63814->63817 63815 e2cf81 63815->63816 63819 dc77c7 59 API calls 63815->63819 63816->63787 63822 e2cea2 63817->63822 63823 e2ced4 63817->63823 63818 dc4f3d 136 API calls 63818->63815 63820 e2cfb6 63819->63820 63821 dc77c7 59 API calls 63820->63821 63824 e2cfbf 63821->63824 63826 dc81a7 59 API calls 63822->63826 63827 dc9997 84 API calls 63823->63827 63825 dc77c7 59 API calls 63824->63825 63828 e2cfc8 63825->63828 63829 e2ceb2 63826->63829 63830 e2cee1 63827->63830 63832 dc77c7 59 API calls 63828->63832 63833 dc7e0b 59 API calls 63829->63833 63831 dc81a7 59 API calls 63830->63831 63834 e2ceed 63831->63834 63835 e2cfd1 63832->63835 63836 e2cebc 63833->63836 64025 e24cd3 GetFileAttributesW 63834->64025 63838 dc9997 84 API calls 63835->63838 63839 dc9997 84 API calls 63836->63839 63841 e2cfde 63838->63841 63842 e2cec8 63839->63842 63840 e2cef6 63843 e2cf09 63840->63843 63846 dc7b52 59 API calls 63840->63846 63844 dc46f9 59 API calls 63841->63844 63845 dc7c8e 59 API calls 63842->63845 63848 dc9997 84 API calls 63843->63848 63854 e2cf0f 63843->63854 63847 e2cff9 63844->63847 63845->63823 63846->63843 63849 dc7b52 59 API calls 63847->63849 63850 e2cf36 63848->63850 63851 e2d008 63849->63851 64026 e23a2b 75 API calls Mailbox 63850->64026 63853 e2d03c 63851->63853 63856 dc7b52 59 API calls 63851->63856 63855 dc81a7 59 API calls 63853->63855 63854->63816 63857 e2d04a 63855->63857 63859 e2d019 63856->63859 63858 dc7c8e 59 API calls 63857->63858 63860 e2d058 63858->63860 63859->63853 63861 dc7d2c 59 API calls 63859->63861 63862 dc7c8e 59 API calls 63860->63862 63863 e2d02e 63861->63863 63865 e2d066 63862->63865 63864 dc7d2c 59 API calls 63863->63864 63864->63853 63866 dc7c8e 59 API calls 63865->63866 63867 e2d074 63866->63867 63868 dc9997 84 API calls 63867->63868 63869 e2d080 63868->63869 63915 e242ad 63869->63915 63871 e2d091 63872 e23e73 3 API calls 63871->63872 63873 e2d09b 63872->63873 63874 dc9997 84 API calls 63873->63874 63878 e2d0cc 63873->63878 63875 e2d0b9 63874->63875 63969 e293df 63875->63969 63877 dc4faa 84 API calls 63877->63816 63878->63877 63880 e3cdf1 130 API calls 63879->63880 63881 e3e25b 63880->63881 63881->63787 63883 dc4fb4 63882->63883 63885 dc4fbb 63882->63885 63884 de55d6 83 API calls 63883->63884 63884->63885 63886 dc4fca 63885->63886 63887 dc4fdb FreeLibrary 63885->63887 63886->63787 63887->63886 63888->63783 63889->63787 63890->63785 64027 dc4d13 63891->64027 63896 dfdd0f 63898 dc4faa 84 API calls 63896->63898 63897 dc4f68 LoadLibraryExW 64037 dc4cc8 63897->64037 63900 dfdd16 63898->63900 63902 dc4cc8 3 API calls 63900->63902 63904 dfdd1e 63902->63904 64063 dc506b 63904->64063 63905 dc4f8f 63905->63904 63906 dc4f9b 63905->63906 63908 dc4faa 84 API calls 63906->63908 63910 dc4fa0 63908->63910 63910->63815 63910->63818 63912 dfdd45 64069 dc5027 63912->64069 63916 e242c9 63915->63916 63917 e242ce 63916->63917 63918 e242dc 63916->63918 63919 dc81a7 59 API calls 63917->63919 63920 dc77c7 59 API calls 63918->63920 63968 e242d7 Mailbox 63919->63968 63921 e242e4 63920->63921 63922 dc77c7 59 API calls 63921->63922 63923 e242ec 63922->63923 63924 dc77c7 59 API calls 63923->63924 63925 e242f7 63924->63925 63926 dc77c7 59 API calls 63925->63926 63927 e242ff 63926->63927 63928 dc77c7 59 API calls 63927->63928 63929 e24307 63928->63929 63930 dc77c7 59 API calls 63929->63930 63931 e2430f 63930->63931 63932 dc77c7 59 API calls 63931->63932 63933 e24317 63932->63933 63934 dc77c7 59 API calls 63933->63934 63935 e2431f 63934->63935 63936 dc46f9 59 API calls 63935->63936 63937 e24336 63936->63937 63938 dc46f9 59 API calls 63937->63938 63939 e2434f 63938->63939 63940 dc7b52 59 API calls 63939->63940 63941 e2435b 63940->63941 63942 e2436e 63941->63942 63943 dc7e8c 59 API calls 63941->63943 63944 dc7b52 59 API calls 63942->63944 63943->63942 63945 e24377 63944->63945 63946 e24387 63945->63946 63947 dc7e8c 59 API calls 63945->63947 63948 dc81a7 59 API calls 63946->63948 63947->63946 63949 e24393 63948->63949 63950 dc7c8e 59 API calls 63949->63950 63951 e2439f 63950->63951 64491 e2445f 59 API calls 63951->64491 63953 e243ae 64492 e2445f 59 API calls 63953->64492 63955 e243c1 63956 dc7b52 59 API calls 63955->63956 63957 e243cb 63956->63957 63958 e243e2 63957->63958 63959 e243d0 63957->63959 63961 dc7b52 59 API calls 63958->63961 63960 dc7e0b 59 API calls 63959->63960 63962 e243dd 63960->63962 63963 e243eb 63961->63963 63967 dc7c8e 59 API calls 63962->63967 63964 e24409 63963->63964 63966 dc7e0b 59 API calls 63963->63966 63965 dc7c8e 59 API calls 63964->63965 63965->63968 63966->63962 63967->63964 63968->63871 63970 e293ec __ftell_nolock 63969->63970 63971 de0ff6 Mailbox 59 API calls 63970->63971 63972 e29449 63971->63972 63973 dc538e 59 API calls 63972->63973 63974 e29453 63973->63974 64493 e291e9 63974->64493 63976 e2945e 63977 dc5045 85 API calls 63976->63977 63978 e29471 _wcscmp 63977->63978 63979 e29542 63978->63979 63980 e29495 63978->63980 64529 e299be 96 API calls 2 library calls 63979->64529 64526 e299be 96 API calls 2 library calls 63980->64526 63983 e2949a 63987 e2954b 63983->63987 64527 de432e 58 API calls __wsplitpath_helper 63983->64527 63985 dc506b 74 API calls 63986 e29567 63985->63986 63988 dc506b 74 API calls 63986->63988 63987->63878 63990 e29577 63988->63990 63989 e294c3 _wcscat _wcscpy 64528 de432e 58 API calls __wsplitpath_helper 63989->64528 63991 dc506b 74 API calls 63990->63991 63993 e29592 63991->63993 63994 dc506b 74 API calls 63993->63994 63995 e295a2 63994->63995 63996 dc506b 74 API calls 63995->63996 63998 e295bd 63996->63998 63997 e2950e _wcscat 63997->63985 63997->63987 63999 dc506b 74 API calls 63998->63999 64000 e295cd 63999->64000 64001 dc506b 74 API calls 64000->64001 64002 e295dd 64001->64002 64003 dc506b 74 API calls 64002->64003 64004 e295ed 64003->64004 64496 e29b6d GetTempPathW GetTempFileNameW 64004->64496 64006 e295f9 64007 de548b 115 API calls 64006->64007 64017 e2960a 64007->64017 64008 e296c4 64510 de55d6 64008->64510 64010 e296cf 64012 e296d5 DeleteFileW 64010->64012 64013 e296e9 64010->64013 64011 dc506b 74 API calls 64011->64017 64012->63987 64014 e2978f CopyFileW 64013->64014 64019 e296f3 _wcsncpy 64013->64019 64015 e297b7 DeleteFileW 64014->64015 64016 e297a5 DeleteFileW 64014->64016 64523 e29b2c CreateFileW 64015->64523 64016->63987 64017->63987 64017->64008 64017->64011 64497 de4a93 64017->64497 64530 e28d90 64019->64530 64023 e2977e DeleteFileW 64023->63987 64024->63804 64025->63840 64026->63854 64074 dc4d61 64027->64074 64030 dc4d3a 64032 dc4d4a FreeLibrary 64030->64032 64033 dc4d53 64030->64033 64031 dc4d61 2 API calls 64031->64030 64032->64033 64034 de548b 64033->64034 64078 de54a0 64034->64078 64036 dc4f5c 64036->63896 64036->63897 64236 dc4d94 64037->64236 64040 dc4ced 64042 dc4cff FreeLibrary 64040->64042 64043 dc4d08 64040->64043 64041 dc4d94 2 API calls 64041->64040 64042->64043 64044 dc4dd0 64043->64044 64045 de0ff6 Mailbox 59 API calls 64044->64045 64046 dc4de5 64045->64046 64047 dc538e 59 API calls 64046->64047 64048 dc4df1 _memmove 64047->64048 64049 dc4e2c 64048->64049 64050 dc4ee9 64048->64050 64051 dc4f21 64048->64051 64052 dc5027 69 API calls 64049->64052 64240 dc4fe9 CreateStreamOnHGlobal 64050->64240 64251 e29ba5 95 API calls 64051->64251 64055 dc4e35 64052->64055 64056 dc506b 74 API calls 64055->64056 64057 dc4ec9 64055->64057 64059 dfdcd0 64055->64059 64246 dc5045 64055->64246 64056->64055 64057->63905 64060 dc5045 85 API calls 64059->64060 64061 dfdce4 64060->64061 64062 dc506b 74 API calls 64061->64062 64062->64057 64064 dc507d 64063->64064 64065 dfddf6 64063->64065 64275 de5812 64064->64275 64068 e29393 GetSystemTimeAsFileTime 64068->63912 64070 dc5036 64069->64070 64073 dfddb9 64069->64073 64473 de5e90 64070->64473 64072 dc503e 64075 dc4d2e 64074->64075 64076 dc4d6a LoadLibraryA 64074->64076 64075->64030 64075->64031 64076->64075 64077 dc4d7b GetProcAddress 64076->64077 64077->64075 64081 de54ac __tzset_nolock 64078->64081 64079 de54bf 64127 de8d68 58 API calls __getptd_noexit 64079->64127 64081->64079 64083 de54f0 64081->64083 64082 de54c4 64128 de8ff6 9 API calls __swprintf 64082->64128 64097 df0738 64083->64097 64086 de54f5 64087 de54fe 64086->64087 64088 de550b 64086->64088 64129 de8d68 58 API calls __getptd_noexit 64087->64129 64090 de5535 64088->64090 64091 de5515 64088->64091 64112 df0857 64090->64112 64130 de8d68 58 API calls __getptd_noexit 64091->64130 64092 de54cf __tzset_nolock @_EH4_CallFilterFunc@8 64092->64036 64098 df0744 __tzset_nolock 64097->64098 64099 de9e4b __lock 58 API calls 64098->64099 64106 df0752 64099->64106 64100 df07c6 64132 df084e 64100->64132 64101 df07cd 64137 de8a5d 58 API calls 2 library calls 64101->64137 64104 df07d4 64104->64100 64138 dea06b InitializeCriticalSectionAndSpinCount 64104->64138 64105 df0843 __tzset_nolock 64105->64086 64106->64100 64106->64101 64108 de9ed3 __mtinitlocknum 58 API calls 64106->64108 64135 de6e8d 59 API calls __lock 64106->64135 64136 de6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 64106->64136 64108->64106 64110 df07fa EnterCriticalSection 64110->64100 64121 df0877 __wopenfile 64112->64121 64113 df0891 64143 de8d68 58 API calls __getptd_noexit 64113->64143 64115 df0a4c 64115->64113 64119 df0aaf 64115->64119 64116 df0896 64144 de8ff6 9 API calls __swprintf 64116->64144 64118 de5540 64131 de5562 LeaveCriticalSection LeaveCriticalSection _fprintf 64118->64131 64140 df87f1 64119->64140 64121->64113 64121->64115 64121->64121 64145 de3a0b 60 API calls 2 library calls 64121->64145 64123 df0a45 64123->64115 64146 de3a0b 60 API calls 2 library calls 64123->64146 64125 df0a64 64125->64115 64147 de3a0b 60 API calls 2 library calls 64125->64147 64127->64082 64128->64092 64129->64092 64130->64092 64131->64092 64139 de9fb5 LeaveCriticalSection 64132->64139 64134 df0855 64134->64105 64135->64106 64136->64106 64137->64104 64138->64110 64139->64134 64148 df7fd5 64140->64148 64142 df880a 64142->64118 64143->64116 64144->64118 64145->64123 64146->64125 64147->64115 64150 df7fe1 __tzset_nolock 64148->64150 64149 df7ff7 64233 de8d68 58 API calls __getptd_noexit 64149->64233 64150->64149 64152 df802d 64150->64152 64159 df809e 64152->64159 64153 df7ffc 64234 de8ff6 9 API calls __swprintf 64153->64234 64156 df8049 64235 df8072 LeaveCriticalSection __unlock_fhandle 64156->64235 64158 df8006 __tzset_nolock 64158->64142 64160 df80be 64159->64160 64161 de471a __wsopen_nolock 58 API calls 64160->64161 64164 df80da 64161->64164 64162 de9006 __invoke_watson 8 API calls 64163 df87f0 64162->64163 64166 df7fd5 __wsopen_helper 103 API calls 64163->64166 64165 df8114 64164->64165 64172 df8137 64164->64172 64182 df8211 64164->64182 64167 de8d34 __write 58 API calls 64165->64167 64168 df880a 64166->64168 64169 df8119 64167->64169 64168->64156 64170 de8d68 __swprintf 58 API calls 64169->64170 64171 df8126 64170->64171 64174 de8ff6 __swprintf 9 API calls 64171->64174 64173 df81f5 64172->64173 64181 df81d3 64172->64181 64175 de8d34 __write 58 API calls 64173->64175 64176 df8130 64174->64176 64177 df81fa 64175->64177 64176->64156 64178 de8d68 __swprintf 58 API calls 64177->64178 64179 df8207 64178->64179 64180 de8ff6 __swprintf 9 API calls 64179->64180 64180->64182 64183 ded4d4 __alloc_osfhnd 61 API calls 64181->64183 64182->64162 64184 df82a1 64183->64184 64185 df82ce 64184->64185 64186 df82ab 64184->64186 64187 df7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 64185->64187 64188 de8d34 __write 58 API calls 64186->64188 64197 df82f0 64187->64197 64189 df82b0 64188->64189 64191 de8d68 __swprintf 58 API calls 64189->64191 64190 df836e GetFileType 64194 df83bb 64190->64194 64195 df8379 GetLastError 64190->64195 64193 df82ba 64191->64193 64192 df833c GetLastError 64198 de8d47 __dosmaperr 58 API calls 64192->64198 64199 de8d68 __swprintf 58 API calls 64193->64199 64205 ded76a __set_osfhnd 59 API calls 64194->64205 64196 de8d47 __dosmaperr 58 API calls 64195->64196 64200 df83a0 CloseHandle 64196->64200 64197->64190 64197->64192 64201 df7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 64197->64201 64202 df8361 64198->64202 64199->64176 64200->64202 64203 df83ae 64200->64203 64204 df8331 64201->64204 64207 de8d68 __swprintf 58 API calls 64202->64207 64206 de8d68 __swprintf 58 API calls 64203->64206 64204->64190 64204->64192 64210 df83d9 64205->64210 64208 df83b3 64206->64208 64207->64182 64208->64202 64209 df8594 64209->64182 64213 df8767 CloseHandle 64209->64213 64210->64209 64211 df1b11 __lseeki64_nolock 60 API calls 64210->64211 64229 df845a 64210->64229 64212 df8443 64211->64212 64216 de8d34 __write 58 API calls 64212->64216 64212->64229 64214 df7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 64213->64214 64215 df878e 64214->64215 64217 df87c2 64215->64217 64218 df8796 GetLastError 64215->64218 64216->64229 64217->64182 64219 de8d47 __dosmaperr 58 API calls 64218->64219 64221 df87a2 64219->64221 64220 df1b11 60 API calls __lseeki64_nolock 64220->64229 64225 ded67d __free_osfhnd 59 API calls 64221->64225 64222 df0d2d __close_nolock 61 API calls 64222->64229 64223 df10ab 70 API calls __read_nolock 64223->64229 64224 df848c 64226 df99f2 __chsize_nolock 82 API calls 64224->64226 64224->64229 64225->64217 64226->64224 64227 dedac6 __write 78 API calls 64227->64229 64228 df8611 64230 df0d2d __close_nolock 61 API calls 64228->64230 64229->64209 64229->64220 64229->64222 64229->64223 64229->64224 64229->64227 64229->64228 64231 df8618 64230->64231 64232 de8d68 __swprintf 58 API calls 64231->64232 64232->64182 64233->64153 64234->64158 64235->64158 64237 dc4ce1 64236->64237 64238 dc4d9d LoadLibraryA 64236->64238 64237->64040 64237->64041 64238->64237 64239 dc4dae GetProcAddress 64238->64239 64239->64237 64241 dc5020 64240->64241 64242 dc5003 FindResourceExW 64240->64242 64241->64049 64242->64241 64243 dfdd5c LoadResource 64242->64243 64243->64241 64244 dfdd71 SizeofResource 64243->64244 64244->64241 64245 dfdd85 LockResource 64244->64245 64245->64241 64247 dc5054 64246->64247 64248 dfddd4 64246->64248 64252 de5a7d 64247->64252 64250 dc5062 64250->64055 64251->64049 64253 de5a89 __tzset_nolock 64252->64253 64254 de5a9b 64253->64254 64255 de5ac1 64253->64255 64265 de8d68 58 API calls __getptd_noexit 64254->64265 64267 de6e4e 64255->64267 64258 de5aa0 64266 de8ff6 9 API calls __swprintf 64258->64266 64262 de5ad6 64274 de5af8 LeaveCriticalSection LeaveCriticalSection _fprintf 64262->64274 64264 de5aab __tzset_nolock 64264->64250 64265->64258 64266->64264 64268 de6e5e 64267->64268 64269 de6e80 EnterCriticalSection 64267->64269 64268->64269 64270 de6e66 64268->64270 64271 de5ac7 64269->64271 64272 de9e4b __lock 58 API calls 64270->64272 64273 de59ee 83 API calls 4 library calls 64271->64273 64272->64271 64273->64262 64274->64264 64278 de582d 64275->64278 64277 dc508e 64277->64068 64279 de5839 __tzset_nolock 64278->64279 64280 de5874 __tzset_nolock 64279->64280 64281 de584f _memset 64279->64281 64282 de587c 64279->64282 64280->64277 64305 de8d68 58 API calls __getptd_noexit 64281->64305 64283 de6e4e __lock_file 59 API calls 64282->64283 64285 de5882 64283->64285 64291 de564d 64285->64291 64286 de5869 64306 de8ff6 9 API calls __swprintf 64286->64306 64293 de5668 _memset 64291->64293 64297 de5683 64291->64297 64292 de5673 64403 de8d68 58 API calls __getptd_noexit 64292->64403 64293->64292 64293->64297 64302 de56c3 64293->64302 64295 de5678 64404 de8ff6 9 API calls __swprintf 64295->64404 64307 de58b6 LeaveCriticalSection LeaveCriticalSection _fprintf 64297->64307 64299 de57d4 _memset 64406 de8d68 58 API calls __getptd_noexit 64299->64406 64302->64297 64302->64299 64308 de4916 64302->64308 64315 df10ab 64302->64315 64383 df0df7 64302->64383 64405 df0f18 58 API calls 3 library calls 64302->64405 64305->64286 64306->64280 64307->64280 64309 de4935 64308->64309 64310 de4920 64308->64310 64309->64302 64407 de8d68 58 API calls __getptd_noexit 64310->64407 64312 de4925 64408 de8ff6 9 API calls __swprintf 64312->64408 64314 de4930 64314->64302 64316 df10cc 64315->64316 64317 df10e3 64315->64317 64418 de8d34 58 API calls __getptd_noexit 64316->64418 64319 df181b 64317->64319 64324 df111d 64317->64324 64434 de8d34 58 API calls __getptd_noexit 64319->64434 64321 df10d1 64419 de8d68 58 API calls __getptd_noexit 64321->64419 64322 df1820 64435 de8d68 58 API calls __getptd_noexit 64322->64435 64326 df1125 64324->64326 64332 df113c 64324->64332 64420 de8d34 58 API calls __getptd_noexit 64326->64420 64327 df1131 64436 de8ff6 9 API calls __swprintf 64327->64436 64328 df10d8 64328->64302 64330 df112a 64421 de8d68 58 API calls __getptd_noexit 64330->64421 64332->64328 64333 df1151 64332->64333 64336 df116b 64332->64336 64337 df1189 64332->64337 64422 de8d34 58 API calls __getptd_noexit 64333->64422 64336->64333 64338 df1176 64336->64338 64423 de8a5d 58 API calls 2 library calls 64337->64423 64409 df5ebb 64338->64409 64340 df1199 64342 df11bc 64340->64342 64343 df11a1 64340->64343 64426 df1b11 60 API calls 3 library calls 64342->64426 64424 de8d68 58 API calls __getptd_noexit 64343->64424 64344 df128a 64346 df1303 ReadFile 64344->64346 64351 df12a0 GetConsoleMode 64344->64351 64349 df1325 64346->64349 64350 df17e3 GetLastError 64346->64350 64348 df11a6 64425 de8d34 58 API calls __getptd_noexit 64348->64425 64349->64350 64360 df12f5 64349->64360 64353 df12e3 64350->64353 64354 df17f0 64350->64354 64355 df12b4 64351->64355 64356 df1300 64351->64356 64366 df12e9 64353->64366 64427 de8d47 58 API calls 3 library calls 64353->64427 64432 de8d68 58 API calls __getptd_noexit 64354->64432 64355->64356 64358 df12ba ReadConsoleW 64355->64358 64356->64346 64358->64360 64362 df12dd GetLastError 64358->64362 64365 df15c7 64360->64365 64360->64366 64368 df135a 64360->64368 64361 df17f5 64433 de8d34 58 API calls __getptd_noexit 64361->64433 64362->64353 64364 de2f95 _free 58 API calls 64364->64328 64365->64366 64370 df16cd ReadFile 64365->64370 64366->64328 64366->64364 64369 df13c6 ReadFile 64368->64369 64375 df1447 64368->64375 64371 df13e7 GetLastError 64369->64371 64380 df13f1 64369->64380 64374 df16f0 GetLastError 64370->64374 64382 df16fe 64370->64382 64371->64380 64372 df1504 64377 df14b4 MultiByteToWideChar 64372->64377 64430 df1b11 60 API calls 3 library calls 64372->64430 64373 df14f4 64429 de8d68 58 API calls __getptd_noexit 64373->64429 64374->64382 64375->64366 64375->64372 64375->64373 64375->64377 64377->64362 64377->64366 64380->64368 64428 df1b11 60 API calls 3 library calls 64380->64428 64382->64365 64431 df1b11 60 API calls 3 library calls 64382->64431 64384 df0e02 64383->64384 64388 df0e17 64383->64388 64470 de8d68 58 API calls __getptd_noexit 64384->64470 64386 df0e07 64471 de8ff6 9 API calls __swprintf 64386->64471 64389 df0e4c 64388->64389 64397 df0e12 64388->64397 64472 df6234 58 API calls __malloc_crt 64388->64472 64391 de4916 __flush 58 API calls 64389->64391 64392 df0e60 64391->64392 64437 df0f97 64392->64437 64394 df0e67 64395 de4916 __flush 58 API calls 64394->64395 64394->64397 64396 df0e8a 64395->64396 64396->64397 64398 de4916 __flush 58 API calls 64396->64398 64397->64302 64399 df0e96 64398->64399 64399->64397 64400 de4916 __flush 58 API calls 64399->64400 64401 df0ea3 64400->64401 64402 de4916 __flush 58 API calls 64401->64402 64402->64397 64403->64295 64404->64297 64405->64302 64406->64295 64407->64312 64408->64314 64410 df5ec6 64409->64410 64411 df5ed3 64409->64411 64412 de8d68 __swprintf 58 API calls 64410->64412 64414 df5edf 64411->64414 64415 de8d68 __swprintf 58 API calls 64411->64415 64413 df5ecb 64412->64413 64413->64344 64414->64344 64416 df5f00 64415->64416 64417 de8ff6 __swprintf 9 API calls 64416->64417 64417->64413 64418->64321 64419->64328 64420->64330 64421->64327 64422->64330 64423->64340 64424->64348 64425->64328 64426->64338 64427->64366 64428->64380 64429->64366 64430->64377 64431->64382 64432->64361 64433->64366 64434->64322 64435->64327 64436->64328 64438 df0fa3 __tzset_nolock 64437->64438 64439 df0fc7 64438->64439 64440 df0fb0 64438->64440 64442 df108b 64439->64442 64443 df0fdb 64439->64443 64441 de8d34 __write 58 API calls 64440->64441 64445 df0fb5 64441->64445 64444 de8d34 __write 58 API calls 64442->64444 64446 df0ff9 64443->64446 64447 df1006 64443->64447 64448 df0ffe 64444->64448 64449 de8d68 __swprintf 58 API calls 64445->64449 64450 de8d34 __write 58 API calls 64446->64450 64451 df1028 64447->64451 64452 df1013 64447->64452 64455 de8d68 __swprintf 58 API calls 64448->64455 64459 df0fbc __tzset_nolock 64449->64459 64450->64448 64454 ded446 ___lock_fhandle 59 API calls 64451->64454 64453 de8d34 __write 58 API calls 64452->64453 64456 df1018 64453->64456 64457 df102e 64454->64457 64458 df1020 64455->64458 64460 de8d68 __swprintf 58 API calls 64456->64460 64461 df1054 64457->64461 64462 df1041 64457->64462 64465 de8ff6 __swprintf 9 API calls 64458->64465 64459->64394 64460->64458 64463 de8d68 __swprintf 58 API calls 64461->64463 64464 df10ab __read_nolock 70 API calls 64462->64464 64466 df1059 64463->64466 64467 df104d 64464->64467 64465->64459 64468 de8d34 __write 58 API calls 64466->64468 64469 df1083 __read LeaveCriticalSection 64467->64469 64468->64467 64469->64459 64470->64386 64471->64397 64472->64389 64474 de5e9c __tzset_nolock 64473->64474 64475 de5eae 64474->64475 64476 de5ec3 64474->64476 64487 de8d68 58 API calls __getptd_noexit 64475->64487 64478 de6e4e __lock_file 59 API calls 64476->64478 64480 de5ec9 64478->64480 64479 de5eb3 64488 de8ff6 9 API calls __swprintf 64479->64488 64489 de5b00 67 API calls 6 library calls 64480->64489 64483 de5ed4 64490 de5ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 64483->64490 64485 de5ee6 64486 de5ebe __tzset_nolock 64485->64486 64486->64072 64487->64479 64488->64486 64489->64483 64490->64485 64491->63953 64492->63955 64561 de543a GetSystemTimeAsFileTime 64493->64561 64495 e291f8 64495->63976 64496->64006 64498 de4a9f __tzset_nolock 64497->64498 64499 de4abd 64498->64499 64500 de4ad5 64498->64500 64501 de4acd __tzset_nolock 64498->64501 64575 de8d68 58 API calls __getptd_noexit 64499->64575 64502 de6e4e __lock_file 59 API calls 64500->64502 64501->64017 64505 de4adb 64502->64505 64504 de4ac2 64576 de8ff6 9 API calls __swprintf 64504->64576 64563 de493a 64505->64563 64511 de55e2 __tzset_nolock 64510->64511 64512 de560e 64511->64512 64513 de55f6 64511->64513 64515 de6e4e __lock_file 59 API calls 64512->64515 64519 de5606 __tzset_nolock 64512->64519 64737 de8d68 58 API calls __getptd_noexit 64513->64737 64518 de5620 64515->64518 64516 de55fb 64738 de8ff6 9 API calls __swprintf 64516->64738 64721 de556a 64518->64721 64519->64010 64524 e29b52 SetFileTime CloseHandle 64523->64524 64525 e29b68 64523->64525 64524->64525 64525->63987 64526->63983 64527->63989 64528->63997 64529->63997 64531 e28da9 64530->64531 64532 e28d9b 64530->64532 64534 e28dee 64531->64534 64535 de548b 115 API calls 64531->64535 64546 e28db2 64531->64546 64533 de548b 115 API calls 64532->64533 64533->64531 64546->64015 64546->64023 64562 de5468 __aulldiv 64561->64562 64562->64495 64564 de4967 64563->64564 64566 de4949 64563->64566 64577 de4b0d LeaveCriticalSection LeaveCriticalSection _fprintf 64564->64577 64565 de4957 64606 de8d68 58 API calls __getptd_noexit 64565->64606 64566->64564 64566->64565 64569 de4981 _memmove 64566->64569 64568 de495c 64607 de8ff6 9 API calls __swprintf 64568->64607 64569->64564 64573 de4916 __flush 58 API calls 64569->64573 64578 dedac6 64569->64578 64608 de4c6d 64569->64608 64614 deb05e 78 API calls 6 library calls 64569->64614 64573->64569 64575->64504 64576->64501 64577->64501 64579 dedad2 __tzset_nolock 64578->64579 64580 dedadf 64579->64580 64581 dedaf6 64579->64581 64688 de8d34 58 API calls __getptd_noexit 64580->64688 64582 dedb95 64581->64582 64606->64568 64607->64564 64609 de4c80 64608->64609 64613 de4ca4 64608->64613 64610 de4916 __flush 58 API calls 64609->64610 64609->64613 64611 de4c9d 64610->64611 64613->64569 64614->64569 64722 de558d 64721->64722 64723 de5579 64721->64723 64725 de4c6d __flush 78 API calls 64722->64725 64735 de5589 64722->64735 64770 de8d68 58 API calls __getptd_noexit 64723->64770 64727 de5599 64725->64727 64726 de557e 64771 de8ff6 9 API calls __swprintf 64726->64771 64740 df0dc7 64727->64740 64739 de5645 LeaveCriticalSection LeaveCriticalSection _fprintf 64735->64739 64737->64516 64738->64519 64739->64519 64741 de55a1 64740->64741 64742 df0dd4 64740->64742 64742->64741 64770->64726 64771->64735 64858 e16641 64857->64858 64859 e1665e 64857->64859 64858->64859 64861 e16621 59 API calls Mailbox 64858->64861 64859->63335 64861->64858 64862->63343 64863 dc492e 64864 dc4948 64863->64864 64874 dc49e7 64863->64874 64865 dc4982 IsThemeActive 64864->64865 64875 de35ac 64865->64875 64869 dc49ae 64887 dc4a5b SystemParametersInfoW SystemParametersInfoW 64869->64887 64871 dc49ba 64888 dc3b4c 64871->64888 64873 dc49c2 SystemParametersInfoW 64873->64874 64876 de9e4b __lock 58 API calls 64875->64876 64877 de35b7 DecodePointer EncodePointer 64876->64877 64940 de9fb5 LeaveCriticalSection 64877->64940 64879 dc49a7 64880 de3614 64879->64880 64881 de361e 64880->64881 64882 de3638 64880->64882 64881->64882 64941 de8d68 58 API calls __getptd_noexit 64881->64941 64882->64869 64884 de3628 64942 de8ff6 9 API calls __swprintf 64884->64942 64886 de3633 64886->64869 64887->64871 64889 dc3b59 __ftell_nolock 64888->64889 64890 dc77c7 59 API calls 64889->64890 64891 dc3b63 GetCurrentDirectoryW 64890->64891 64943 dc3778 64891->64943 64893 dc3b8c IsDebuggerPresent 64894 dfd4ad MessageBoxA 64893->64894 64895 dc3b9a 64893->64895 64897 dfd4c7 64894->64897 64895->64897 64898 dc3bb7 64895->64898 64927 dc3c73 64895->64927 64896 dc3c7a SetCurrentDirectoryW 64899 dc3c87 Mailbox 64896->64899 65151 dc7373 59 API calls Mailbox 64897->65151 65024 dc73e5 64898->65024 64899->64873 64902 dfd4d7 64907 dfd4ed SetCurrentDirectoryW 64902->64907 64904 dc3bd5 GetFullPathNameW 64905 dc7d2c 59 API calls 64904->64905 64906 dc3c10 64905->64906 65040 dd0a8d 64906->65040 64907->64899 64910 dc3c2e 64911 dc3c38 64910->64911 65152 e24c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 64910->65152 64927->64896 64940->64879 64941->64884 64942->64886 64944 dc77c7 59 API calls 64943->64944 64945 dc378e 64944->64945 65153 dc3d43 64945->65153 64947 dc37ac 64948 dc4864 61 API calls 64947->64948 64949 dc37c0 64948->64949 64950 dc7f41 59 API calls 64949->64950 64951 dc37cd 64950->64951 64952 dc4f3d 136 API calls 64951->64952 64953 dc37e6 64952->64953 64954 dfd3ae 64953->64954 64955 dc37ee Mailbox 64953->64955 65199 e297e5 64954->65199 64958 dc81a7 59 API calls 64955->64958 64961 dc3801 64958->64961 64959 dfd3cd 64960 de2f95 _free 58 API calls 64959->64960 64963 dfd3da 64960->64963 65167 dc93ea 64961->65167 64962 dc4faa 84 API calls 64962->64959 64965 dc4faa 84 API calls 64963->64965 64967 dfd3e3 64965->64967 64971 dc3ee2 59 API calls 64967->64971 64968 dc7f41 59 API calls 64969 dc381a 64968->64969 65170 dc8620 64969->65170 64973 dfd3fe 64971->64973 64972 dc382c Mailbox 64974 dc7f41 59 API calls 64972->64974 64975 dc3ee2 59 API calls 64973->64975 64976 dc3852 64974->64976 64977 dfd41a 64975->64977 64978 dc8620 69 API calls 64976->64978 64979 dc4864 61 API calls 64977->64979 64981 dc3861 Mailbox 64978->64981 64980 dfd43f 64979->64980 64982 dc3ee2 59 API calls 64980->64982 64984 dc77c7 59 API calls 64981->64984 64983 dfd44b 64982->64983 64985 dc81a7 59 API calls 64983->64985 64986 dc387f 64984->64986 64987 dfd459 64985->64987 65174 dc3ee2 64986->65174 64989 dc3ee2 59 API calls 64987->64989 64991 dfd468 64989->64991 64997 dc81a7 59 API calls 64991->64997 64993 dc3899 64993->64967 64994 dc38a3 64993->64994 64995 de313d _W_store_winword 60 API calls 64994->64995 64996 dc38ae 64995->64996 64996->64973 64998 dc38b8 64996->64998 64999 dfd48a 64997->64999 65000 de313d _W_store_winword 60 API calls 64998->65000 65002 dc3ee2 59 API calls 64999->65002 65001 dc38c3 65000->65001 65001->64977 65004 dc38cd 65001->65004 65003 dfd497 65002->65003 65003->65003 65005 de313d _W_store_winword 60 API calls 65004->65005 65006 dc38d8 65005->65006 65006->64991 65007 dc3919 65006->65007 65009 dc3ee2 59 API calls 65006->65009 65007->64991 65008 dc3926 65007->65008 65011 dc942e 59 API calls 65008->65011 65010 dc38fc 65009->65010 65012 dc81a7 59 API calls 65010->65012 65013 dc3936 65011->65013 65015 dc390a 65012->65015 65014 dc91b0 59 API calls 65013->65014 65016 dc3944 65014->65016 65017 dc3ee2 59 API calls 65015->65017 65190 dc9040 65016->65190 65017->65007 65019 dc93ea 59 API calls 65021 dc3961 65019->65021 65020 dc9040 60 API calls 65020->65021 65021->65019 65021->65020 65022 dc3ee2 59 API calls 65021->65022 65023 dc39a7 Mailbox 65021->65023 65022->65021 65023->64893 65025 dc73f2 __ftell_nolock 65024->65025 65026 dfee4b _memset 65025->65026 65027 dc740b 65025->65027 65029 dfee67 GetOpenFileNameW 65026->65029 65028 dc48ae 60 API calls 65027->65028 65030 dc7414 65028->65030 65031 dfeeb6 65029->65031 65242 de09d5 65030->65242 65034 dc7d2c 59 API calls 65031->65034 65036 dfeecb 65034->65036 65036->65036 65037 dc7429 65260 dc69ca 65037->65260 65041 dd0a9a __ftell_nolock 65040->65041 65430 dc6ee0 65041->65430 65043 dc3c26 65043->64902 65043->64910 65044 dd0a9f 65044->65043 65441 dd12fe 89 API calls 65044->65441 65046 dd0aac 65046->65043 65442 dd4047 91 API calls Mailbox 65046->65442 65151->64902 65154 dc3d50 Mailbox __ftell_nolock 65153->65154 65155 dc7d2c 59 API calls 65154->65155 65160 dc3eb6 Mailbox 65154->65160 65157 dc3d82 65155->65157 65156 dc7b52 59 API calls 65156->65157 65157->65156 65166 dc3db8 Mailbox 65157->65166 65158 dc7b52 59 API calls 65158->65166 65159 dc7f41 59 API calls 65163 dc3eaa 65159->65163 65160->64947 65161 dc3e89 65161->65159 65161->65160 65162 dc7f41 59 API calls 65162->65166 65164 dc3f84 59 API calls 65163->65164 65164->65160 65165 dc3f84 59 API calls 65165->65166 65166->65158 65166->65160 65166->65161 65166->65162 65166->65165 65168 de0ff6 Mailbox 59 API calls 65167->65168 65169 dc380d 65168->65169 65169->64968 65171 dc862b 65170->65171 65173 dc8652 65171->65173 65234 dc8b13 69 API calls Mailbox 65171->65234 65173->64972 65175 dc3eec 65174->65175 65176 dc3f05 65174->65176 65177 dc81a7 59 API calls 65175->65177 65178 dc7d2c 59 API calls 65176->65178 65179 dc388b 65177->65179 65178->65179 65180 de313d 65179->65180 65181 de31be 65180->65181 65182 de3149 65180->65182 65237 de31d0 60 API calls 3 library calls 65181->65237 65189 de316e 65182->65189 65235 de8d68 58 API calls __getptd_noexit 65182->65235 65185 de31cb 65185->64993 65186 de3155 65236 de8ff6 9 API calls __swprintf 65186->65236 65188 de3160 65188->64993 65189->64993 65191 dff5a5 65190->65191 65198 dc9057 65190->65198 65191->65198 65239 dc8d3b 59 API calls Mailbox 65191->65239 65193 dc915f 65193->65021 65194 dc9158 65196 de0ff6 Mailbox 59 API calls 65194->65196 65195 dc91a0 65238 dc9e9c 60 API calls Mailbox 65195->65238 65196->65193 65198->65193 65198->65194 65198->65195 65200 dc5045 85 API calls 65199->65200 65201 e29854 65200->65201 65240 e299be 96 API calls 2 library calls 65201->65240 65203 e29866 65204 dc506b 74 API calls 65203->65204 65230 dfd3c1 65203->65230 65205 e29881 65204->65205 65206 dc506b 74 API calls 65205->65206 65207 e29891 65206->65207 65208 dc506b 74 API calls 65207->65208 65209 e298ac 65208->65209 65210 dc506b 74 API calls 65209->65210 65211 e298c7 65210->65211 65212 dc5045 85 API calls 65211->65212 65213 e298de 65212->65213 65214 de594c _malloc 58 API calls 65213->65214 65215 e298e5 65214->65215 65216 de594c _malloc 58 API calls 65215->65216 65217 e298ef 65216->65217 65218 dc506b 74 API calls 65217->65218 65219 e29903 65218->65219 65241 e29393 GetSystemTimeAsFileTime 65219->65241 65221 e29916 65222 e29940 65221->65222 65223 e2992b 65221->65223 65225 e29946 65222->65225 65226 e299a5 65222->65226 65224 de2f95 _free 58 API calls 65223->65224 65228 e29931 65224->65228 65229 e28d90 116 API calls 65225->65229 65227 de2f95 _free 58 API calls 65226->65227 65227->65230 65231 de2f95 _free 58 API calls 65228->65231 65232 e2999d 65229->65232 65230->64959 65230->64962 65231->65230 65233 de2f95 _free 58 API calls 65232->65233 65233->65230 65234->65173 65235->65186 65236->65188 65237->65185 65238->65193 65239->65198 65240->65203 65241->65221 65243 df1b90 __ftell_nolock 65242->65243 65244 de09e2 GetLongPathNameW 65243->65244 65245 dc7d2c 59 API calls 65244->65245 65246 dc741d 65245->65246 65247 dc716b 65246->65247 65248 dc77c7 59 API calls 65247->65248 65249 dc717d 65248->65249 65250 dc48ae 60 API calls 65249->65250 65251 dc7188 65250->65251 65252 dc7193 65251->65252 65256 dfecae 65251->65256 65253 dc3f84 59 API calls 65252->65253 65255 dc719f 65253->65255 65294 dc34c2 65255->65294 65258 dfecc8 65256->65258 65300 dc7a68 61 API calls 65256->65300 65259 dc71b2 Mailbox 65259->65037 65261 dc4f3d 136 API calls 65260->65261 65262 dc69ef 65261->65262 65263 dfe45a 65262->65263 65264 dc4f3d 136 API calls 65262->65264 65265 e297e5 122 API calls 65263->65265 65266 dc6a03 65264->65266 65267 dfe46f 65265->65267 65266->65263 65268 dc6a0b 65266->65268 65269 dfe473 65267->65269 65270 dfe490 65267->65270 65272 dfe47b 65268->65272 65273 dc6a17 65268->65273 65274 dc4faa 84 API calls 65269->65274 65271 de0ff6 Mailbox 59 API calls 65270->65271 65293 dfe4d5 Mailbox 65271->65293 65394 e24534 90 API calls _wprintf 65272->65394 65301 dc6bec 65273->65301 65274->65272 65277 dfe489 65277->65270 65279 dfe689 65280 de2f95 _free 58 API calls 65279->65280 65281 dfe691 65280->65281 65282 dc4faa 84 API calls 65281->65282 65287 dfe69a 65282->65287 65286 de2f95 _free 58 API calls 65286->65287 65287->65286 65289 dc4faa 84 API calls 65287->65289 65400 e1fcb1 89 API calls 4 library calls 65287->65400 65289->65287 65290 dc7f41 59 API calls 65290->65293 65293->65279 65293->65287 65293->65290 65395 e1fc4d 59 API calls 2 library calls 65293->65395 65396 e1fb6e 61 API calls 2 library calls 65293->65396 65397 e27621 59 API calls Mailbox 65293->65397 65398 dc766f 59 API calls 2 library calls 65293->65398 65399 dc74bd 59 API calls Mailbox 65293->65399 65295 dc34d4 65294->65295 65299 dc34f3 _memmove 65294->65299 65297 de0ff6 Mailbox 59 API calls 65295->65297 65296 de0ff6 Mailbox 59 API calls 65298 dc350a 65296->65298 65297->65299 65298->65259 65299->65296 65300->65256 65302 dfe847 65301->65302 65303 dc6c15 65301->65303 65416 e1fcb1 89 API calls 4 library calls 65302->65416 65406 dc5906 60 API calls Mailbox 65303->65406 65306 dfe85a 65417 e1fcb1 89 API calls 4 library calls 65306->65417 65307 dc6c37 65308 dc5956 67 API calls 65307->65308 65309 dc6c4c 65308->65309 65309->65306 65311 dc6c54 65309->65311 65312 dc77c7 59 API calls 65311->65312 65314 dc6c60 65312->65314 65313 dfe876 65316 dc6cc1 65313->65316 65407 de0b9b 60 API calls __ftell_nolock 65314->65407 65318 dc6ccf 65316->65318 65319 dfe889 65316->65319 65317 dc6c6c 65320 dc77c7 59 API calls 65317->65320 65322 dc77c7 59 API calls 65318->65322 65321 dc5dcf CloseHandle 65319->65321 65323 dc6c78 65320->65323 65324 dfe895 65321->65324 65325 dc6cd8 65322->65325 65326 dc48ae 60 API calls 65323->65326 65327 dc4f3d 136 API calls 65324->65327 65328 dc77c7 59 API calls 65325->65328 65330 dc6c86 65326->65330 65331 dfe8b1 65327->65331 65329 dc6ce1 65328->65329 65332 dc46f9 59 API calls 65329->65332 65408 dc59b0 ReadFile SetFilePointerEx 65330->65408 65334 dfe8da 65331->65334 65338 e297e5 122 API calls 65331->65338 65335 dc6cf8 65332->65335 65418 e1fcb1 89 API calls 4 library calls 65334->65418 65340 dc7c8e 59 API calls 65335->65340 65337 dc6cb2 65342 dc5c4e 2 API calls 65337->65342 65339 dfe8cd 65338->65339 65343 dfe8f6 65339->65343 65344 dfe8d5 65339->65344 65345 dc6d09 SetCurrentDirectoryW 65340->65345 65341 dfe8f1 65373 dc6e6c Mailbox 65341->65373 65342->65316 65347 dc4faa 84 API calls 65343->65347 65346 dc4faa 84 API calls 65344->65346 65350 dc6d1c Mailbox 65345->65350 65346->65334 65348 dfe8fb 65347->65348 65349 de0ff6 Mailbox 59 API calls 65348->65349 65356 dfe92f 65349->65356 65352 de0ff6 Mailbox 59 API calls 65350->65352 65354 dc6d2f 65352->65354 65353 dc3bcd 65353->64904 65353->64927 65355 dc538e 59 API calls 65354->65355 65370 dc6d3a Mailbox __NMSG_WRITE 65355->65370 65419 dc766f 59 API calls 2 library calls 65356->65419 65358 dc6e47 65360 dc5dcf CloseHandle 65358->65360 65359 dfeb69 65425 e27581 59 API calls Mailbox 65359->65425 65362 dc6e53 SetCurrentDirectoryW 65360->65362 65362->65373 65363 dfe978 Mailbox 65363->65359 65385 dc7f41 59 API calls 65363->65385 65389 dfebbb 65363->65389 65420 e1fc4d 59 API calls 2 library calls 65363->65420 65421 e1fb6e 61 API calls 2 library calls 65363->65421 65422 e27621 59 API calls Mailbox 65363->65422 65423 dc766f 59 API calls 2 library calls 65363->65423 65424 dc7373 59 API calls Mailbox 65363->65424 65366 dfeb8b 65426 e2f835 59 API calls 2 library calls 65366->65426 65369 dfeb98 65371 de2f95 _free 58 API calls 65369->65371 65370->65358 65378 dfebfa 65370->65378 65379 dc7f41 59 API calls 65370->65379 65382 dfec02 65370->65382 65409 dc59cd 67 API calls _wcscpy 65370->65409 65410 dc70bd GetStringTypeW 65370->65410 65411 dc702c 60 API calls __wcsnicmp 65370->65411 65412 dc710a GetStringTypeW __NMSG_WRITE 65370->65412 65413 de387d GetStringTypeW _iswctype 65370->65413 65414 dc6a3c 165 API calls 3 library calls 65370->65414 65415 dc7373 59 API calls Mailbox 65370->65415 65371->65373 65401 dc5934 65373->65401 65376 dfec1b 65376->65358 65428 e1fb07 59 API calls 4 library calls 65378->65428 65379->65370 65429 e1fcb1 89 API calls 4 library calls 65382->65429 65385->65363 65427 e1fcb1 89 API calls 4 library calls 65389->65427 65391 dfebd4 65392 de2f95 _free 58 API calls 65391->65392 65393 dfebe7 65392->65393 65393->65373 65394->65277 65395->65293 65396->65293 65397->65293 65398->65293 65399->65293 65400->65287 65402 dc5dcf CloseHandle 65401->65402 65403 dc593c Mailbox 65402->65403 65404 dc5dcf CloseHandle 65403->65404 65405 dc594b 65404->65405 65405->65353 65406->65307 65407->65317 65408->65337 65409->65370 65410->65370 65411->65370 65412->65370 65413->65370 65414->65370 65415->65370 65416->65306 65417->65313 65418->65341 65419->65363 65420->65363 65421->65363 65422->65363 65423->65363 65424->65363 65425->65366 65426->65369 65427->65391 65428->65382 65429->65376 65431 dc6ef5 65430->65431 65435 dc7009 65430->65435 65432 de0ff6 Mailbox 59 API calls 65431->65432 65431->65435 65434 dc6f1c 65432->65434 65433 de0ff6 Mailbox 59 API calls 65440 dc6f91 65433->65440 65434->65433 65435->65044 65440->65435 65441->65046 65545 dc568a 65546 dc5c18 59 API calls 65545->65546 65547 dc569c 65546->65547 65548 dc5632 61 API calls 65547->65548 65549 dc56aa 65548->65549 65551 dc56ba Mailbox 65549->65551 65552 dc81c1 61 API calls Mailbox 65549->65552 65552->65551 65553 dce70b 65556 dcd260 65553->65556 65555 dce719 65557 dcd27d 65556->65557 65558 dcd4dd 65556->65558 65559 e02b0a 65557->65559 65560 e02abb 65557->65560 65564 dcd2a4 65557->65564 65571 dcd6ab 65558->65571 65605 e2a0b5 89 API calls 4 library calls 65558->65605 65600 e3a6fb 341 API calls __cinit 65559->65600 65563 e02abe 65560->65563 65569 e02ad9 65560->65569 65563->65564 65565 e02aca 65563->65565 65564->65558 65566 de2f80 __cinit 67 API calls 65564->65566 65564->65571 65572 dcd594 65564->65572 65577 e02c26 65564->65577 65581 dc8620 69 API calls 65564->65581 65587 dca000 341 API calls 65564->65587 65588 dc81a7 59 API calls 65564->65588 65590 dc88a0 68 API calls __cinit 65564->65590 65591 dc86a2 68 API calls 65564->65591 65593 dc859a 68 API calls 65564->65593 65594 dcd0dc 341 API calls 65564->65594 65595 dc9f3a 59 API calls Mailbox 65564->65595 65596 dcd060 89 API calls 65564->65596 65597 dccedd 341 API calls 65564->65597 65601 dc8bb2 68 API calls 65564->65601 65602 dc9e9c 60 API calls Mailbox 65564->65602 65603 e16d03 60 API calls 65564->65603 65598 e3ad0f 341 API calls 65565->65598 65566->65564 65569->65558 65599 e3b1b7 341 API calls 3 library calls 65569->65599 65570 e02cdf 65570->65570 65571->65555 65592 dc8bb2 68 API calls 65572->65592 65576 dcd5a3 65576->65555 65604 e3aa66 89 API calls 65577->65604 65581->65564 65587->65564 65588->65564 65590->65564 65591->65564 65592->65576 65593->65564 65594->65564 65595->65564 65596->65564 65597->65564 65598->65571 65599->65558 65600->65564 65601->65564 65602->65564 65603->65564 65604->65558 65605->65570 65606 dc1055 65611 dc2649 65606->65611 65609 de2f80 __cinit 67 API calls 65610 dc1064 65609->65610 65612 dc77c7 59 API calls 65611->65612 65613 dc26b7 65612->65613 65618 dc3582 65613->65618 65616 dc2754 65617 dc105a 65616->65617 65621 dc3416 59 API calls 2 library calls 65616->65621 65617->65609 65622 dc35b0 65618->65622 65621->65616 65623 dc35bd 65622->65623 65624 dc35a1 65622->65624 65623->65624 65625 dc35c4 RegOpenKeyExW 65623->65625 65624->65616 65625->65624 65626 dc35de RegQueryValueExW 65625->65626 65627 dc35ff 65626->65627 65628 dc3614 RegCloseKey 65626->65628 65627->65628 65628->65624 65629 dc1066 65634 dcf8cf 65629->65634 65631 dc106c 65632 de2f80 __cinit 67 API calls 65631->65632 65633 dc1076 65632->65633 65635 dcf8f0 65634->65635 65667 de0143 65635->65667 65639 dcf937 65640 dc77c7 59 API calls 65639->65640 65641 dcf941 65640->65641 65642 dc77c7 59 API calls 65641->65642 65643 dcf94b 65642->65643 65644 dc77c7 59 API calls 65643->65644 65645 dcf955 65644->65645 65646 dc77c7 59 API calls 65645->65646 65647 dcf993 65646->65647 65648 dc77c7 59 API calls 65647->65648 65649 dcfa5e 65648->65649 65677 dd60e7 65649->65677 65653 dcfa90 65654 dc77c7 59 API calls 65653->65654 65655 dcfa9a 65654->65655 65705 ddffde 65655->65705 65657 dcfae1 65658 dcfaf1 GetStdHandle 65657->65658 65659 dcfb3d 65658->65659 65660 e049d5 65658->65660 65661 dcfb45 OleInitialize 65659->65661 65660->65659 65662 e049de 65660->65662 65661->65631 65712 e26dda 64 API calls Mailbox 65662->65712 65664 e049e5 65713 e274a9 CreateThread 65664->65713 65666 e049f1 CloseHandle 65666->65661 65714 de021c 65667->65714 65670 de021c 59 API calls 65671 de0185 65670->65671 65672 dc77c7 59 API calls 65671->65672 65673 de0191 65672->65673 65674 dc7d2c 59 API calls 65673->65674 65675 dcf8f6 65674->65675 65676 de03a2 6 API calls 65675->65676 65676->65639 65678 dc77c7 59 API calls 65677->65678 65679 dd60f7 65678->65679 65680 dc77c7 59 API calls 65679->65680 65681 dd60ff 65680->65681 65721 dd5bfd 65681->65721 65684 dd5bfd 59 API calls 65685 dd610f 65684->65685 65686 dc77c7 59 API calls 65685->65686 65687 dd611a 65686->65687 65688 de0ff6 Mailbox 59 API calls 65687->65688 65689 dcfa68 65688->65689 65690 dd6259 65689->65690 65691 dd6267 65690->65691 65692 dc77c7 59 API calls 65691->65692 65693 dd6272 65692->65693 65694 dc77c7 59 API calls 65693->65694 65695 dd627d 65694->65695 65696 dc77c7 59 API calls 65695->65696 65697 dd6288 65696->65697 65698 dc77c7 59 API calls 65697->65698 65699 dd6293 65698->65699 65700 dd5bfd 59 API calls 65699->65700 65701 dd629e 65700->65701 65702 de0ff6 Mailbox 59 API calls 65701->65702 65703 dd62a5 RegisterWindowMessageW 65702->65703 65703->65653 65706 e15cc3 65705->65706 65707 ddffee 65705->65707 65724 e29d71 60 API calls 65706->65724 65709 de0ff6 Mailbox 59 API calls 65707->65709 65711 ddfff6 65709->65711 65710 e15cce 65711->65657 65712->65664 65713->65666 65725 e2748f 65 API calls 65713->65725 65715 dc77c7 59 API calls 65714->65715 65716 de0227 65715->65716 65717 dc77c7 59 API calls 65716->65717 65718 de022f 65717->65718 65719 dc77c7 59 API calls 65718->65719 65720 de017b 65719->65720 65720->65670 65722 dc77c7 59 API calls 65721->65722 65723 dd5c05 65722->65723 65723->65684 65724->65710 65726 dc1016 65731 dc4ad2 65726->65731 65729 de2f80 __cinit 67 API calls 65730 dc1025 65729->65730 65732 de0ff6 Mailbox 59 API calls 65731->65732 65733 dc4ada 65732->65733 65734 dc101b 65733->65734 65738 dc4a94 65733->65738 65734->65729 65739 dc4a9d 65738->65739 65740 dc4aaf 65738->65740 65741 de2f80 __cinit 67 API calls 65739->65741 65742 dc4afe 65740->65742 65741->65740 65743 dc77c7 59 API calls 65742->65743 65744 dc4b16 GetVersionExW 65743->65744 65745 dc7d2c 59 API calls 65744->65745 65746 dc4b59 65745->65746 65747 dc7e8c 59 API calls 65746->65747 65750 dc4b86 65746->65750 65748 dc4b7a 65747->65748 65749 dc7886 59 API calls 65748->65749 65749->65750 65751 dc4bf1 GetCurrentProcess IsWow64Process 65750->65751 65752 dfdc8d 65750->65752 65753 dc4c0a 65751->65753 65754 dc4c89 GetSystemInfo 65753->65754 65755 dc4c20 65753->65755 65756 dc4c56 65754->65756 65766 dc4c95 65755->65766 65756->65734 65759 dc4c7d GetSystemInfo 65762 dc4c47 65759->65762 65760 dc4c32 65761 dc4c95 2 API calls 65760->65761 65763 dc4c3a GetNativeSystemInfo 65761->65763 65762->65756 65764 dc4c4d FreeLibrary 65762->65764 65763->65762 65764->65756 65767 dc4c2e 65766->65767 65768 dc4c9e LoadLibraryA 65766->65768 65767->65759 65767->65760 65768->65767 65769 dc4caf GetProcAddress 65768->65769 65769->65767 65770 dc3633 65771 dc366a 65770->65771 65772 dc3688 65771->65772 65773 dc36e7 65771->65773 65810 dc36e5 65771->65810 65774 dc375d PostQuitMessage 65772->65774 65775 dc3695 65772->65775 65777 dc36ed 65773->65777 65778 dfd31c 65773->65778 65811 dc36d8 65774->65811 65779 dfd38f 65775->65779 65780 dc36a0 65775->65780 65776 dc36ca DefWindowProcW 65776->65811 65782 dc3715 SetTimer RegisterWindowMessageW 65777->65782 65783 dc36f2 65777->65783 65820 dd11d0 10 API calls Mailbox 65778->65820 65824 e22a16 71 API calls _memset 65779->65824 65786 dc36a8 65780->65786 65787 dc3767 65780->65787 65788 dc373e CreatePopupMenu 65782->65788 65782->65811 65784 dfd2bf 65783->65784 65785 dc36f9 KillTimer 65783->65785 65796 dfd2f8 MoveWindow 65784->65796 65797 dfd2c4 65784->65797 65815 dc44cb Shell_NotifyIconW _memset 65785->65815 65792 dc36b3 65786->65792 65801 dfd374 65786->65801 65818 dc4531 64 API calls _memset 65787->65818 65788->65811 65790 dfd343 65821 dd11f3 341 API calls Mailbox 65790->65821 65802 dc36be 65792->65802 65803 dc374b 65792->65803 65793 dfd3a1 65793->65776 65793->65811 65796->65811 65798 dfd2c8 65797->65798 65799 dfd2e7 SetFocus 65797->65799 65798->65802 65805 dfd2d1 65798->65805 65799->65811 65800 dc370c 65816 dc3114 DeleteObject DestroyWindow Mailbox 65800->65816 65801->65776 65823 e1817e 59 API calls Mailbox 65801->65823 65802->65776 65822 dc44cb Shell_NotifyIconW _memset 65802->65822 65817 dc45df 81 API calls _memset 65803->65817 65804 dc375b 65804->65811 65819 dd11d0 10 API calls Mailbox 65805->65819 65810->65776 65813 dfd368 65814 dc43db 68 API calls 65813->65814 65814->65810 65815->65800 65816->65811 65817->65804 65818->65804 65819->65811 65820->65790 65821->65802 65822->65813 65823->65810 65824->65793

                          Control-flow Graph

                          APIs
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DC3B7A
                          • IsDebuggerPresent.KERNEL32 ref: 00DC3B8C
                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00E862F8,00E862E0,?,?), ref: 00DC3BFD
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                            • Part of subcall function 00DD0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00DC3C26,00E862F8,?,?,?), ref: 00DD0ACE
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00DC3C81
                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00E793F0,00000010), ref: 00DFD4BC
                          • SetCurrentDirectoryW.KERNEL32(?,00E862F8,?,?,?), ref: 00DFD4F4
                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00E75D40,00E862F8,?,?,?), ref: 00DFD57A
                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 00DFD581
                            • Part of subcall function 00DC3A58: GetSysColorBrush.USER32(0000000F), ref: 00DC3A62
                            • Part of subcall function 00DC3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00DC3A71
                            • Part of subcall function 00DC3A58: LoadIconW.USER32(00000063), ref: 00DC3A88
                            • Part of subcall function 00DC3A58: LoadIconW.USER32(000000A4), ref: 00DC3A9A
                            • Part of subcall function 00DC3A58: LoadIconW.USER32(000000A2), ref: 00DC3AAC
                            • Part of subcall function 00DC3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00DC3AD2
                            • Part of subcall function 00DC3A58: RegisterClassExW.USER32(?), ref: 00DC3B28
                            • Part of subcall function 00DC39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DC3A15
                            • Part of subcall function 00DC39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DC3A36
                            • Part of subcall function 00DC39E7: ShowWindow.USER32(00000000,?,?), ref: 00DC3A4A
                            • Part of subcall function 00DC39E7: ShowWindow.USER32(00000000,?,?), ref: 00DC3A53
                            • Part of subcall function 00DC43DB: _memset.LIBCMT ref: 00DC4401
                            • Part of subcall function 00DC43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DC44A6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                          • String ID: This is a third-party compiled AutoIt script.$runas$%
                          • API String ID: 529118366-3343222573
                          • Opcode ID: c84c96459332430f072fdaf15225056553f4bf88f8013af3aa4c064a6309f4b0
                          • Instruction ID: 46081df31e90eaf123e955ef927f44e09ce7c70acb0d6a649a1bc9272180999a
                          • Opcode Fuzzy Hash: c84c96459332430f072fdaf15225056553f4bf88f8013af3aa4c064a6309f4b0
                          • Instruction Fuzzy Hash: A151F73090424AAECB11ABB5DC05FFD7B79EF45700F0481ADF459B71A2DA708A4ACB31

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1037 dc4afe-dc4b5e call dc77c7 GetVersionExW call dc7d2c 1042 dc4c69-dc4c6b 1037->1042 1043 dc4b64 1037->1043 1044 dfdb90-dfdb9c 1042->1044 1045 dc4b67-dc4b6c 1043->1045 1046 dfdb9d-dfdba1 1044->1046 1047 dc4c70-dc4c71 1045->1047 1048 dc4b72 1045->1048 1050 dfdba4-dfdbb0 1046->1050 1051 dfdba3 1046->1051 1049 dc4b73-dc4baa call dc7e8c call dc7886 1047->1049 1048->1049 1059 dfdc8d-dfdc90 1049->1059 1060 dc4bb0-dc4bb1 1049->1060 1050->1046 1053 dfdbb2-dfdbb7 1050->1053 1051->1050 1053->1045 1055 dfdbbd-dfdbc4 1053->1055 1055->1044 1057 dfdbc6 1055->1057 1061 dfdbcb-dfdbce 1057->1061 1062 dfdca9-dfdcad 1059->1062 1063 dfdc92 1059->1063 1060->1061 1064 dc4bb7-dc4bc2 1060->1064 1065 dfdbd4-dfdbf2 1061->1065 1066 dc4bf1-dc4c08 GetCurrentProcess IsWow64Process 1061->1066 1071 dfdcaf-dfdcb8 1062->1071 1072 dfdc98-dfdca1 1062->1072 1067 dfdc95 1063->1067 1068 dc4bc8-dc4bca 1064->1068 1069 dfdc13-dfdc19 1064->1069 1065->1066 1070 dfdbf8-dfdbfe 1065->1070 1073 dc4c0d-dc4c1e 1066->1073 1074 dc4c0a 1066->1074 1067->1072 1075 dfdc2e-dfdc3a 1068->1075 1076 dc4bd0-dc4bd3 1068->1076 1079 dfdc1b-dfdc1e 1069->1079 1080 dfdc23-dfdc29 1069->1080 1077 dfdc08-dfdc0e 1070->1077 1078 dfdc00-dfdc03 1070->1078 1071->1067 1081 dfdcba-dfdcbd 1071->1081 1072->1062 1082 dc4c89-dc4c93 GetSystemInfo 1073->1082 1083 dc4c20-dc4c30 call dc4c95 1073->1083 1074->1073 1087 dfdc3c-dfdc3f 1075->1087 1088 dfdc44-dfdc4a 1075->1088 1084 dfdc5a-dfdc5d 1076->1084 1085 dc4bd9-dc4be8 1076->1085 1077->1066 1078->1066 1079->1066 1080->1066 1081->1072 1086 dc4c56-dc4c66 1082->1086 1096 dc4c7d-dc4c87 GetSystemInfo 1083->1096 1097 dc4c32-dc4c3f call dc4c95 1083->1097 1084->1066 1090 dfdc63-dfdc78 1084->1090 1091 dfdc4f-dfdc55 1085->1091 1092 dc4bee 1085->1092 1087->1066 1088->1066 1094 dfdc7a-dfdc7d 1090->1094 1095 dfdc82-dfdc88 1090->1095 1091->1066 1092->1066 1094->1066 1095->1066 1099 dc4c47-dc4c4b 1096->1099 1102 dc4c76-dc4c7b 1097->1102 1103 dc4c41-dc4c45 GetNativeSystemInfo 1097->1103 1099->1086 1101 dc4c4d-dc4c50 FreeLibrary 1099->1101 1101->1086 1102->1103 1103->1099
                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 00DC4B2B
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          • GetCurrentProcess.KERNEL32(?,00E4FAEC,00000000,00000000,?), ref: 00DC4BF8
                          • IsWow64Process.KERNEL32(00000000), ref: 00DC4BFF
                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00DC4C45
                          • FreeLibrary.KERNEL32(00000000), ref: 00DC4C50
                          • GetSystemInfo.KERNEL32(00000000), ref: 00DC4C81
                          • GetSystemInfo.KERNEL32(00000000), ref: 00DC4C8D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                          • String ID:
                          • API String ID: 1986165174-0
                          • Opcode ID: 54686099531e2041b8d1d5fc8aa3464651012265a0aed45cb58795a17b398556
                          • Instruction ID: 7d02d4e1eab28296c1c2f2f9d4a4cbe1250538eba88ede5534285c6ff028df28
                          • Opcode Fuzzy Hash: 54686099531e2041b8d1d5fc8aa3464651012265a0aed45cb58795a17b398556
                          • Instruction Fuzzy Hash: FB91D93154A7C5DEC731DB7885616AAFFE6AF2A300B488D5DE0CB93A41D230E948D739

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1104 dc4fe9-dc5001 CreateStreamOnHGlobal 1105 dc5021-dc5026 1104->1105 1106 dc5003-dc501a FindResourceExW 1104->1106 1107 dfdd5c-dfdd6b LoadResource 1106->1107 1108 dc5020 1106->1108 1107->1108 1109 dfdd71-dfdd7f SizeofResource 1107->1109 1108->1105 1109->1108 1110 dfdd85-dfdd90 LockResource 1109->1110 1110->1108 1111 dfdd96-dfddb4 1110->1111 1111->1108
                          APIs
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00DC4EEE,?,?,00000000,00000000), ref: 00DC4FF9
                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00DC4EEE,?,?,00000000,00000000), ref: 00DC5010
                          • LoadResource.KERNEL32(?,00000000,?,?,00DC4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00DC4F8F), ref: 00DFDD60
                          • SizeofResource.KERNEL32(?,00000000,?,?,00DC4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00DC4F8F), ref: 00DFDD75
                          • LockResource.KERNEL32(00DC4EEE,?,?,00DC4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00DC4F8F,00000000), ref: 00DFDD88
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                          • String ID: SCRIPT
                          • API String ID: 3051347437-3967369404
                          • Opcode ID: 4ee9293358816ccf34bf280081548fdea61c41b2a150b9a549819aae728ab895
                          • Instruction ID: 5e8d9867e1ae72a0f35cc746da5f9f13f0f198080a71c8402493a8a7c859e5fb
                          • Opcode Fuzzy Hash: 4ee9293358816ccf34bf280081548fdea61c41b2a150b9a549819aae728ab895
                          • Instruction Fuzzy Hash: 76119A75200701AFD7218B66EC48F277BB9EBCAB12F24816CF406D6260DBA1E8459670
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID: Dt$Dt$Dt$Dt$Variable must be of type 'Object'.
                          • API String ID: 0-3952547859
                          • Opcode ID: c6ae77c719eda2d301f124f3bd4387fdca66979130aef76593b77933c62c9b96
                          • Instruction ID: 8c27b04fa7f1f31f78ad1df62891673810b802918709dd6b04af8b3e8c6623e9
                          • Opcode Fuzzy Hash: c6ae77c719eda2d301f124f3bd4387fdca66979130aef76593b77933c62c9b96
                          • Instruction Fuzzy Hash: C1A25CB5A04216CFCB24CF58C580FA9B7B2FF48314F28805DE956AB251D735ED86CB61
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,00DFE7C1), ref: 00E246A6
                          • FindFirstFileW.KERNELBASE(?,?), ref: 00E246B7
                          • FindClose.KERNEL32(00000000), ref: 00E246C7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FileFind$AttributesCloseFirst
                          • String ID:
                          • API String ID: 48322524-0
                          • Opcode ID: 14878318f2ff5975c83649b62c9123c7ece9b7beee439522ee2755f27f3ffab2
                          • Instruction ID: c6780ea8f2af4f05a52e4fcd35973e67f55b52cd2c9b80e57576b6c20d38bb20
                          • Opcode Fuzzy Hash: 14878318f2ff5975c83649b62c9123c7ece9b7beee439522ee2755f27f3ffab2
                          • Instruction Fuzzy Hash: 0BE0D8754104109F42106738FC4D8EA775C9F07739F100715F935E10F0E7B059548599
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DD0BBB
                          • timeGetTime.WINMM ref: 00DD0E76
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00DD0FB3
                          • TranslateMessage.USER32(?), ref: 00DD0FC7
                          • DispatchMessageW.USER32(?), ref: 00DD0FD5
                          • Sleep.KERNEL32(0000000A), ref: 00DD0FDF
                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00DD105A
                          • DestroyWindow.USER32 ref: 00DD1066
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00DD1080
                          • Sleep.KERNEL32(0000000A,?,?), ref: 00E052AD
                          • TranslateMessage.USER32(?), ref: 00E0608A
                          • DispatchMessageW.USER32(?), ref: 00E06098
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00E060AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pr$pr$pr$pr
                          • API String ID: 4003667617-1825247661
                          • Opcode ID: da93bbc22ed8bc63a940bc5faf3c5f483abf44344c35bd6da093b6d18839d9ce
                          • Instruction ID: af32d52e9cd4074d969b5482bbceaf1fedda42d64a40214ee2dde5b2d7982053
                          • Opcode Fuzzy Hash: da93bbc22ed8bc63a940bc5faf3c5f483abf44344c35bd6da093b6d18839d9ce
                          • Instruction Fuzzy Hash: F5B29271608741DFD724DF24C884BAABBE5FF84304F14491EE499A72A1DB71E885CFA2

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                            • Part of subcall function 00E291E9: __time64.LIBCMT ref: 00E291F3
                            • Part of subcall function 00DC5045: _fseek.LIBCMT ref: 00DC505D
                          • __wsplitpath.LIBCMT ref: 00E294BE
                            • Part of subcall function 00DE432E: __wsplitpath_helper.LIBCMT ref: 00DE436E
                          • _wcscpy.LIBCMT ref: 00E294D1
                          • _wcscat.LIBCMT ref: 00E294E4
                          • __wsplitpath.LIBCMT ref: 00E29509
                          • _wcscat.LIBCMT ref: 00E2951F
                          • _wcscat.LIBCMT ref: 00E29532
                            • Part of subcall function 00E2922F: _memmove.LIBCMT ref: 00E29268
                            • Part of subcall function 00E2922F: _memmove.LIBCMT ref: 00E29277
                          • _wcscmp.LIBCMT ref: 00E29479
                            • Part of subcall function 00E299BE: _wcscmp.LIBCMT ref: 00E29AAE
                            • Part of subcall function 00E299BE: _wcscmp.LIBCMT ref: 00E29AC1
                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00E296DC
                          • _wcsncpy.LIBCMT ref: 00E2974F
                          • DeleteFileW.KERNEL32(?,?), ref: 00E29785
                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00E2979B
                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E297AC
                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00E297BE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_malloc_wcscpy_wcsncpy
                          • String ID:
                          • API String ID: 2135030263-0
                          • Opcode ID: d048076ff52f203282003d4ac620d1e27a33c2622ff8ee0333318a590ee9f014
                          • Instruction ID: a809506919b33d94b80f6016d6f97d42d3baa2b16f5a0699199fd890ec549ecd
                          • Opcode Fuzzy Hash: d048076ff52f203282003d4ac620d1e27a33c2622ff8ee0333318a590ee9f014
                          • Instruction Fuzzy Hash: 37C128B1D00229AADF21DF95DC85EDEB7BDEF45300F0050AAE609E7152DB70AA848F65

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00DC3074
                          • RegisterClassExW.USER32(00000030), ref: 00DC309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DC30AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 00DC30CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DC30DC
                          • LoadIconW.USER32(000000A9), ref: 00DC30F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DC3101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: 398a91169e5ca14a457bd054b6efa2361307d280f5ebe5c2d130fce243548d6f
                          • Instruction ID: 68ba6880344f915ce7e4dfd4f769b8eb8d0cece7a24163cbc5f58ae67181c743
                          • Opcode Fuzzy Hash: 398a91169e5ca14a457bd054b6efa2361307d280f5ebe5c2d130fce243548d6f
                          • Instruction Fuzzy Hash: F33156B5840309EFDB00CFA5E889AD9BBF4FB0A710F10416AE544B62A0D3B90549CF51

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00DC3074
                          • RegisterClassExW.USER32(00000030), ref: 00DC309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DC30AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 00DC30CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DC30DC
                          • LoadIconW.USER32(000000A9), ref: 00DC30F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DC3101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: e42b59eb80f0fc4bd4917bb69b59370fa1ab435fed9a19e8b9b0646f79e80601
                          • Instruction ID: b5e48c5830c10c657d976c7a41f10a488d217f028cd682f4658a26d1a29b6a1e
                          • Opcode Fuzzy Hash: e42b59eb80f0fc4bd4917bb69b59370fa1ab435fed9a19e8b9b0646f79e80601
                          • Instruction Fuzzy Hash: FA21C5B5D50218AFDB00DFA6E849B9DBBF4FB09B00F00412AF518B62A0D7B545498F95

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00DC4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00E862F8,?,00DC37C0,?), ref: 00DC4882
                            • Part of subcall function 00DE074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00DC72C5), ref: 00DE0771
                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00DC7308
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00DFECF1
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00DFED32
                          • RegCloseKey.ADVAPI32(?), ref: 00DFED70
                          • _wcscat.LIBCMT ref: 00DFEDC9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                          • API String ID: 2673923337-2727554177
                          • Opcode ID: a921abf34399c010e95585a6427a67499f45938e8c9eede0160ad47099e6c75b
                          • Instruction ID: 92fc7a0bcc9e0838285bf3c950ce1a59845d90fa2873b193eca6831964031e9b
                          • Opcode Fuzzy Hash: a921abf34399c010e95585a6427a67499f45938e8c9eede0160ad47099e6c75b
                          • Instruction Fuzzy Hash: 7A717CB14083069EC314EF66EC8196BBBE8FF95750B54492EF589A31B0DB30D948CB71

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 760 dc3633-dc3681 762 dc36e1-dc36e3 760->762 763 dc3683-dc3686 760->763 762->763 766 dc36e5 762->766 764 dc3688-dc368f 763->764 765 dc36e7 763->765 767 dc375d-dc3765 PostQuitMessage 764->767 768 dc3695-dc369a 764->768 770 dc36ed-dc36f0 765->770 771 dfd31c-dfd34a call dd11d0 call dd11f3 765->771 769 dc36ca-dc36d2 DefWindowProcW 766->769 776 dc3711-dc3713 767->776 772 dfd38f-dfd3a3 call e22a16 768->772 773 dc36a0-dc36a2 768->773 775 dc36d8-dc36de 769->775 777 dc3715-dc373c SetTimer RegisterWindowMessageW 770->777 778 dc36f2-dc36f3 770->778 807 dfd34f-dfd356 771->807 772->776 800 dfd3a9 772->800 781 dc36a8-dc36ad 773->781 782 dc3767-dc3776 call dc4531 773->782 776->775 777->776 783 dc373e-dc3749 CreatePopupMenu 777->783 779 dfd2bf-dfd2c2 778->779 780 dc36f9-dc370c KillTimer call dc44cb call dc3114 778->780 792 dfd2f8-dfd317 MoveWindow 779->792 793 dfd2c4-dfd2c6 779->793 780->776 787 dfd374-dfd37b 781->787 788 dc36b3-dc36b8 781->788 782->776 783->776 787->769 797 dfd381-dfd38a call e1817e 787->797 798 dc36be-dc36c4 788->798 799 dc374b-dc375b call dc45df 788->799 792->776 794 dfd2c8-dfd2cb 793->794 795 dfd2e7-dfd2f3 SetFocus 793->795 794->798 803 dfd2d1-dfd2e2 call dd11d0 794->803 795->776 797->769 798->769 798->807 799->776 800->769 803->776 807->769 811 dfd35c-dfd36f call dc44cb call dc43db 807->811 811->769
                          APIs
                          • DefWindowProcW.USER32(?,?,?,?), ref: 00DC36D2
                          • KillTimer.USER32(?,00000001), ref: 00DC36FC
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DC371F
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DC372A
                          • CreatePopupMenu.USER32 ref: 00DC373E
                          • PostQuitMessage.USER32(00000000), ref: 00DC375F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                          • String ID: TaskbarCreated$%
                          • API String ID: 129472671-3835587964
                          • Opcode ID: b123129c58e12df72668716be78da0467eeba89fb5e3ddbb713ced683b943134
                          • Instruction ID: 840ee1ca10c2b5564e976ca2b15bf5481b8fe8032cce1cd5b818b0f2f2280ade
                          • Opcode Fuzzy Hash: b123129c58e12df72668716be78da0467eeba89fb5e3ddbb713ced683b943134
                          • Instruction Fuzzy Hash: 044116B2254107BFDF146F68EC0AF793755EB41300F18812DF64AA72E1CA64DE1597B1

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00DC3A62
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00DC3A71
                          • LoadIconW.USER32(00000063), ref: 00DC3A88
                          • LoadIconW.USER32(000000A4), ref: 00DC3A9A
                          • LoadIconW.USER32(000000A2), ref: 00DC3AAC
                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00DC3AD2
                          • RegisterClassExW.USER32(?), ref: 00DC3B28
                            • Part of subcall function 00DC3041: GetSysColorBrush.USER32(0000000F), ref: 00DC3074
                            • Part of subcall function 00DC3041: RegisterClassExW.USER32(00000030), ref: 00DC309E
                            • Part of subcall function 00DC3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00DC30AF
                            • Part of subcall function 00DC3041: InitCommonControlsEx.COMCTL32(?), ref: 00DC30CC
                            • Part of subcall function 00DC3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00DC30DC
                            • Part of subcall function 00DC3041: LoadIconW.USER32(000000A9), ref: 00DC30F2
                            • Part of subcall function 00DC3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00DC3101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                          • String ID: #$0$AutoIt v3
                          • API String ID: 423443420-4155596026
                          • Opcode ID: f8b25ca4da5d195f162d97417f12e905be1b56d88b226927a8b9878624e79fab
                          • Instruction ID: edfe9a4524f8031ad3f375fba8a086c2c4949b9303446dbb0833f9dd1f18d40f
                          • Opcode Fuzzy Hash: f8b25ca4da5d195f162d97417f12e905be1b56d88b226927a8b9878624e79fab
                          • Instruction Fuzzy Hash: 4F214B75950308AFEB109FA6EC09B9D7BB5FB08710F00416AF508BB2B0D3BA56589F94

                          Control-flow Graph

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$b
                          • API String ID: 1825951767-3834736419
                          • Opcode ID: 49ef9e9a25e2cd8e66459e4b8dcfffccb2da33a3682900d333972c3bda9b78d0
                          • Instruction ID: def6e43e59b05d1f29397f46423d0d8cb58f4064f9a7872276a3afc1b99f6451
                          • Opcode Fuzzy Hash: 49ef9e9a25e2cd8e66459e4b8dcfffccb2da33a3682900d333972c3bda9b78d0
                          • Instruction Fuzzy Hash: 06A14A7191022A9ACB05EBA1DC96EEEB7B9FF14300F14452DF416B7191DF74AA09CB70

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00DE03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DE03D3
                            • Part of subcall function 00DE03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00DE03DB
                            • Part of subcall function 00DE03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DE03E6
                            • Part of subcall function 00DE03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DE03F1
                            • Part of subcall function 00DE03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00DE03F9
                            • Part of subcall function 00DE03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00DE0401
                            • Part of subcall function 00DD6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00DCFA90), ref: 00DD62B4
                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00DCFB2D
                          • OleInitialize.OLE32(00000000), ref: 00DCFBAA
                          • CloseHandle.KERNEL32(00000000), ref: 00E049F2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                          • String ID: <g$\d$%$c
                          • API String ID: 1986988660-619945097
                          • Opcode ID: cd676ded48a0ee1862973d4d83b829e631adad6f78891d22675e056720430486
                          • Instruction ID: f655133ecbd0f9a10ee078ac50f0019e207704e7766ec758fd7e2ae6f923aff4
                          • Opcode Fuzzy Hash: cd676ded48a0ee1862973d4d83b829e631adad6f78891d22675e056720430486
                          • Instruction Fuzzy Hash: 718187B09012508FC784EF7BA9556197BF5FB98708B10952AE42DFB272EB36440D8F61

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 983 d22660-d2270e call d20000 986 d22715-d2273b call d23570 CreateFileW 983->986 989 d22742-d22752 986->989 990 d2273d 986->990 998 d22754 989->998 999 d22759-d22773 VirtualAlloc 989->999 991 d2288d-d22891 990->991 992 d228d3-d228d6 991->992 993 d22893-d22897 991->993 995 d228d9-d228e0 992->995 996 d228a3-d228a7 993->996 997 d22899-d2289c 993->997 1000 d228e2-d228ed 995->1000 1001 d22935-d2294a 995->1001 1002 d228b7-d228bb 996->1002 1003 d228a9-d228b3 996->1003 997->996 998->991 1004 d22775 999->1004 1005 d2277a-d22791 ReadFile 999->1005 1008 d228f1-d228fd 1000->1008 1009 d228ef 1000->1009 1010 d2295a-d22962 1001->1010 1011 d2294c-d22957 VirtualFree 1001->1011 1012 d228cb 1002->1012 1013 d228bd-d228c7 1002->1013 1003->1002 1004->991 1006 d22793 1005->1006 1007 d22798-d227d8 VirtualAlloc 1005->1007 1006->991 1014 d227da 1007->1014 1015 d227df-d227fa call d237c0 1007->1015 1016 d22911-d2291d 1008->1016 1017 d228ff-d2290f 1008->1017 1009->1001 1011->1010 1012->992 1013->1012 1014->991 1023 d22805-d2280f 1015->1023 1020 d2292a-d22930 1016->1020 1021 d2291f-d22928 1016->1021 1019 d22933 1017->1019 1019->995 1020->1019 1021->1019 1024 d22842-d22856 call d235d0 1023->1024 1025 d22811-d22840 call d237c0 1023->1025 1031 d2285a-d2285e 1024->1031 1032 d22858 1024->1032 1025->1023 1033 d22860-d22864 FindCloseChangeNotification 1031->1033 1034 d2286a-d2286e 1031->1034 1032->991 1033->1034 1035 d22870-d2287b VirtualFree 1034->1035 1036 d2287e-d22887 1034->1036 1035->1036 1036->986 1036->991
                          APIs
                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00D22731
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00D22957
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateFileFreeVirtual
                          • String ID:
                          • API String ID: 204039940-0
                          • Opcode ID: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
                          • Instruction ID: 77b33b8537d67ff0308cf930d4d97d34d1525c1f80cf18c49e98935d38574805
                          • Opcode Fuzzy Hash: 30e8af4b53c3aa052917812e21e5e8fbde56ed90f0e39d50c947676a587081b9
                          • Instruction Fuzzy Hash: EFA11870E04219EBDB14CFA4D894BEEB7B5FF58308F248159E501BB280D7799A81CFA4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1114 dc39e7-dc3a57 CreateWindowExW * 2 ShowWindow * 2
                          APIs
                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00DC3A15
                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00DC3A36
                          • ShowWindow.USER32(00000000,?,?), ref: 00DC3A4A
                          • ShowWindow.USER32(00000000,?,?), ref: 00DC3A53
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$CreateShow
                          • String ID: AutoIt v3$edit
                          • API String ID: 1584632944-3779509399
                          • Opcode ID: e5b09fd313be7be75bf9ed2c0e3205f7c64fb3cfca67b2306bc9e5314ef149a5
                          • Instruction ID: b681298598724a4a21520114c2e934d9de00abff1eb79439152c6f1925127dee
                          • Opcode Fuzzy Hash: e5b09fd313be7be75bf9ed2c0e3205f7c64fb3cfca67b2306bc9e5314ef149a5
                          • Instruction Fuzzy Hash: 2EF03A706802907EEA3017237C0DF273E7DD7C7F51B01006AF908B6170C2A51805DBB0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1115 d22410-d2255a call d20000 call d22300 CreateFileW 1122 d22561-d22571 1115->1122 1123 d2255c 1115->1123 1126 d22573 1122->1126 1127 d22578-d22592 VirtualAlloc 1122->1127 1124 d22611-d22616 1123->1124 1126->1124 1128 d22596-d225ad ReadFile 1127->1128 1129 d22594 1127->1129 1130 d225b1-d225eb call d22340 call d21300 1128->1130 1131 d225af 1128->1131 1129->1124 1136 d22607-d2260f ExitProcess 1130->1136 1137 d225ed-d22602 call d22390 1130->1137 1131->1124 1136->1124 1137->1136
                          APIs
                            • Part of subcall function 00D22300: Sleep.KERNELBASE(000001F4), ref: 00D22311
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00D22550
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateFileSleep
                          • String ID: EYYYUQZR73MP8H3ZO
                          • API String ID: 2694422964-3082021987
                          • Opcode ID: 6304cb1f1788efe888aae8003b0178b48f2a3a0cd13213c24e8d8ab16d6311c4
                          • Instruction ID: f3f7f74de4ce7e3acb097ca3fb9bb4f92b2df11a1ed81865124904ba1b25a048
                          • Opcode Fuzzy Hash: 6304cb1f1788efe888aae8003b0178b48f2a3a0cd13213c24e8d8ab16d6311c4
                          • Instruction Fuzzy Hash: 6F51B130D14258EBEF11DBE4D854BEEBBB5AF28304F004199E608BB2C1D7795B44CBA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1139 dc410d-dc4123 1140 dc4129-dc413e call dc7b76 1139->1140 1141 dc4200-dc4204 1139->1141 1144 dfd5dd-dfd5ec LoadStringW 1140->1144 1145 dc4144-dc4164 call dc7d2c 1140->1145 1148 dfd5f7-dfd60f call dc7c8e call dc7143 1144->1148 1145->1148 1149 dc416a-dc416e 1145->1149 1158 dc417e-dc41fb call de3020 call dc463e call de2ffc Shell_NotifyIconW call dc5a64 1148->1158 1161 dfd615-dfd633 call dc7e0b call dc7143 call dc7e0b 1148->1161 1151 dc4174-dc4179 call dc7c8e 1149->1151 1152 dc4205-dc420e call dc81a7 1149->1152 1151->1158 1152->1158 1158->1141 1161->1158
                          APIs
                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00DFD5EC
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          • _memset.LIBCMT ref: 00DC418D
                          • _wcscpy.LIBCMT ref: 00DC41E1
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DC41F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                          • String ID: Line:
                          • API String ID: 3942752672-1585850449
                          • Opcode ID: e5aaa215f1ff02ece642e4261f0442955a1c8eef62c02d7030f143a514f7bf72
                          • Instruction ID: 7cd1438e66e611c8db676ffe88b7f1f11bce71d20255a6bbd90db7db7a85e8eb
                          • Opcode Fuzzy Hash: e5aaa215f1ff02ece642e4261f0442955a1c8eef62c02d7030f143a514f7bf72
                          • Instruction Fuzzy Hash: 5D31B3710083469ED721EB60DC46FDB77ECAF54310F14455EF199A30A1DB70A648CBB2
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                          • String ID:
                          • API String ID: 1559183368-0
                          • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                          • Instruction ID: 0a920b27627c971385a35a90acd34806e44fb193a60d8cdc901edec887123f54
                          • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                          • Instruction Fuzzy Hash: F251DB30A00B85DBDB24BF6AE84056E77A1EF403A8F68832DF865961D4D770DD608B70
                          APIs
                            • Part of subcall function 00DC4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DC4F6F
                          • _free.LIBCMT ref: 00DFE68C
                          • _free.LIBCMT ref: 00DFE6D3
                            • Part of subcall function 00DC6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00DC6D0D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _free$CurrentDirectoryLibraryLoad
                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                          • API String ID: 2861923089-1757145024
                          • Opcode ID: ab23c385ecfef7b036200c9c0e5744567a325e39fcc1be24bca5e6377fb2a9f5
                          • Instruction ID: 31637f956330e1e806d3b515569f29eab6a70672081012d3b4259e9f72538164
                          • Opcode Fuzzy Hash: ab23c385ecfef7b036200c9c0e5744567a325e39fcc1be24bca5e6377fb2a9f5
                          • Instruction Fuzzy Hash: 3191597191025EAFCF04EFA4D8919EDB7B4FF19314B14846EE915AB2A1DB30E944CBB0
                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00DC35A1,SwapMouseButtons,00000004,?), ref: 00DC35D4
                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00DC35A1,SwapMouseButtons,00000004,?,?,?,?,00DC2754), ref: 00DC35F5
                          • RegCloseKey.KERNELBASE(00000000,?,?,00DC35A1,SwapMouseButtons,00000004,?,?,?,?,00DC2754), ref: 00DC3617
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Control Panel\Mouse
                          • API String ID: 3677997916-824357125
                          • Opcode ID: 11e725548e67b5ca645740d2485ca5f1c0a3a17b27becfc0a2be231bde49667e
                          • Instruction ID: 13e8b7652fc7756b6f2cec7360b5b82b57304de34f5fe608a737b71a625ad726
                          • Opcode Fuzzy Hash: 11e725548e67b5ca645740d2485ca5f1c0a3a17b27becfc0a2be231bde49667e
                          • Instruction Fuzzy Hash: 11115775650209BFDB218F65DC80EEEBBB8EF45740F018469F805E7210E272AF459BB0
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00D21B2D
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00D21B51
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00D21B73
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                          • Instruction ID: 4006f989cc91e147aac7e2981e9433d5fbe10b4f5390ee79e7642f0909051693
                          • Opcode Fuzzy Hash: e8e7a77c1c38f92167ec50984bffac71589908538948dc0fdf133907e09ee162
                          • Instruction Fuzzy Hash: 1A620F34A14258DBEB24CF64D840BDEB372EF68304F1091A9E50DEB394E7759E81CB65
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                          • String ID:
                          • API String ID: 2782032738-0
                          • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                          • Instruction ID: 53283956dff9425c9f2d7bca29c4d4f1981475248a35ead35bdad423637f5655
                          • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                          • Instruction Fuzzy Hash: 584116706007859BDF28EEABC8809AF77A6EF84374B28817DE859D7641D730DD408B74
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • _memmove.LIBCMT ref: 00DC4E1A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _malloc_memmove
                          • String ID: AU3!P/$EA06
                          • API String ID: 1183979061-182974850
                          • Opcode ID: f941e406f85ddebaeb20047422ea6744173d22fad72e355a061d5fa7bf7508c0
                          • Instruction ID: 6cf09ee932dc615f0e96614ee290d1f606bd3f14af5a7ea3f4f6041d80622325
                          • Opcode Fuzzy Hash: f941e406f85ddebaeb20047422ea6744173d22fad72e355a061d5fa7bf7508c0
                          • Instruction Fuzzy Hash: 1A415C31A0425A5BDF215B649871FBE7FAAEF05300F2D416DFC82DB286C6219D8087B1
                          APIs
                          • _memset.LIBCMT ref: 00DFEE62
                          • GetOpenFileNameW.COMDLG32(?), ref: 00DFEEAC
                            • Part of subcall function 00DC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DC48A1,?,?,00DC37C0,?), ref: 00DC48CE
                            • Part of subcall function 00DE09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DE09F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Name$Path$FileFullLongOpen_memset
                          • String ID: X
                          • API String ID: 3777226403-3081909835
                          • Opcode ID: fff360b5f46089dc605121758a0ad9ca0383c53a09dc3ebaa10564e4a3167fea
                          • Instruction ID: 0fd33a572aec8baaf825b9990469d68ebf3c4a0b23be0206603272bd8d7661b3
                          • Opcode Fuzzy Hash: fff360b5f46089dc605121758a0ad9ca0383c53a09dc3ebaa10564e4a3167fea
                          • Instruction Fuzzy Hash: 4B21A130A042989BCB159F94C845BEE7BF8DF49300F04805AE508F7242DBB49A898FB1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __fread_nolock_memmove
                          • String ID: EA06
                          • API String ID: 1988441806-3962188686
                          • Opcode ID: 9e9de2637f3e2363efe68033b9a3a968ea131003f22360d3fac43715dfa28d32
                          • Instruction ID: 6642ad9085289a449b372e43c7a5f2d62253e301dd305f7576722d228585fde4
                          • Opcode Fuzzy Hash: 9e9de2637f3e2363efe68033b9a3a968ea131003f22360d3fac43715dfa28d32
                          • Instruction Fuzzy Hash: 2D01F9729042586EDB28D6A9D856EEE7BF8DB01305F00419AF552D2181E575A6048770
                          APIs
                          • GetTempPathW.KERNEL32(00000104,?), ref: 00E29B82
                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00E29B99
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Temp$FileNamePath
                          • String ID: aut
                          • API String ID: 3285503233-3010740371
                          • Opcode ID: b305d3f0af124bfeaf81f7cff7809e9a609c098657fb63de9f3ea9562f2bbf7d
                          • Instruction ID: 8129b7586cbbe53b93cfb2a7e4ec1bed585cb38c0e59f1a7350a2b6d8e865f4c
                          • Opcode Fuzzy Hash: b305d3f0af124bfeaf81f7cff7809e9a609c098657fb63de9f3ea9562f2bbf7d
                          • Instruction Fuzzy Hash: 00D05E7954030DAFDB109B91DC0EF9A772CE704B01F0042B1FE64A10A1EEF155998B95
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2d12f12678d7ad772ba94ffd0c3d544bd885d6fb5d04bdfee2085f3d77434851
                          • Instruction ID: fdeaaa882d4ca2d2f832aeebe9af9fc35a653a4c5fed7bed62c3007c0927ef37
                          • Opcode Fuzzy Hash: 2d12f12678d7ad772ba94ffd0c3d544bd885d6fb5d04bdfee2085f3d77434851
                          • Instruction Fuzzy Hash: 55F15870A083019FC714DF28D884A6ABBE5FF88314F14992EF899AB351D731E945CF92
                          APIs
                          • _memset.LIBCMT ref: 00DC4401
                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00DC44A6
                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00DC44C3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: IconNotifyShell_$_memset
                          • String ID:
                          • API String ID: 1505330794-0
                          • Opcode ID: 57bf6b8bdd791cda1ef415d8fda95dba9e1f55db6d30a355c304ae3381cd31ee
                          • Instruction ID: 58616c4f2c096ad3107d2d012a796403163a194f447eed11a3d7cef2d7ab88c7
                          • Opcode Fuzzy Hash: 57bf6b8bdd791cda1ef415d8fda95dba9e1f55db6d30a355c304ae3381cd31ee
                          • Instruction Fuzzy Hash: B831BFB05083028FC724DF25D894B9BBBE8FB48304F14092EF59AD7250D7B5A948CBA2
                          APIs
                          • _malloc.LIBCMT ref: 00DE100E
                            • Part of subcall function 00DE594C: __FF_MSGBANNER.LIBCMT ref: 00DE5963
                            • Part of subcall function 00DE594C: __NMSG_WRITE.LIBCMT ref: 00DE596A
                            • Part of subcall function 00DE594C: RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000000,?,?,?,00DE1013,?), ref: 00DE598F
                          • std::exception::exception.LIBCMT ref: 00DE102C
                          • __CxxThrowException@8.LIBCMT ref: 00DE1041
                            • Part of subcall function 00DE87DB: RaiseException.KERNEL32(?,?,?,00E7BAF8,00000000,?,?,?,?,00DE1046,?,00E7BAF8,?,00000001), ref: 00DE8830
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                          • String ID:
                          • API String ID: 3074076210-0
                          • Opcode ID: 736d094ee1571ba1a1afad4c8128106a36545196c4fafa42dde1fc96223da603
                          • Instruction ID: 01728528240980f2795801546aa6bc4c58029e65704eae0357b8029b1f047edc
                          • Opcode Fuzzy Hash: 736d094ee1571ba1a1afad4c8128106a36545196c4fafa42dde1fc96223da603
                          • Instruction Fuzzy Hash: 12F0C83960039DA6CB20BA5AEC169DF7BACDF01351F500429FD08A6691DFB1CA8497F1
                          APIs
                          • _malloc.LIBCMT ref: 00E28C3D
                            • Part of subcall function 00DE594C: __FF_MSGBANNER.LIBCMT ref: 00DE5963
                            • Part of subcall function 00DE594C: __NMSG_WRITE.LIBCMT ref: 00DE596A
                            • Part of subcall function 00DE594C: RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000000,?,?,?,00DE1013,?), ref: 00DE598F
                          • _malloc.LIBCMT ref: 00E28C51
                          • _malloc.LIBCMT ref: 00E28C65
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _malloc$AllocateHeap
                          • String ID:
                          • API String ID: 680241177-0
                          • Opcode ID: 900166966c6fda382e5b9b8515ba68ab40651cb712667d991f13203c2245aafe
                          • Instruction ID: 16cb22180342eb018e610ea965ef088c42928007f3e3869fadf98341a3a54267
                          • Opcode Fuzzy Hash: 900166966c6fda382e5b9b8515ba68ab40651cb712667d991f13203c2245aafe
                          • Instruction Fuzzy Hash: 7BF0A771703B615ED3117A7169917AAA6D4DB803B4F09142AE6859A302CF74484057B5
                          APIs
                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00E297D2,?,?,?,?,?,00000004), ref: 00E29B45
                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00E297D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00E29B5B
                          • CloseHandle.KERNEL32(00000000,?,00E297D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00E29B62
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleTime
                          • String ID:
                          • API String ID: 3397143404-0
                          • Opcode ID: 1a186793708bf9a79ffd08048c620ba3b4e1698196b96c69311a0b154e18349f
                          • Instruction ID: 5fe8fac9e3851719af92764ff264a4c686a4ec9f01748178fcbba85e0d028d31
                          • Opcode Fuzzy Hash: 1a186793708bf9a79ffd08048c620ba3b4e1698196b96c69311a0b154e18349f
                          • Instruction Fuzzy Hash: 2DE08636181224BBDB211F55EC09FCA7B58AB06F65F104220FB54791E187B125169798
                          APIs
                          • _free.LIBCMT ref: 00E28FA5
                            • Part of subcall function 00DE2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00DE9C64), ref: 00DE2FA9
                            • Part of subcall function 00DE2F95: GetLastError.KERNEL32(00000000,?,00DE9C64), ref: 00DE2FBB
                          • _free.LIBCMT ref: 00E28FB6
                          • _free.LIBCMT ref: 00E28FC8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 7ae2d2e3dd28ae231ba4dfbfc9ff98cbdd3434907fe9d12881c55d2a38818b0b
                          • Instruction ID: 9d7b3b71113e7af3179a3c923e6a66787b7d99f1bbc61beb22d8bf5a3029c993
                          • Opcode Fuzzy Hash: 7ae2d2e3dd28ae231ba4dfbfc9ff98cbdd3434907fe9d12881c55d2a38818b0b
                          • Instruction Fuzzy Hash: 1EE012B170A7554AEA24B6BABF40AA357EE9F48355718181DB40DEB142DE24E8418134
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _malloc
                          • String ID: CALL
                          • API String ID: 1579825452-4196123274
                          • Opcode ID: 7805c917afe5e6cd177a4a0676f50ecc5c0a564a810c37fbc5accb8147a33bb4
                          • Instruction ID: 93e6369a5bf7cce5bebc5b994b2175c1382703253ce437af5616d55c701f585e
                          • Opcode Fuzzy Hash: 7805c917afe5e6cd177a4a0676f50ecc5c0a564a810c37fbc5accb8147a33bb4
                          • Instruction Fuzzy Hash: 93223674608246CFC724DF18C495F6ABBE1FF44304F19895DE89A9B262D731EC85CBA2
                          APIs
                          • IsThemeActive.UXTHEME ref: 00DC4992
                            • Part of subcall function 00DE35AC: __lock.LIBCMT ref: 00DE35B2
                            • Part of subcall function 00DE35AC: DecodePointer.KERNEL32(00000001,?,00DC49A7,00E181BC), ref: 00DE35BE
                            • Part of subcall function 00DE35AC: EncodePointer.KERNEL32(?,?,00DC49A7,00E181BC), ref: 00DE35C9
                            • Part of subcall function 00DC4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00DC4A73
                            • Part of subcall function 00DC4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00DC4A88
                            • Part of subcall function 00DC3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00DC3B7A
                            • Part of subcall function 00DC3B4C: IsDebuggerPresent.KERNEL32 ref: 00DC3B8C
                            • Part of subcall function 00DC3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00E862F8,00E862E0,?,?), ref: 00DC3BFD
                            • Part of subcall function 00DC3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00DC3C81
                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00DC49D2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                          • String ID:
                          • API String ID: 1438897964-0
                          • Opcode ID: 261c54fac58d9da5917ee06ecdcf9c44415c6271aa75f5395b1dc287a6fe94a1
                          • Instruction ID: ca32a43b8790d21094bd69c68f254ef0ff959cf0f10a24f53ee30d58ea61a433
                          • Opcode Fuzzy Hash: 261c54fac58d9da5917ee06ecdcf9c44415c6271aa75f5395b1dc287a6fe94a1
                          • Instruction Fuzzy Hash: E7118C719183129FC700EF2ADC49A0AFBE8EF94710F00451EF499A72B1DB709549CBA2
                          APIs
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00DC5981,?,?,?,?), ref: 00DC5E27
                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00DC5981,?,?,?,?), ref: 00DFE19C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 522812750d40227a81ebbbeb29797d06ed9241f4f7ef848367e8089d2f1f9c0a
                          • Instruction ID: 945918a9c1dae03daff725aeacc91d60fc8cab2f33b1bb32ec06a6d07519fab7
                          • Opcode Fuzzy Hash: 522812750d40227a81ebbbeb29797d06ed9241f4f7ef848367e8089d2f1f9c0a
                          • Instruction Fuzzy Hash: 29017970244709BEF7250E15DC86F76379CEB05768F14C319FAE56B1E0C6B46E858B60
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __lock_file_memset
                          • String ID:
                          • API String ID: 26237723-0
                          • Opcode ID: 5da88490bacbead166213e62477c02d1488cc55c245288a274595113011ab568
                          • Instruction ID: b489864ea5da377694bc96c679f230cf64ee34996c9185af8f10127b6db69470
                          • Opcode Fuzzy Hash: 5da88490bacbead166213e62477c02d1488cc55c245288a274595113011ab568
                          • Instruction Fuzzy Hash: 58018871C00685EBCF12BF679C0559F7B61EF403A4F148215F8185B1A5DB31CA11EBB1
                          APIs
                            • Part of subcall function 00DE8D68: __getptd_noexit.LIBCMT ref: 00DE8D68
                          • __lock_file.LIBCMT ref: 00DE561B
                            • Part of subcall function 00DE6E4E: __lock.LIBCMT ref: 00DE6E71
                          • __fclose_nolock.LIBCMT ref: 00DE5626
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                          • String ID:
                          • API String ID: 2800547568-0
                          • Opcode ID: 8dc94b9227b7383745f57a11bdef809e6b29e8ddd92fc0d5106e4db0a4dd438f
                          • Instruction ID: c84237ab07e9a80774e9824d91f7b907ced2f904697e56053a4fb834bf4e892a
                          • Opcode Fuzzy Hash: 8dc94b9227b7383745f57a11bdef809e6b29e8ddd92fc0d5106e4db0a4dd438f
                          • Instruction Fuzzy Hash: 12F02471800B809AD720BF779C0276E77A0AF013B8F54820DE428AB0C5CF7C8901AB71
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00D21B2D
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00D21B51
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00D21B73
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                          • Instruction ID: 3d5f8b6aa864fbfa24a43982d59c1489905429becf2ab83cd12aa1b9d9e02e1e
                          • Opcode Fuzzy Hash: 45c0bcdfd50c24934144be52d4489c8f4aeee23b26077383fd0484b0fd6f3e51
                          • Instruction Fuzzy Hash: E712DE24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _malloc
                          • String ID:
                          • API String ID: 1579825452-0
                          • Opcode ID: 8d4b549657f4c493a0c6ff2964fcc0cdc59e4003aa88319a48ba3ab126af5dae
                          • Instruction ID: 4b5f9e7661580dbbf1aa220400ef328d7e54f9209e19dc54919a33b9e7c40c7c
                          • Opcode Fuzzy Hash: 8d4b549657f4c493a0c6ff2964fcc0cdc59e4003aa88319a48ba3ab126af5dae
                          • Instruction Fuzzy Hash: 5F517C35700605AFCF14EB64C996FAE77A6EF84310F1481A9F946AB392CA30ED40CB71
                          APIs
                          • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00DC5CF6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 27c810f5c2c8560f12aac949f44a81f2f630342f72aee02b78c08c58e26735fd
                          • Instruction ID: a3206bffc1856306ab93ebdae144a9edc2eae07c4fdd6722fde4a8d3a408c9c9
                          • Opcode Fuzzy Hash: 27c810f5c2c8560f12aac949f44a81f2f630342f72aee02b78c08c58e26735fd
                          • Instruction Fuzzy Hash: AD313E71A00B0AAFCB18DF2DD584B6DB7B5FF44320F188619D81993714D771B9A0DBA0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: f7bc5b16d14797ea382eb851f4a56dc6934a673e6e0bce03115ca6449fa702a0
                          • Instruction ID: 822328c4eda9032ff7899bc1d7fe4dab611aac13ad9c8fcbf3349a34780fee85
                          • Opcode Fuzzy Hash: f7bc5b16d14797ea382eb851f4a56dc6934a673e6e0bce03115ca6449fa702a0
                          • Instruction Fuzzy Hash: 7821D130A00A0DEBDB149F16E885B7A7FB8FF00380F26C46EE589D6020EB7094E08771
                          APIs
                            • Part of subcall function 00DC4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00DC4D4D
                            • Part of subcall function 00DE548B: __wfsopen.LIBCMT ref: 00DE5496
                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00E862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DC4F6F
                            • Part of subcall function 00DC4CC8: FreeLibrary.KERNEL32(00000000), ref: 00DC4D02
                            • Part of subcall function 00DC4DD0: _memmove.LIBCMT ref: 00DC4E1A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Library$Free$Load__wfsopen_memmove
                          • String ID:
                          • API String ID: 1396898556-0
                          • Opcode ID: ecdb258fb04e0ee8653d7530e6d9d652e9f869651b7140bf74dc52a7a7e1a752
                          • Instruction ID: dafd6ed8f8765608b30f6ce2e6f81d292d3894327476f5a17e0a1ba19cd62b2b
                          • Opcode Fuzzy Hash: ecdb258fb04e0ee8653d7530e6d9d652e9f869651b7140bf74dc52a7a7e1a752
                          • Instruction Fuzzy Hash: 3711E33160030AAACF10FF70DC66FAE77A9DF80711F20842DF942A71C5DA719A059BB0
                          APIs
                          • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00DC5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00DC5D76
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: ee1397170c46469c967ebd10ebb8f906046529226098928f3cb37b1666062734
                          • Instruction ID: 8e5a1d6a88b1203259be89680e20b4a7f91f332951de3f704de93225f0d16511
                          • Opcode Fuzzy Hash: ee1397170c46469c967ebd10ebb8f906046529226098928f3cb37b1666062734
                          • Instruction Fuzzy Hash: 61112571200B029FD3208F15E888F62B7E9EB45760F14892EE4AB87A54D7B1F985CB60
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                          • Instruction ID: 31f3c9b635d77c15a9c853fac0ab70246b8ad8efd50af91d0fa611d6b5ac6f06
                          • Opcode Fuzzy Hash: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                          • Instruction Fuzzy Hash: 30017CB9600542ABC305EB29D841E2AFBAAFF8A3103148159F819C7702DB30FC61CBF0
                          APIs
                          • __lock_file.LIBCMT ref: 00DE4AD6
                            • Part of subcall function 00DE8D68: __getptd_noexit.LIBCMT ref: 00DE8D68
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __getptd_noexit__lock_file
                          • String ID:
                          • API String ID: 2597487223-0
                          • Opcode ID: 4529e9b210220bdf501e779fefb68c204d8375e6f0d6d3ef47b71fce6a42d4c9
                          • Instruction ID: b97c5e5ca00e55270b73879da5436c2f823c48c1b97f9dd7b55479727e710ed9
                          • Opcode Fuzzy Hash: 4529e9b210220bdf501e779fefb68c204d8375e6f0d6d3ef47b71fce6a42d4c9
                          • Instruction Fuzzy Hash: 17F031319402899BDB51BF668C0679E7661EF00329F188514B428AA1D1DB788951EF75
                          APIs
                          • FreeLibrary.KERNEL32(?,?,00E862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DC4FDE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: 41a0e3e159e00813bf6f81bf43ed54e6aa87e54171b353f66aef951275ca1f66
                          • Instruction ID: f98dda8b68242487887493614247dfff720a5ccc49287cbed4dfb33333148ddd
                          • Opcode Fuzzy Hash: 41a0e3e159e00813bf6f81bf43ed54e6aa87e54171b353f66aef951275ca1f66
                          • Instruction Fuzzy Hash: 49F03971105712CFCB349F65E4A4D12BBF1BF043293248A3EE5D683610C731A844DF60
                          APIs
                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00DE09F4
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: LongNamePath_memmove
                          • String ID:
                          • API String ID: 2514874351-0
                          • Opcode ID: 74ab72cf2ec1a13c1e8b31833368c476f305a7454f538f346875c57872802406
                          • Instruction ID: dd9ebd084718fb662ef4a6e56d5a6d8a088bcbac30d898cb991557a4360d5111
                          • Opcode Fuzzy Hash: 74ab72cf2ec1a13c1e8b31833368c476f305a7454f538f346875c57872802406
                          • Instruction Fuzzy Hash: C5E0CD3690522C9BC721D658DC05FFA77EDDF89790F0541B5FD0CD7214D9A19C8186B0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __fread_nolock
                          • String ID:
                          • API String ID: 2638373210-0
                          • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                          • Instruction ID: 586c39da62b2c0387e6b18487addebd118fe28c379042e06353e3b03c1099267
                          • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                          • Instruction Fuzzy Hash: C1E092B0104B405FD7388A24E8507E373E0EB06319F00181CF29A93342EB6278418759
                          APIs
                          • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00DFE16B,?,?,00000000), ref: 00DC5DBF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: a6a0fef9ece3320c4e95a6b9458631d9e0986f92d296a497ab8e54fd533c2909
                          • Instruction ID: fc807aefe2b91234c38e5ddf3f2112cf3309371845bf9a5015353d348b62805a
                          • Opcode Fuzzy Hash: a6a0fef9ece3320c4e95a6b9458631d9e0986f92d296a497ab8e54fd533c2909
                          • Instruction Fuzzy Hash: 7DD0C77464020CBFE710DB81DC46FA9777CD705710F100294FD0466390D6B27D548795
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __wfsopen
                          • String ID:
                          • API String ID: 197181222-0
                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction ID: 1b2c04682042eaf6eb34b74b96f949375ec9850667421284890d764d1b135b52
                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction Fuzzy Hash: 17B0927684060C77DE022E82FC02A593B199B406B8F808020FB0C181A2A673A6A096A9
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • GetLastError.KERNEL32(00000002,00000000), ref: 00E2D46A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorLast_malloc
                          • String ID:
                          • API String ID: 1018170914-0
                          • Opcode ID: 442f73eaddb33fc423677ae03921bd1b1dc869fd4e76cd6d5098d9710b8dfe6d
                          • Instruction ID: dec377a830005e41ef2bf02323c598c00b678a81bb7042c7c58645bdedf3f4de
                          • Opcode Fuzzy Hash: 442f73eaddb33fc423677ae03921bd1b1dc869fd4e76cd6d5098d9710b8dfe6d
                          • Instruction Fuzzy Hash: E47150302083128FC714EF65E891F6AB7E0EF88314F04556DF5969B2A1DF70E949CB62
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction ID: 4e5adbd2006c076c631ae867d72e4931e154699c38564a13ffe6b3daf7612e00
                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction Fuzzy Hash: D1311670A00145DFC718EF5AD480969FBB6FF59700B688AA5E449CB651D7B0EDC1CBE0
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 00D22311
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction ID: e1cf057050cbc4b81aa9c04d5acbf5857b3cbb25735aaf12fd6789b8ae5750fe
                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction Fuzzy Hash: 56E0E67494010DEFDB00EFB8D9496AE7FF4EF04301F100665FD01D2280D6309D508A72
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00E4CE50
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E4CE91
                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00E4CED6
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E4CF00
                          • SendMessageW.USER32 ref: 00E4CF29
                          • _wcsncpy.LIBCMT ref: 00E4CFA1
                          • GetKeyState.USER32(00000011), ref: 00E4CFC2
                          • GetKeyState.USER32(00000009), ref: 00E4CFCF
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00E4CFE5
                          • GetKeyState.USER32(00000010), ref: 00E4CFEF
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E4D018
                          • SendMessageW.USER32 ref: 00E4D03F
                          • SendMessageW.USER32(?,00001030,?,00E4B602), ref: 00E4D145
                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00E4D15B
                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00E4D16E
                          • SetCapture.USER32(?), ref: 00E4D177
                          • ClientToScreen.USER32(?,?), ref: 00E4D1DC
                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00E4D1E9
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E4D203
                          • ReleaseCapture.USER32 ref: 00E4D20E
                          • GetCursorPos.USER32(?), ref: 00E4D248
                          • ScreenToClient.USER32(?,?), ref: 00E4D255
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E4D2B1
                          • SendMessageW.USER32 ref: 00E4D2DF
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E4D31C
                          • SendMessageW.USER32 ref: 00E4D34B
                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00E4D36C
                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00E4D37B
                          • GetCursorPos.USER32(?), ref: 00E4D39B
                          • ScreenToClient.USER32(?,?), ref: 00E4D3A8
                          • GetParent.USER32(?), ref: 00E4D3C8
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00E4D431
                          • SendMessageW.USER32 ref: 00E4D462
                          • ClientToScreen.USER32(?,?), ref: 00E4D4C0
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00E4D4F0
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00E4D51A
                          • SendMessageW.USER32 ref: 00E4D53D
                          • ClientToScreen.USER32(?,?), ref: 00E4D58F
                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00E4D5C3
                            • Part of subcall function 00DC25DB: GetWindowLongW.USER32(?,000000EB), ref: 00DC25EC
                          • GetWindowLongW.USER32(?,000000F0), ref: 00E4D65F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                          • String ID: @GUI_DRAGID$F$pr
                          • API String ID: 3977979337-1436871235
                          • Opcode ID: 97945179a7a051d9bb96cdfbb38a78b00313f6e0932770a7e51a434385c0bb98
                          • Instruction ID: a1b1ae5ddc2275e83ea6110b8ed23fe77b408f9cd0de697da789e67117d102a6
                          • Opcode Fuzzy Hash: 97945179a7a051d9bb96cdfbb38a78b00313f6e0932770a7e51a434385c0bb98
                          • Instruction Fuzzy Hash: 2342FD34609341AFC725CF29E844FAABBE5FF49718F24051DF699A72A0C731D845CBA2
                          APIs
                          • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00E4873F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: %d/%02d/%02d
                          • API String ID: 3850602802-328681919
                          • Opcode ID: cf81dc9f23ae2f42a2ae23a55bf54a6bb130ff377a989fcd34ece17233e112ce
                          • Instruction ID: 5adf82282d8b3954da609c70835b12a89e77b83094f28edc60952e443743d492
                          • Opcode Fuzzy Hash: cf81dc9f23ae2f42a2ae23a55bf54a6bb130ff377a989fcd34ece17233e112ce
                          • Instruction Fuzzy Hash: 68120270500204AFEB259F25ED49FAE7BB8EF49B14F20516AF915FA2E1DF708941CB60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memmove$_memset
                          • String ID: 0w$DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                          • API String ID: 1357608183-3460961967
                          • Opcode ID: ea0269753b9baa3eeff57dec6aaddfed6584659252ab7dd7c0c62d02d6c5bc93
                          • Instruction ID: 290e9796d0142d6e5a4516d2bce2c7739880484adf718c5827cd9904f2933ad4
                          • Opcode Fuzzy Hash: ea0269753b9baa3eeff57dec6aaddfed6584659252ab7dd7c0c62d02d6c5bc93
                          • Instruction Fuzzy Hash: 9D938E71A002199BDB24CFA8D881BEDB7B1FF48714F25916AE955BB380E7709EC1CB50
                          APIs
                          • GetForegroundWindow.USER32(00000000,?), ref: 00DC4A3D
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00DFDA8E
                          • IsIconic.USER32(?), ref: 00DFDA97
                          • ShowWindow.USER32(?,00000009), ref: 00DFDAA4
                          • SetForegroundWindow.USER32(?), ref: 00DFDAAE
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00DFDAC4
                          • GetCurrentThreadId.KERNEL32 ref: 00DFDACB
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00DFDAD7
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DFDAE8
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00DFDAF0
                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00DFDAF8
                          • SetForegroundWindow.USER32(?), ref: 00DFDAFB
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFDB10
                          • keybd_event.USER32(00000012,00000000), ref: 00DFDB1B
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFDB25
                          • keybd_event.USER32(00000012,00000000), ref: 00DFDB2A
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFDB33
                          • keybd_event.USER32(00000012,00000000), ref: 00DFDB38
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DFDB42
                          • keybd_event.USER32(00000012,00000000), ref: 00DFDB47
                          • SetForegroundWindow.USER32(?), ref: 00DFDB4A
                          • AttachThreadInput.USER32(?,?,00000000), ref: 00DFDB71
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                          • String ID: Shell_TrayWnd
                          • API String ID: 4125248594-2988720461
                          • Opcode ID: ccca4398a9d9f8e856582aeb1522fb9e3c53ebcd54809693a9e2b066606677af
                          • Instruction ID: bc02e1ab9ed3616fab7b0471ada40cc3bdc27f7b54ef3f952f0752bde2e98744
                          • Opcode Fuzzy Hash: ccca4398a9d9f8e856582aeb1522fb9e3c53ebcd54809693a9e2b066606677af
                          • Instruction Fuzzy Hash: 31316275A4031CBEEB216F629C49F7F3E6DEB45F50F168065FA04FA1D0C6B09D01AAA0
                          APIs
                            • Part of subcall function 00E18CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E18D0D
                            • Part of subcall function 00E18CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E18D3A
                            • Part of subcall function 00E18CC3: GetLastError.KERNEL32 ref: 00E18D47
                          • _memset.LIBCMT ref: 00E1889B
                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00E188ED
                          • CloseHandle.KERNEL32(?), ref: 00E188FE
                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E18915
                          • GetProcessWindowStation.USER32 ref: 00E1892E
                          • SetProcessWindowStation.USER32(00000000), ref: 00E18938
                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00E18952
                            • Part of subcall function 00E18713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E18851), ref: 00E18728
                            • Part of subcall function 00E18713: CloseHandle.KERNEL32(?,?,00E18851), ref: 00E1873A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                          • String ID: $default$winsta0
                          • API String ID: 2063423040-1027155976
                          • Opcode ID: 4285dbf30e4f24fc5511434a81a8b52c8fd547814b7a475312c6f668703e68af
                          • Instruction ID: 7ed37b9439a9fde8481acaae40666174bca1e8c39f7b80832d9a8be2cc6606e1
                          • Opcode Fuzzy Hash: 4285dbf30e4f24fc5511434a81a8b52c8fd547814b7a475312c6f668703e68af
                          • Instruction Fuzzy Hash: 3F817975900209AFDF11DFA1DE45AEEBBB8FF05709F08516AF820B2161DB318E95DB60
                          APIs
                          • OpenClipboard.USER32(00E4F910), ref: 00E34284
                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00E34292
                          • GetClipboardData.USER32(0000000D), ref: 00E3429A
                          • CloseClipboard.USER32 ref: 00E342A6
                          • GlobalLock.KERNEL32(00000000), ref: 00E342C2
                          • CloseClipboard.USER32 ref: 00E342CC
                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00E342E1
                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00E342EE
                          • GetClipboardData.USER32(00000001), ref: 00E342F6
                          • GlobalLock.KERNEL32(00000000), ref: 00E34303
                          • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00E34337
                          • CloseClipboard.USER32 ref: 00E34447
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                          • String ID:
                          • API String ID: 3222323430-0
                          • Opcode ID: aec910df08d69e30429ebb8a92907e732319ac1503b388da41c7da8a3fd11fc8
                          • Instruction ID: ee6fe760edb2c845940dce2c713d596f6961a4f7bd15c57c78b7a3be2d4124d1
                          • Opcode Fuzzy Hash: aec910df08d69e30429ebb8a92907e732319ac1503b388da41c7da8a3fd11fc8
                          • Instruction Fuzzy Hash: 2C517E75204206AFD311AB61EC99F6F7BA8AF85B00F014529F556F31F1DF70A909CB62
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00E2C9F8
                          • FindClose.KERNEL32(00000000), ref: 00E2CA4C
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E2CA71
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00E2CA88
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00E2CAAF
                          • __swprintf.LIBCMT ref: 00E2CAFB
                          • __swprintf.LIBCMT ref: 00E2CB3E
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • __swprintf.LIBCMT ref: 00E2CB92
                            • Part of subcall function 00DE38D8: __woutput_l.LIBCMT ref: 00DE3931
                          • __swprintf.LIBCMT ref: 00E2CBE0
                            • Part of subcall function 00DE38D8: __flsbuf.LIBCMT ref: 00DE3953
                            • Part of subcall function 00DE38D8: __flsbuf.LIBCMT ref: 00DE396B
                          • __swprintf.LIBCMT ref: 00E2CC2F
                          • __swprintf.LIBCMT ref: 00E2CC7E
                          • __swprintf.LIBCMT ref: 00E2CCCD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                          • API String ID: 3953360268-2428617273
                          • Opcode ID: 7dbb475dc7caf35aaf7c07d3e1fe4d21e1d3229b525a0ec08cc6466348389e51
                          • Instruction ID: 0af82fa80693394a488583af410dcc1bce2dea529e3c0baaa3eff840e4e0a22a
                          • Opcode Fuzzy Hash: 7dbb475dc7caf35aaf7c07d3e1fe4d21e1d3229b525a0ec08cc6466348389e51
                          • Instruction Fuzzy Hash: 4DA13DB1508345ABC700EBA5D895EAFB7ECEF94700F40492DF586D3191EA34EA09CB72
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00E2F221
                          • _wcscmp.LIBCMT ref: 00E2F236
                          • _wcscmp.LIBCMT ref: 00E2F24D
                          • GetFileAttributesW.KERNEL32(?), ref: 00E2F25F
                          • SetFileAttributesW.KERNEL32(?,?), ref: 00E2F279
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E2F291
                          • FindClose.KERNEL32(00000000), ref: 00E2F29C
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00E2F2B8
                          • _wcscmp.LIBCMT ref: 00E2F2DF
                          • _wcscmp.LIBCMT ref: 00E2F2F6
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E2F308
                          • SetCurrentDirectoryW.KERNEL32(00E7A5A0), ref: 00E2F326
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E2F330
                          • FindClose.KERNEL32(00000000), ref: 00E2F33D
                          • FindClose.KERNEL32(00000000), ref: 00E2F34F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                          • String ID: *.*
                          • API String ID: 1803514871-438819550
                          • Opcode ID: 51c2d9902e6d54cb1882cc7c8bb036f01219bee229580b05960f0bd81e9b3862
                          • Instruction ID: 9f14e40c1836ded3268560e5ad7fcac15341392b81b25bb25e9c1159dfaf9629
                          • Opcode Fuzzy Hash: 51c2d9902e6d54cb1882cc7c8bb036f01219bee229580b05960f0bd81e9b3862
                          • Instruction Fuzzy Hash: AD31D4765002296FDB10EFB1EC58AEE77BC9F4A725F145175E804F30A0EB70DA458B64
                          APIs
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E40BDE
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00E4F910,00000000,?,00000000,?,?), ref: 00E40C4C
                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00E40C94
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00E40D1D
                          • RegCloseKey.ADVAPI32(?), ref: 00E4103D
                          • RegCloseKey.ADVAPI32(00000000), ref: 00E4104A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Close$ConnectCreateRegistryValue
                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                          • API String ID: 536824911-966354055
                          • Opcode ID: 20e602143680340ce7e8af67372c74c90bf717ecb15d95cd54b0efedb766fa80
                          • Instruction ID: 53e3b6940252dfea9af3ebb838f1d860d14956422988a908feba7aaa4336e2fe
                          • Opcode Fuzzy Hash: 20e602143680340ce7e8af67372c74c90bf717ecb15d95cd54b0efedb766fa80
                          • Instruction Fuzzy Hash: CF028E352006019FCB14EF25D895E2AB7E5FF88714F05985DF98AAB362CB30EC45CB61
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 00E2F37E
                          • _wcscmp.LIBCMT ref: 00E2F393
                          • _wcscmp.LIBCMT ref: 00E2F3AA
                            • Part of subcall function 00E245C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E245DC
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00E2F3D9
                          • FindClose.KERNEL32(00000000), ref: 00E2F3E4
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00E2F400
                          • _wcscmp.LIBCMT ref: 00E2F427
                          • _wcscmp.LIBCMT ref: 00E2F43E
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E2F450
                          • SetCurrentDirectoryW.KERNEL32(00E7A5A0), ref: 00E2F46E
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E2F478
                          • FindClose.KERNEL32(00000000), ref: 00E2F485
                          • FindClose.KERNEL32(00000000), ref: 00E2F497
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                          • String ID: *.*
                          • API String ID: 1824444939-438819550
                          • Opcode ID: a4b02ccd56dca1dc47ce4a2af8ddb4aee88dc8f404ee2b4c55ce5f85c15f9064
                          • Instruction ID: c957365b65eb5774212fd8171c52d88e414a07cb0453832dc76c7d0991838d3a
                          • Opcode Fuzzy Hash: a4b02ccd56dca1dc47ce4a2af8ddb4aee88dc8f404ee2b4c55ce5f85c15f9064
                          • Instruction Fuzzy Hash: 1131F2765002296FCB10FFA5FC88AEE77BC9F49725F145275E814B30A0DBB0DA45CA64
                          APIs
                            • Part of subcall function 00E1874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E18766
                            • Part of subcall function 00E1874A: GetLastError.KERNEL32(?,00E1822A,?,?,?), ref: 00E18770
                            • Part of subcall function 00E1874A: GetProcessHeap.KERNEL32(00000008,?,?,00E1822A,?,?,?), ref: 00E1877F
                            • Part of subcall function 00E1874A: HeapAlloc.KERNEL32(00000000,?,00E1822A,?,?,?), ref: 00E18786
                            • Part of subcall function 00E1874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E1879D
                            • Part of subcall function 00E187E7: GetProcessHeap.KERNEL32(00000008,00E18240,00000000,00000000,?,00E18240,?), ref: 00E187F3
                            • Part of subcall function 00E187E7: HeapAlloc.KERNEL32(00000000,?,00E18240,?), ref: 00E187FA
                            • Part of subcall function 00E187E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00E18240,?), ref: 00E1880B
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E1825B
                          • _memset.LIBCMT ref: 00E18270
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E1828F
                          • GetLengthSid.ADVAPI32(?), ref: 00E182A0
                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E182DD
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E182F9
                          • GetLengthSid.ADVAPI32(?), ref: 00E18316
                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00E18325
                          • HeapAlloc.KERNEL32(00000000), ref: 00E1832C
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E1834D
                          • CopySid.ADVAPI32(00000000), ref: 00E18354
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E18385
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E183AB
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E183BF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                          • String ID:
                          • API String ID: 3996160137-0
                          • Opcode ID: a3b639d86cb5ad5b3b6c635e867ea8de9ff2f03e80dff94a6684817ed0e3df16
                          • Instruction ID: 1e89bec27988e533b344c33f3287a901de6b843c5585d379a9213c2ae5fa6196
                          • Opcode Fuzzy Hash: a3b639d86cb5ad5b3b6c635e867ea8de9ff2f03e80dff94a6684817ed0e3df16
                          • Instruction Fuzzy Hash: 55616975900209AFDF049FA1DD84AEEBBB9FF04704F04916AE825B6291DB309A45DB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$PJ$UCP)$UTF)$UTF16)
                          • API String ID: 0-1624373025
                          • Opcode ID: da212ef6f6dbaf3fb58b5e9a0806c9711cdba063232acc79377ff7a08f614bc0
                          • Instruction ID: 874c362223d1b2043422f9e4f7f359ff261652e576f9c0f54c33085f25cee0ce
                          • Opcode Fuzzy Hash: da212ef6f6dbaf3fb58b5e9a0806c9711cdba063232acc79377ff7a08f614bc0
                          • Instruction Fuzzy Hash: 44725E75E002199BDB24CF59D8807EEB7B5EF88710F1491ABE959FB380D7709981CBA0
                          APIs
                            • Part of subcall function 00E410A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E40038,?,?), ref: 00E410BC
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E40737
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00E407D6
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00E4086E
                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00E40AAD
                          • RegCloseKey.ADVAPI32(00000000), ref: 00E40ABA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                          • String ID:
                          • API String ID: 1240663315-0
                          • Opcode ID: fa2676b074f35c52741f02d0d0e1744666e430dcbfaf54bc11d84857fe193edd
                          • Instruction ID: c3f640932be3541b1541ae679c1ef1a41583b8355a4ef1c5c0ff3277dbd8c59d
                          • Opcode Fuzzy Hash: fa2676b074f35c52741f02d0d0e1744666e430dcbfaf54bc11d84857fe193edd
                          • Instruction Fuzzy Hash: 2EE17D31204311AFCB14DF25D895E6ABBE4EF89714F04986DF54AEB2A2DB30ED05CB61
                          APIs
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • CoInitialize.OLE32 ref: 00E38718
                          • CoUninitialize.OLE32 ref: 00E38723
                          • CoCreateInstance.OLE32(?,00000000,00000017,00E52BEC,?), ref: 00E38783
                          • IIDFromString.OLE32(?,?), ref: 00E387F6
                          • VariantInit.OLEAUT32(?), ref: 00E38890
                          • VariantClear.OLEAUT32(?), ref: 00E388F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                          • API String ID: 834269672-1287834457
                          • Opcode ID: ecdf1ff42ad614bf4e634a896c2fb1d7c1c0377707b1f0d4e2cb16f1cb2b0a52
                          • Instruction ID: 434c2006c432392e58df4637ebf258f88d8b79247a71eed9a2a8eb26b9ffbd61
                          • Opcode Fuzzy Hash: ecdf1ff42ad614bf4e634a896c2fb1d7c1c0377707b1f0d4e2cb16f1cb2b0a52
                          • Instruction Fuzzy Hash: 4E61BF706083019FD714DF24CA48F6ABBE4EF89714F54581EF985AB291CB70ED48CBA2
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                          • String ID:
                          • API String ID: 1737998785-0
                          • Opcode ID: d39bece8e40c5c93a6301b57ba829d676461697a4cf13ceb37e51a58b3e1d84c
                          • Instruction ID: 6016150ea625f68e97e28b330422539a26c130c36120aced48e6c0971ababe71
                          • Opcode Fuzzy Hash: d39bece8e40c5c93a6301b57ba829d676461697a4cf13ceb37e51a58b3e1d84c
                          • Instruction Fuzzy Hash: 3621B779200611AFDB119F21EC1DF6D7BA8EF05B15F11806AF94AE72B1CB70AC01CB94
                          APIs
                            • Part of subcall function 00DC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DC48A1,?,?,00DC37C0,?), ref: 00DC48CE
                            • Part of subcall function 00E24CD3: GetFileAttributesW.KERNEL32(?,00E23947), ref: 00E24CD4
                          • FindFirstFileW.KERNEL32(?,?), ref: 00E23ADF
                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00E23B87
                          • MoveFileW.KERNEL32(?,?), ref: 00E23B9A
                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00E23BB7
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E23BD9
                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00E23BF5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                          • String ID: \*.*
                          • API String ID: 4002782344-1173974218
                          • Opcode ID: dc53b0ef7543420e3750dd8de099858bc6c07c4a4475ecb1196c7259c6932a6b
                          • Instruction ID: 12e4607b88c7f1c77a13444aa3131e5c7cd2cf8e91d4780935bb73ee09162b70
                          • Opcode Fuzzy Hash: dc53b0ef7543420e3750dd8de099858bc6c07c4a4475ecb1196c7259c6932a6b
                          • Instruction Fuzzy Hash: 17516B3180115EAACF05EBA1EE92EEDB7B9AF14304F2451A9E40277091DF246F09CFB0
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00E2F6AB
                          • Sleep.KERNEL32(0000000A), ref: 00E2F6DB
                          • _wcscmp.LIBCMT ref: 00E2F6EF
                          • _wcscmp.LIBCMT ref: 00E2F70A
                          • FindNextFileW.KERNEL32(?,?), ref: 00E2F7A8
                          • FindClose.KERNEL32(00000000), ref: 00E2F7BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                          • String ID: *.*
                          • API String ID: 713712311-438819550
                          • Opcode ID: 4c404bc6f58c92c2ea23bbb2497278292954d1cff27103dc11b050a408753f13
                          • Instruction ID: 096ea782704f0fcb2447691dc786dd21dae984c6892f772a9630d07dd3dd8eb9
                          • Opcode Fuzzy Hash: 4c404bc6f58c92c2ea23bbb2497278292954d1cff27103dc11b050a408753f13
                          • Instruction Fuzzy Hash: 65414B7591021A9FCB11EF64DC89AEEBBB4FF05314F14457AE815B31A1DB309A44CBA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                          • API String ID: 0-1546025612
                          • Opcode ID: baf168b0d1049eaca349a376d1ea8cfbe06788dc820cc918c2b0b28a8ea5b062
                          • Instruction ID: 8295695351b202e372a36b84afe8d4d09c7eaf0b75a4c9021c6dea168519902e
                          • Opcode Fuzzy Hash: baf168b0d1049eaca349a376d1ea8cfbe06788dc820cc918c2b0b28a8ea5b062
                          • Instruction Fuzzy Hash: A3A25C74E0421A8BDF24CF58C9907ADB7B1BF55314F1481AAD89AA7380D770AEC5DFA0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: 48d26a9f92d7938c5932e9aea9e62683f0f9e0a118ccb66a8a5fda0836e6f56a
                          • Instruction ID: 342aa3625e59cb3a637665a915e00da174b826335854ba1c85bd0e68e286d7f0
                          • Opcode Fuzzy Hash: 48d26a9f92d7938c5932e9aea9e62683f0f9e0a118ccb66a8a5fda0836e6f56a
                          • Instruction Fuzzy Hash: 7F129A70A0060ADFDF14DFA5D981AEEB7F5FF48300F14426AE446A7254EB35AE91CB60
                          APIs
                            • Part of subcall function 00DC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DC48A1,?,?,00DC37C0,?), ref: 00DC48CE
                            • Part of subcall function 00E24CD3: GetFileAttributesW.KERNEL32(?,00E23947), ref: 00E24CD4
                          • FindFirstFileW.KERNEL32(?,?), ref: 00E23DC5
                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E23E15
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E23E26
                          • FindClose.KERNEL32(00000000), ref: 00E23E3D
                          • FindClose.KERNEL32(00000000), ref: 00E23E46
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                          • String ID: \*.*
                          • API String ID: 2649000838-1173974218
                          • Opcode ID: bbed53ef69c5db44e0218a4f944fc89f2ac73b863496a9eb0b92be71ec3221e2
                          • Instruction ID: 995c3492f7d49685945e9bcdf7cdcf1b345dbe2a66e38bd92747eed6beb98dc3
                          • Opcode Fuzzy Hash: bbed53ef69c5db44e0218a4f944fc89f2ac73b863496a9eb0b92be71ec3221e2
                          • Instruction Fuzzy Hash: CA316F31008356AFC201EF64D891DAFB7E8AF95704F445A2DF4D1A3191DB24AA0DCB72
                          APIs
                            • Part of subcall function 00E18CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E18D0D
                            • Part of subcall function 00E18CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E18D3A
                            • Part of subcall function 00E18CC3: GetLastError.KERNEL32 ref: 00E18D47
                          • ExitWindowsEx.USER32(?,00000000), ref: 00E2549B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                          • String ID: $@$SeShutdownPrivilege
                          • API String ID: 2234035333-194228
                          • Opcode ID: c181d304039d06b799563cae0eea2cb000846291ef741ef3e6df3c43799e5bee
                          • Instruction ID: a72e8dad905ee5cc87744d0c80df2959e10e11ea893ef536380f5e2420eef8bd
                          • Opcode Fuzzy Hash: c181d304039d06b799563cae0eea2cb000846291ef741ef3e6df3c43799e5bee
                          • Instruction Fuzzy Hash: 31012832655A312EE7287774BE4ABFAF258AB01757F242021FC27F20D2D6B00C804590
                          APIs
                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00E35134,?,?,00000000,00000001), ref: 00E373BF
                            • Part of subcall function 00E33C94: GetWindowRect.USER32(?,?), ref: 00E33CA7
                          • GetDesktopWindow.USER32 ref: 00E373E9
                          • GetWindowRect.USER32(00000000), ref: 00E373F0
                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00E37422
                            • Part of subcall function 00E254E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E2555E
                          • GetCursorPos.USER32(?), ref: 00E3744E
                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00E374AC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                          • String ID:
                          • API String ID: 4137160315-0
                          • Opcode ID: ef03fc8305efbf299c12f5787331694d6e6caacee957a6c7107e27db5b2e6957
                          • Instruction ID: 933dff173b37555d156c6356a22b588cc491ce2d13fa1c2d12f28064c359ba95
                          • Opcode Fuzzy Hash: ef03fc8305efbf299c12f5787331694d6e6caacee957a6c7107e27db5b2e6957
                          • Instruction Fuzzy Hash: 1031F272508305AFD720DF14D849F9BBBE9FF89304F001919F899A7191CA30E909CB92
                          APIs
                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00E365EF
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E365FE
                          • bind.WSOCK32(00000000,?,00000010), ref: 00E3661A
                          • listen.WSOCK32(00000000,00000005), ref: 00E36629
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E36643
                          • closesocket.WSOCK32(00000000,00000000), ref: 00E36657
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketlistensocket
                          • String ID:
                          • API String ID: 1279440585-0
                          • Opcode ID: dab4309bbdd1b8fd53d62b6423a4efe91a0e94bee56454f192bbb06db015a27a
                          • Instruction ID: 7b1e87719532d7af77c602763f5ac1488677553704aa3e89f2033c9c720c3f12
                          • Opcode Fuzzy Hash: dab4309bbdd1b8fd53d62b6423a4efe91a0e94bee56454f192bbb06db015a27a
                          • Instruction Fuzzy Hash: 94219135200200AFCB10AF65C94AF6EBBF9EF49724F158159E956F72D1CB70AD05CB61
                          APIs
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • _malloc.LIBCMT ref: 00DD33AB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __itow__swprintf_malloc
                          • String ID:
                          • API String ID: 1532639868-0
                          • Opcode ID: e1bd3b1fefe21f3132d34a8ddb0aa43d3203720fe6799392030bad2a6d2fb21b
                          • Instruction ID: c75e4777b1557b7b8568a66e87d7819e551c3287209ae77096cef50357f5d0a4
                          • Opcode Fuzzy Hash: e1bd3b1fefe21f3132d34a8ddb0aa43d3203720fe6799392030bad2a6d2fb21b
                          • Instruction Fuzzy Hash: 03227A716083419FD724DF24C891B6BB7E4EF84704F14492EF89AA7391DB71EA44CBA2
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                            • Part of subcall function 00DE0FF6: std::exception::exception.LIBCMT ref: 00DE102C
                            • Part of subcall function 00DE0FF6: __CxxThrowException@8.LIBCMT ref: 00DE1041
                          • _memmove.LIBCMT ref: 00E1062F
                          • _memmove.LIBCMT ref: 00E10744
                          • _memmove.LIBCMT ref: 00E107EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memmove$Exception@8Throw_mallocstd::exception::exception
                          • String ID:
                          • API String ID: 3956474712-0
                          • Opcode ID: ca0d4a0ac8cc1ab8c424094a80820afa1af77e2da4345c0ec446dbb7ae377097
                          • Instruction ID: 1475892d1e9cace6df30879fdc39139557440685afc59c1528be3fe1389e54a8
                          • Opcode Fuzzy Hash: ca0d4a0ac8cc1ab8c424094a80820afa1af77e2da4345c0ec446dbb7ae377097
                          • Instruction Fuzzy Hash: D7029170A00205DFDF14DF65D981AAE7BB5FF44300F14806AE80AEB395EB71DA94DBA1
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 00DC19FA
                          • GetSysColor.USER32(0000000F), ref: 00DC1A4E
                          • SetBkColor.GDI32(?,00000000), ref: 00DC1A61
                            • Part of subcall function 00DC1290: DefDlgProcW.USER32(?,00000020,?), ref: 00DC12D8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ColorProc$LongWindow
                          • String ID:
                          • API String ID: 3744519093-0
                          • Opcode ID: 84bceb72f75809626221d66dd9a3689fbcbda7843cec302f54e71af4a60d6e64
                          • Instruction ID: 09f6e51363d121f5f4b3cc68c4bc42cc2fa164998645db7a7a2c433be81da7ca
                          • Opcode Fuzzy Hash: 84bceb72f75809626221d66dd9a3689fbcbda7843cec302f54e71af4a60d6e64
                          • Instruction Fuzzy Hash: 32A1777810656BBEE628AB299C49F7F359DDB43351F29411EF543E7193CE20CC0296B2
                          APIs
                            • Part of subcall function 00E380A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E380CB
                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00E36AB1
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E36ADA
                          • bind.WSOCK32(00000000,?,00000010), ref: 00E36B13
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E36B20
                          • closesocket.WSOCK32(00000000,00000000), ref: 00E36B34
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                          • String ID:
                          • API String ID: 99427753-0
                          • Opcode ID: 57ec3bb53cc8c9b634748d8ec94c8afecaa2517eeaf8048e291b94021fa3275b
                          • Instruction ID: 99d38e8c5e52b31e0e45e1a9f2793a888e76d7129b7550aa56714b350f26960d
                          • Opcode Fuzzy Hash: 57ec3bb53cc8c9b634748d8ec94c8afecaa2517eeaf8048e291b94021fa3275b
                          • Instruction Fuzzy Hash: A941B575700611AFEB10AF24DC9AF6EBBA9DB45B10F04805CF91AAB2D2CA705D018BB1
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                          • String ID:
                          • API String ID: 292994002-0
                          • Opcode ID: 4b9029a288644768ae024b62af67ccbe88f53f492623466c570e2b23b34f30aa
                          • Instruction ID: 90e1ecd558988513d1b0ae1e431f92f49c80c056d333ce3a2e5690b39b6c1960
                          • Opcode Fuzzy Hash: 4b9029a288644768ae024b62af67ccbe88f53f492623466c570e2b23b34f30aa
                          • Instruction Fuzzy Hash: 7711C432700911AFE7212F27EC44B6FB798EF45721B425469F806F7252CB74DD02CAA5
                          APIs
                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00E412C1), ref: 00E41080
                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00E41092
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: RegDeleteKeyExW$advapi32.dll
                          • API String ID: 2574300362-4033151799
                          • Opcode ID: 17aa9ede0be1c2329b70aefe26e128b805cf4ff0f9b0c567ab252c625f1ff939
                          • Instruction ID: 75e96c5497de0df606f18a87a70f09f8901574504fe86489bc267b40d4b04391
                          • Opcode Fuzzy Hash: 17aa9ede0be1c2329b70aefe26e128b805cf4ff0f9b0c567ab252c625f1ff939
                          • Instruction Fuzzy Hash: F4D0C230411352CFC7204F31E818A1672E4AF05751F01DC39E489F6260DB70C4C0C600
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00E3F151
                          • Process32FirstW.KERNEL32(00000000,?), ref: 00E3F15F
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • Process32NextW.KERNEL32(00000000,?), ref: 00E3F21F
                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00E3F22E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                          • String ID:
                          • API String ID: 2576544623-0
                          • Opcode ID: 8b7f3aa7f0f6422f58e863a6c0cba9db7725e406b3ab53eabe49d662a6168293
                          • Instruction ID: 4e598bc541cde88857f9a190042f23fcd63d37ea309bf329d68854a3468f3f23
                          • Opcode Fuzzy Hash: 8b7f3aa7f0f6422f58e863a6c0cba9db7725e406b3ab53eabe49d662a6168293
                          • Instruction Fuzzy Hash: 67516B71504701AFD310EF21DC85F6BBBE8EF94710F10482DF495972A2EB70A909CBA2
                          APIs
                          • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00E21176
                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E21192
                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00E211F1
                          • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00E21243
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: 03430e5f3bc3c96a4fe4d4ca1bee5be7ee8a4080482e99b6c394f2cfb889c377
                          • Instruction ID: 5e561835b3c2dd913837bc2fbdbf135336eb826679e413062241fb51c632360d
                          • Opcode Fuzzy Hash: 03430e5f3bc3c96a4fe4d4ca1bee5be7ee8a4080482e99b6c394f2cfb889c377
                          • Instruction Fuzzy Hash: 97314830A413689EEF208E65AC057FE7BAAAB69314F08639AF590B21E1C3344B659751
                          APIs
                          • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00E240D1
                          • _memset.LIBCMT ref: 00E240F2
                          • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00E24144
                          • CloseHandle.KERNEL32(00000000), ref: 00E2414D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CloseControlCreateDeviceFileHandle_memset
                          • String ID:
                          • API String ID: 1157408455-0
                          • Opcode ID: c91b4676f4c68d616b2a0ced2d1acb3a92e246151f43c4d02a5dcab47f00b85a
                          • Instruction ID: 1e4a77b77c96eda9e98bdaca6e036ba9e8cc3e5d533125a728e75e5a456d4b9e
                          • Opcode Fuzzy Hash: c91b4676f4c68d616b2a0ced2d1acb3a92e246151f43c4d02a5dcab47f00b85a
                          • Instruction Fuzzy Hash: DE11EB759012387AD7305BA5AC4DFABBB7CEF45B60F104196F908E7180D6744E848BA4
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00E1EB19
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _malloclstrlen
                          • String ID: ($|
                          • API String ID: 3912106968-1631851259
                          • Opcode ID: cfcf5a82895eb2ab7335e254016f99f2472d097b90ba8ab50a181cf4dd081114
                          • Instruction ID: dbf5fc87fca90be5b2937333d78bc618edafc37d566f151cc22cc25160811d7c
                          • Opcode Fuzzy Hash: cfcf5a82895eb2ab7335e254016f99f2472d097b90ba8ab50a181cf4dd081114
                          • Instruction Fuzzy Hash: 37321575A046059FDB28CF19C481AAAF7F1FF48310B15D56EE89AEB3A1D770E981CB40
                          APIs
                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00E326D5
                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00E3270C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Internet$AvailableDataFileQueryRead
                          • String ID:
                          • API String ID: 599397726-0
                          • Opcode ID: 609fdbd27fb2109b729f27a12f052b35283d1a5ed36bb69de97046702be1b94b
                          • Instruction ID: 62376460f4835ae4ca84a4caeb0b9247c3ba02efe109773a0d44e7196141b95f
                          • Opcode Fuzzy Hash: 609fdbd27fb2109b729f27a12f052b35283d1a5ed36bb69de97046702be1b94b
                          • Instruction Fuzzy Hash: 7C41D475900209BFEB209A55DC8AEBBBBBCEF40718F10506EF785B6140EA719E41D664
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00E2B5AE
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00E2B608
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00E2B655
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID:
                          • API String ID: 1682464887-0
                          • Opcode ID: e9b37739a5a49076fbd217102f5ee0d80ba6d8a8918ba7ed24edb03bc23c5145
                          • Instruction ID: 497ea893d44e1ad7b2826d8ece9680823de8576ab813f8fb3b341ecc0699934a
                          • Opcode Fuzzy Hash: e9b37739a5a49076fbd217102f5ee0d80ba6d8a8918ba7ed24edb03bc23c5145
                          • Instruction Fuzzy Hash: 25215135A00518EFCB00EF65D884EADBBB8FF49310F1480A9E905EB351DB31A956CB61
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                            • Part of subcall function 00DE0FF6: std::exception::exception.LIBCMT ref: 00DE102C
                            • Part of subcall function 00DE0FF6: __CxxThrowException@8.LIBCMT ref: 00DE1041
                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E18D0D
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E18D3A
                          • GetLastError.KERNEL32 ref: 00E18D47
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValue_mallocstd::exception::exception
                          • String ID:
                          • API String ID: 871035410-0
                          • Opcode ID: c07b833bc018b3888109b94b1c6c44e5de49345834e44e79696c079362048194
                          • Instruction ID: 7d1b7072a2975384910b421e60202ab60f6d9b79b0b54a83c9c6387516a4e8dd
                          • Opcode Fuzzy Hash: c07b833bc018b3888109b94b1c6c44e5de49345834e44e79696c079362048194
                          • Instruction Fuzzy Hash: 43118FB1514309AFD728AF55ED85DABB7BDEB44710B20852EF456A3241EF70AC818A70
                          APIs
                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00E24C2C
                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00E24C43
                          • FreeSid.ADVAPI32(?), ref: 00E24C53
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AllocateCheckFreeInitializeMembershipToken
                          • String ID:
                          • API String ID: 3429775523-0
                          • Opcode ID: 9ec13bb81f4d5dfa655bd07450a5139c98176029b48f4b0e36ba5d39374a0700
                          • Instruction ID: 2518082c9f7bc8b913df2e9abb100a192f0f2699d552f23c5b3636df9cee8164
                          • Opcode Fuzzy Hash: 9ec13bb81f4d5dfa655bd07450a5139c98176029b48f4b0e36ba5d39374a0700
                          • Instruction Fuzzy Hash: 65F04F7591130CBFDF04DFF4DC89AAEB7BCEF08601F004469E501E2181D6705A048B50
                          APIs
                          • __time64.LIBCMT ref: 00E28B25
                            • Part of subcall function 00DE543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00E291F8,00000000,?,?,?,?,00E293A9,00000000,?), ref: 00DE5443
                            • Part of subcall function 00DE543A: __aulldiv.LIBCMT ref: 00DE5463
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Time$FileSystem__aulldiv__time64
                          • String ID: 0u
                          • API String ID: 2893107130-1339160046
                          • Opcode ID: 37325b1baad02343805980a41979d427cfaccd48e2c865182562e731236eba45
                          • Instruction ID: c88598cbae52aa1203a782038e8dbf5b1a22b5528638b079052545c74609dc83
                          • Opcode Fuzzy Hash: 37325b1baad02343805980a41979d427cfaccd48e2c865182562e731236eba45
                          • Instruction Fuzzy Hash: C321E4726355108FC329CF29E841A52B3E1EBA5311B289E6CD0F9DB2D0CA34B905CB94
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 606f34d08c611f14f28710fdf56eb275ef594d4340ea66d9c2797b04e34f173f
                          • Instruction ID: 24d2fe0847a18565bf58087d2532194d164ff5e8e2b9cc865975855bee75ed68
                          • Opcode Fuzzy Hash: 606f34d08c611f14f28710fdf56eb275ef594d4340ea66d9c2797b04e34f173f
                          • Instruction Fuzzy Hash: 5C228CB4A00256CFDB24DF54C481BAAF7B4FF04300F18856DE896AB391D775E985CBA1
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00E2C966
                          • FindClose.KERNEL32(00000000), ref: 00E2C996
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: af485e27ff84cd4ef7714ed41c931f83dc130ac8c141f23f1250b1bf510ff17a
                          • Instruction ID: a6007936e7e1ee49cad023815b31365de2b8ba9619a96b00f14893be15f78142
                          • Opcode Fuzzy Hash: af485e27ff84cd4ef7714ed41c931f83dc130ac8c141f23f1250b1bf510ff17a
                          • Instruction Fuzzy Hash: CE11A1366006109FD710EF29D859E2AF7E9FF85724F00851EF9AAD72A1DB70AC05CB91
                          APIs
                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00E21812
                          • keybd_event.USER32(?,75A4C0D0,?,00000000), ref: 00E21825
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: InputSendkeybd_event
                          • String ID:
                          • API String ID: 3536248340-0
                          • Opcode ID: af795963faffcf5c49b18c74f0f4207be38e34ee5438cb26412603278397ff73
                          • Instruction ID: 2ba08301e4d4f296a625c6abff86ccc64d8639d7b9821f387a99435006867c1d
                          • Opcode Fuzzy Hash: af795963faffcf5c49b18c74f0f4207be38e34ee5438cb26412603278397ff73
                          • Instruction Fuzzy Hash: 41F0497590024DAFDB04DF95C805BFE7BB4EF18315F00805AF915E6291C3798A15DF94
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00E3977D,?,00E4FB84,?), ref: 00E2A302
                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00E3977D,?,00E4FB84,?), ref: 00E2A314
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorFormatLastMessage
                          • String ID:
                          • API String ID: 3479602957-0
                          • Opcode ID: 1eb798d680c47b9c1e394383f8c41cb05f5daa134b398873bf44bc4e4bdb623f
                          • Instruction ID: 12bfcf9603420f8f6ef9084d62ae19c8308df5f04a34ef3fc353fab3797fb1b6
                          • Opcode Fuzzy Hash: 1eb798d680c47b9c1e394383f8c41cb05f5daa134b398873bf44bc4e4bdb623f
                          • Instruction Fuzzy Hash: 28F0823554422DEBDB109FA4DC48FEA776DFF09761F008269F908E7191D6709944CBB1
                          APIs
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E18851), ref: 00E18728
                          • CloseHandle.KERNEL32(?,?,00E18851), ref: 00E1873A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AdjustCloseHandlePrivilegesToken
                          • String ID:
                          • API String ID: 81990902-0
                          • Opcode ID: 1bd68e130924a5bb884e36d2d706ad805826cae22c17421f690f84eab194645a
                          • Instruction ID: 892292392425ba06b587a85ffec66cb5629e6abbcf5d3f71f8d0c6c9b9775159
                          • Opcode Fuzzy Hash: 1bd68e130924a5bb884e36d2d706ad805826cae22c17421f690f84eab194645a
                          • Instruction Fuzzy Hash: 6CE0463A000640EEE7212B22EC09D73BBE9EB00750B608829F89680870CB32AC91DB20
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00DE8F97,?,?,?,00000001), ref: 00DEA39A
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00DEA3A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 3bbe166617baf5e3fe0c366f6e3c61e201cd13cd73dd7d802de8f423a6ca18b0
                          • Instruction ID: 65806b81f0b8b01e295ab784d81dfc6c87fd94c6873506a1f77404f8863261f3
                          • Opcode Fuzzy Hash: 3bbe166617baf5e3fe0c366f6e3c61e201cd13cd73dd7d802de8f423a6ca18b0
                          • Instruction Fuzzy Hash: 88B09235054208AFCA002F92EC09F883F68EB46EA2F404020F60D94060CB6254568A91
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 373ae72873a9dd5428a0c6b4f5243a1a3b35d0822a45f538a27ff4165b093422
                          • Instruction ID: e0c8aaf690deda72bda093ca335e693583bfff6765bfa444a4c89ce2764bbc70
                          • Opcode Fuzzy Hash: 373ae72873a9dd5428a0c6b4f5243a1a3b35d0822a45f538a27ff4165b093422
                          • Instruction Fuzzy Hash: 52325722D29F414DD767A636D872335A289AFB73C5F24DB37F819B59A6EB28C4C30110
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 36febdfefdbda6821b45435add5053c7f0b2269855afba790e737194d6a0e838
                          • Instruction ID: ca6017961c2b3f989c9aea4fe2925e4206bed7dcbcee6852c34f0b94a50b0e54
                          • Opcode Fuzzy Hash: 36febdfefdbda6821b45435add5053c7f0b2269855afba790e737194d6a0e838
                          • Instruction Fuzzy Hash: 6FB1F520D2AF414DD72396398831336BB5CAFB72DAF56DB2BFC2674D22EB2185874141
                          APIs
                          • BlockInput.USER32(00000001), ref: 00E34218
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BlockInput
                          • String ID:
                          • API String ID: 3456056419-0
                          • Opcode ID: 24fad1a2c06ec9b22fce0e47f115f41559d37df39458f5c6fce6205f35669967
                          • Instruction ID: 5a4b1fa99b180ab4992f5c1249fb93008d507c187328f25be013fdfeb549361f
                          • Opcode Fuzzy Hash: 24fad1a2c06ec9b22fce0e47f115f41559d37df39458f5c6fce6205f35669967
                          • Instruction Fuzzy Hash: 30E012752401159FC7109F5AD448E9AFBD8EF54760F018019FC49E7261DA70A841CBA0
                          APIs
                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00E188D1), ref: 00E18CB3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: LogonUser
                          • String ID:
                          • API String ID: 1244722697-0
                          • Opcode ID: d54a45095211f01246239e51083258535a9a684fe07bb8e1ea2d65c482947880
                          • Instruction ID: 65c4e923bce55535c964aabd4d84bdb8fa18a8207e397c6e48cbdcd72867d63f
                          • Opcode Fuzzy Hash: d54a45095211f01246239e51083258535a9a684fe07bb8e1ea2d65c482947880
                          • Instruction Fuzzy Hash: F1D05E3226050EAFEF018EA4DC01EAF3B69EB04B01F408111FE15D50A1C775D835AB60
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00DEA36A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 858ac8bafb14a7aadebf86be8e703b1b147cc7413de6ca0df57505146ca65f91
                          • Instruction ID: d11799791f4e730da05a94556677a59095dda3f7d17438f927cb2d93164397e5
                          • Opcode Fuzzy Hash: 858ac8bafb14a7aadebf86be8e703b1b147cc7413de6ca0df57505146ca65f91
                          • Instruction Fuzzy Hash: 01A0113000020CAB8A002F82EC08888BFACEB02AA0B008020F80C800228B32A8228A80
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 78ffda75dab684ce9a02f572e14f235841d6b9c768d687c1e51fb2e332555097
                          • Instruction ID: 157c2d9b1ae6d068f5afc7b2f025192a31f9e39d5c835b62f62e14e62a67e390
                          • Opcode Fuzzy Hash: 78ffda75dab684ce9a02f572e14f235841d6b9c768d687c1e51fb2e332555097
                          • Instruction Fuzzy Hash: C3223731511616CBDF3A8B2DC4846BDB7A1EB81344F29846BD896AB391DB30DDC1EB70
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction ID: 1f31bcf0204e6c0ef82fc1ff529c55a1a158e18398f280641d17027847aa4286
                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction Fuzzy Hash: 4E41E571D1051CEBCF48CFADC890AEEBBF1AF88201F548299D516AB345D730AB01DB50
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction ID: 89c33870d9cf44902d372014f3f752ab9ce8b8ce26d3bfd6085c0b21c1fb89a3
                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction Fuzzy Hash: 7E019278A04109EFCB44DF98D5909AEF7F5FB58314F208599E909A7301D734AE41DB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction ID: a0ae9466f4a572092bc1e11d9deb8faf995b515b772bb61f4c3cdc1127e936c5
                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction Fuzzy Hash: 13018078A00209EFCB48DF98D5909AEF7B5FB58314F208599E819A7301D734EE41DB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273361686.0000000000D20000.00000040.00001000.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_d20000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 00E37B70
                          • DeleteObject.GDI32(00000000), ref: 00E37B82
                          • DestroyWindow.USER32 ref: 00E37B90
                          • GetDesktopWindow.USER32 ref: 00E37BAA
                          • GetWindowRect.USER32(00000000), ref: 00E37BB1
                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00E37CF2
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00E37D02
                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37D4A
                          • GetClientRect.USER32(00000000,?), ref: 00E37D56
                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00E37D90
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37DB2
                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37DC5
                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37DD0
                          • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37DD9
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37DE8
                          • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37DF1
                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37DF8
                          • GlobalFree.KERNEL32(00000000), ref: 00E37E03
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37E15
                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00E52CAC,00000000), ref: 00E37E2B
                          • GlobalFree.KERNEL32(00000000), ref: 00E37E3B
                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00E37E61
                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00E37E80
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E37EA2
                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00E3808F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                          • String ID: $AutoIt v3$DISPLAY$static
                          • API String ID: 2211948467-2373415609
                          • Opcode ID: 7dc107eb1e566787d01947073520d5fecde0f3e86f9368eac397015cb72b1806
                          • Instruction ID: 35b807754e2c4d52ec19cda14ceb35d78df48ad7722de4a6c47ac5147b70b7f9
                          • Opcode Fuzzy Hash: 7dc107eb1e566787d01947073520d5fecde0f3e86f9368eac397015cb72b1806
                          • Instruction Fuzzy Hash: AE029C75A00205EFDB14DFA5CD89EAEBBB9FB49714F108158F905BB2A1CB70AD05CB60
                          APIs
                          • CharUpperBuffW.USER32(?,?,00E4F910), ref: 00E438AF
                          • IsWindowVisible.USER32(?), ref: 00E438D3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharUpperVisibleWindow
                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                          • API String ID: 4105515805-45149045
                          • Opcode ID: e49872614786c16c8e209fefdeb0aac173182d734e10b2ab0c0c3e73c289e48c
                          • Instruction ID: cb8699b13931fca7242574550fb016d41e0c93589da6dee4eadef2e85d34cd71
                          • Opcode Fuzzy Hash: e49872614786c16c8e209fefdeb0aac173182d734e10b2ab0c0c3e73c289e48c
                          • Instruction Fuzzy Hash: 39D1A330204205DBCB14EF21D855BAABBA1EF94354F11945CB8867B6A3DB70EE4ACB61
                          APIs
                          • SetTextColor.GDI32(?,00000000), ref: 00E4A89F
                          • GetSysColorBrush.USER32(0000000F), ref: 00E4A8D0
                          • GetSysColor.USER32(0000000F), ref: 00E4A8DC
                          • SetBkColor.GDI32(?,000000FF), ref: 00E4A8F6
                          • SelectObject.GDI32(?,?), ref: 00E4A905
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00E4A930
                          • GetSysColor.USER32(00000010), ref: 00E4A938
                          • CreateSolidBrush.GDI32(00000000), ref: 00E4A93F
                          • FrameRect.USER32(?,?,00000000), ref: 00E4A94E
                          • DeleteObject.GDI32(00000000), ref: 00E4A955
                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00E4A9A0
                          • FillRect.USER32(?,?,?), ref: 00E4A9D2
                          • GetWindowLongW.USER32(?,000000F0), ref: 00E4A9FD
                            • Part of subcall function 00E4AB60: GetSysColor.USER32(00000012), ref: 00E4AB99
                            • Part of subcall function 00E4AB60: SetTextColor.GDI32(?,?), ref: 00E4AB9D
                            • Part of subcall function 00E4AB60: GetSysColorBrush.USER32(0000000F), ref: 00E4ABB3
                            • Part of subcall function 00E4AB60: GetSysColor.USER32(0000000F), ref: 00E4ABBE
                            • Part of subcall function 00E4AB60: GetSysColor.USER32(00000011), ref: 00E4ABDB
                            • Part of subcall function 00E4AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E4ABE9
                            • Part of subcall function 00E4AB60: SelectObject.GDI32(?,00000000), ref: 00E4ABFA
                            • Part of subcall function 00E4AB60: SetBkColor.GDI32(?,00000000), ref: 00E4AC03
                            • Part of subcall function 00E4AB60: SelectObject.GDI32(?,?), ref: 00E4AC10
                            • Part of subcall function 00E4AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00E4AC2F
                            • Part of subcall function 00E4AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E4AC46
                            • Part of subcall function 00E4AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00E4AC5B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                          • String ID:
                          • API String ID: 4124339563-0
                          • Opcode ID: bf127e34fd4e0b8db9affb6616e42120efa6a665bbbf65159dc8eb74e19b29f4
                          • Instruction ID: f0a16fcf5c3db14a19b1433f90e68d83f86bfc8d447d4db715ed236b47c6ef3f
                          • Opcode Fuzzy Hash: bf127e34fd4e0b8db9affb6616e42120efa6a665bbbf65159dc8eb74e19b29f4
                          • Instruction Fuzzy Hash: 27A1CE76008301EFD7109F65EC08A6B7BA9FF89731F141A29F962B61E1C734D84ACB52
                          APIs
                          • DestroyWindow.USER32(?,?,?), ref: 00DC2CA2
                          • DeleteObject.GDI32(00000000), ref: 00DC2CE8
                          • DeleteObject.GDI32(00000000), ref: 00DC2CF3
                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00DC2CFE
                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00DC2D09
                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00DFC68B
                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00DFC6C4
                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00DFCAED
                            • Part of subcall function 00DC1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DC2036,?,00000000,?,?,?,?,00DC16CB,00000000,?), ref: 00DC1B9A
                          • SendMessageW.USER32(?,00001053), ref: 00DFCB2A
                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00DFCB41
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00DFCB57
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00DFCB62
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                          • String ID: 0
                          • API String ID: 464785882-4108050209
                          • Opcode ID: d322478d4fc441e4c26491f267f7510df1b3dc03d8393cb6d424db32c600bce1
                          • Instruction ID: 3107e1429fa6640df9a9f7e47842756014dd9939dafb61c6cf20fbab4c266a82
                          • Opcode Fuzzy Hash: d322478d4fc441e4c26491f267f7510df1b3dc03d8393cb6d424db32c600bce1
                          • Instruction Fuzzy Hash: 4012A03451420AEFDB14DF24CA84BB9B7E1FF45300F199569EA85DB262C731EC66CBA0
                          APIs
                          • DestroyWindow.USER32(00000000), ref: 00E377F1
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00E378B0
                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00E378EE
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00E37900
                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00E37946
                          • GetClientRect.USER32(00000000,?), ref: 00E37952
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00E37996
                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00E379A5
                          • GetStockObject.GDI32(00000011), ref: 00E379B5
                          • SelectObject.GDI32(00000000,00000000), ref: 00E379B9
                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00E379C9
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E379D2
                          • DeleteDC.GDI32(00000000), ref: 00E379DB
                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00E37A07
                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00E37A1E
                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00E37A59
                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00E37A6D
                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00E37A7E
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00E37AAE
                          • GetStockObject.GDI32(00000011), ref: 00E37AB9
                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00E37AC4
                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00E37ACE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                          • API String ID: 2910397461-517079104
                          • Opcode ID: fd69ed18244d29331ae0f8420e7078492e1f3901441738bf6603b9d100f9c03c
                          • Instruction ID: 4e0cf113a89b5c580e9b586a1a0cb599badb066897dcfa64e5dd99d526c46cdf
                          • Opcode Fuzzy Hash: fd69ed18244d29331ae0f8420e7078492e1f3901441738bf6603b9d100f9c03c
                          • Instruction Fuzzy Hash: 61A181B1A40215BFEB14DBA5DC4AFAEBBB9EB49710F004154FA14B72E0C774AD05CB60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __wcsnicmp$_malloc
                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                          • API String ID: 2350238924-86951937
                          • Opcode ID: 462630905eba4706ce1616e8f2327b3a88aaa4fdca951ce05166eaab119cc781
                          • Instruction ID: f395bf6f64f411be6ac04aaa284e0dbd4877d7c657ba6475198e2ce5079e9d84
                          • Opcode Fuzzy Hash: 462630905eba4706ce1616e8f2327b3a88aaa4fdca951ce05166eaab119cc781
                          • Instruction Fuzzy Hash: FF81EA70640356AACB20BF61DC93FBE7759EF15700F088029FE45AB196EB70DA85C671
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000103,?,?,?), ref: 00E49D41
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00E49DFA
                          • SendMessageW.USER32(?,00001102,00000002,?), ref: 00E49E16
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: 0
                          • API String ID: 2326795674-4108050209
                          • Opcode ID: 6b2c39f9bb87b32a229d22264cb31d775d615c8bf64d52896a415d34041d7ba6
                          • Instruction ID: deb95b4edb6e040b7ec984d40bd833844eef274eb1b157352a6fdf7ed364bc2f
                          • Opcode Fuzzy Hash: 6b2c39f9bb87b32a229d22264cb31d775d615c8bf64d52896a415d34041d7ba6
                          • Instruction Fuzzy Hash: D8021170105301AFD715CF24E848BABBBE4FF89328F08552DF999B62A1C775D845CB92
                          APIs
                          • GetSysColor.USER32(00000012), ref: 00E4AB99
                          • SetTextColor.GDI32(?,?), ref: 00E4AB9D
                          • GetSysColorBrush.USER32(0000000F), ref: 00E4ABB3
                          • GetSysColor.USER32(0000000F), ref: 00E4ABBE
                          • CreateSolidBrush.GDI32(?), ref: 00E4ABC3
                          • GetSysColor.USER32(00000011), ref: 00E4ABDB
                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00E4ABE9
                          • SelectObject.GDI32(?,00000000), ref: 00E4ABFA
                          • SetBkColor.GDI32(?,00000000), ref: 00E4AC03
                          • SelectObject.GDI32(?,?), ref: 00E4AC10
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00E4AC2F
                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00E4AC46
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E4AC5B
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00E4ACA7
                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00E4ACCE
                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00E4ACEC
                          • DrawFocusRect.USER32(?,?), ref: 00E4ACF7
                          • GetSysColor.USER32(00000011), ref: 00E4AD05
                          • SetTextColor.GDI32(?,00000000), ref: 00E4AD0D
                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00E4AD21
                          • SelectObject.GDI32(?,00E4A869), ref: 00E4AD38
                          • DeleteObject.GDI32(?), ref: 00E4AD43
                          • SelectObject.GDI32(?,?), ref: 00E4AD49
                          • DeleteObject.GDI32(?), ref: 00E4AD4E
                          • SetTextColor.GDI32(?,?), ref: 00E4AD54
                          • SetBkColor.GDI32(?,?), ref: 00E4AD5E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                          • String ID:
                          • API String ID: 1996641542-0
                          • Opcode ID: f448a7d3a671fe4d273913b82dadd219dad726d19e38718ea414a3f1c9ab45dc
                          • Instruction ID: 9015afd13046f6ddbe28865694a304180e2270aada4b41ce96807ae3064d0302
                          • Opcode Fuzzy Hash: f448a7d3a671fe4d273913b82dadd219dad726d19e38718ea414a3f1c9ab45dc
                          • Instruction Fuzzy Hash: 59619B75900208EFDF109FA9EC48EAEBBB9EB09720F158125F911BB2A1D6759D41CF90
                          APIs
                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00E48D34
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E48D45
                          • CharNextW.USER32(0000014E), ref: 00E48D74
                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00E48DB5
                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00E48DCB
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E48DDC
                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00E48DF9
                          • SetWindowTextW.USER32(?,0000014E), ref: 00E48E45
                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00E48E5B
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E48E8C
                          • _memset.LIBCMT ref: 00E48EB1
                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00E48EFA
                          • _memset.LIBCMT ref: 00E48F59
                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00E48F83
                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00E48FDB
                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00E49088
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E490AA
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E490F4
                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E49121
                          • DrawMenuBar.USER32(?), ref: 00E49130
                          • SetWindowTextW.USER32(?,0000014E), ref: 00E49158
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                          • String ID: 0
                          • API String ID: 1073566785-4108050209
                          • Opcode ID: edb28d30c54c8d6b6e3e614b639e0d41cfd004df63cdc02b0ad586650ca2cea5
                          • Instruction ID: 3c6e252e5496fc9b7152a0defb5e947b7eb0fdd758b193e4bfa8608a17a36c03
                          • Opcode Fuzzy Hash: edb28d30c54c8d6b6e3e614b639e0d41cfd004df63cdc02b0ad586650ca2cea5
                          • Instruction Fuzzy Hash: F3E1B174901209AFDF209F61DC88EEF7BB9EF05714F009196F919BA291DB708A85DF60
                          APIs
                          • GetCursorPos.USER32(?), ref: 00E44C51
                          • GetDesktopWindow.USER32 ref: 00E44C66
                          • GetWindowRect.USER32(00000000), ref: 00E44C6D
                          • GetWindowLongW.USER32(?,000000F0), ref: 00E44CCF
                          • DestroyWindow.USER32(?), ref: 00E44CFB
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00E44D24
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E44D42
                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00E44D68
                          • SendMessageW.USER32(?,00000421,?,?), ref: 00E44D7D
                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00E44D90
                          • IsWindowVisible.USER32(?), ref: 00E44DB0
                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00E44DCB
                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00E44DDF
                          • GetWindowRect.USER32(?,?), ref: 00E44DF7
                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00E44E1D
                          • GetMonitorInfoW.USER32(00000000,?), ref: 00E44E37
                          • CopyRect.USER32(?,?), ref: 00E44E4E
                          • SendMessageW.USER32(?,00000412,00000000), ref: 00E44EB9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                          • String ID: ($0$tooltips_class32
                          • API String ID: 698492251-4156429822
                          • Opcode ID: 470428090162b953d2dddf38b41e47d4469ad03c2a1280f795179f32cebf2803
                          • Instruction ID: 14b2a705adf7ceb9debad6ca6f8724a92ce87322b0576c186a811d2d6049e3ed
                          • Opcode Fuzzy Hash: 470428090162b953d2dddf38b41e47d4469ad03c2a1280f795179f32cebf2803
                          • Instruction Fuzzy Hash: 7EB18BB1604341AFDB04DF25D889B5ABBE4FF84714F00891CF599AB2A1DB70EC05CBA1
                          APIs
                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00E246E8
                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00E2470E
                          • _wcscpy.LIBCMT ref: 00E2473C
                          • _wcscmp.LIBCMT ref: 00E24747
                          • _wcscat.LIBCMT ref: 00E2475D
                          • _wcsstr.LIBCMT ref: 00E24768
                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00E24784
                          • _wcscat.LIBCMT ref: 00E247CD
                          • _wcscat.LIBCMT ref: 00E247D4
                          • _wcsncpy.LIBCMT ref: 00E247FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                          • API String ID: 699586101-1459072770
                          • Opcode ID: 051ac22d526a0fcd0d5adb99b0e339ef50900407a28ab56adaca6c8d03f81d3d
                          • Instruction ID: c6e88d196a4dbaaf0536f086388462ce850ea05493fe741af2b39e561413dbe3
                          • Opcode Fuzzy Hash: 051ac22d526a0fcd0d5adb99b0e339ef50900407a28ab56adaca6c8d03f81d3d
                          • Instruction Fuzzy Hash: 8A414776A003907BEB14BB729C47EBF77ACDF42710F04016AF905F6182EB74AA0196B5
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DC28BC
                          • GetSystemMetrics.USER32(00000007), ref: 00DC28C4
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00DC28EF
                          • GetSystemMetrics.USER32(00000008), ref: 00DC28F7
                          • GetSystemMetrics.USER32(00000004), ref: 00DC291C
                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00DC2939
                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00DC2949
                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00DC297C
                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00DC2990
                          • GetClientRect.USER32(00000000,000000FF), ref: 00DC29AE
                          • GetStockObject.GDI32(00000011), ref: 00DC29CA
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DC29D5
                            • Part of subcall function 00DC2344: GetCursorPos.USER32(?), ref: 00DC2357
                            • Part of subcall function 00DC2344: ScreenToClient.USER32(00E867B0,?), ref: 00DC2374
                            • Part of subcall function 00DC2344: GetAsyncKeyState.USER32(00000001), ref: 00DC2399
                            • Part of subcall function 00DC2344: GetAsyncKeyState.USER32(00000002), ref: 00DC23A7
                          • SetTimer.USER32(00000000,00000000,00000028,00DC1256), ref: 00DC29FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer_malloc
                          • String ID: AutoIt v3 GUI
                          • API String ID: 1557154100-248962490
                          • Opcode ID: e465a520264affb3d69ae200df8c0f6a9a3c33fa9b2d970c76889de27133045a
                          • Instruction ID: 0968caa8192a9c5f4ea39387656bc4200c09da91461d8e236e6fd5977c3731ae
                          • Opcode Fuzzy Hash: e465a520264affb3d69ae200df8c0f6a9a3c33fa9b2d970c76889de27133045a
                          • Instruction Fuzzy Hash: 63B16A75A0020AAFDB14DFA9DD45FAE7BB4FB08710F118129FA19E7290CB74E851CB60
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00E440F6
                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00E441B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharMessageSendUpper
                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                          • API String ID: 3974292440-719923060
                          • Opcode ID: a276297ab4e03a53b3b840244ac06c9d885e8c8d8019b3c2ff91d6e3398f81a3
                          • Instruction ID: 8b5d6f6af0121593184476b6cd9f1926830e395de07353634c67b4d36fae616e
                          • Opcode Fuzzy Hash: a276297ab4e03a53b3b840244ac06c9d885e8c8d8019b3c2ff91d6e3398f81a3
                          • Instruction Fuzzy Hash: C8A181703142029BCB14EF20D951F6AB7E5FF84314F14596CB89AAB6D2DB70EC45CB61
                          APIs
                          • LoadCursorW.USER32(00000000,00007F89), ref: 00E35309
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00E35314
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00E3531F
                          • LoadCursorW.USER32(00000000,00007F03), ref: 00E3532A
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00E35335
                          • LoadCursorW.USER32(00000000,00007F01), ref: 00E35340
                          • LoadCursorW.USER32(00000000,00007F81), ref: 00E3534B
                          • LoadCursorW.USER32(00000000,00007F88), ref: 00E35356
                          • LoadCursorW.USER32(00000000,00007F80), ref: 00E35361
                          • LoadCursorW.USER32(00000000,00007F86), ref: 00E3536C
                          • LoadCursorW.USER32(00000000,00007F83), ref: 00E35377
                          • LoadCursorW.USER32(00000000,00007F85), ref: 00E35382
                          • LoadCursorW.USER32(00000000,00007F82), ref: 00E3538D
                          • LoadCursorW.USER32(00000000,00007F84), ref: 00E35398
                          • LoadCursorW.USER32(00000000,00007F04), ref: 00E353A3
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00E353AE
                          • GetCursorInfo.USER32(?), ref: 00E353BE
                          • GetLastError.KERNEL32(00000001,00000000), ref: 00E353E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Cursor$Load$ErrorInfoLast
                          • String ID:
                          • API String ID: 3215588206-0
                          • Opcode ID: 5b525f6c788143e3634fb6d2e89c09a06fd857ea4366a1f0246f35d2a2132420
                          • Instruction ID: 4c6345da6a117b03785c1f10faee4922039a8677c3877c4cc1c48d46c02b3142
                          • Opcode Fuzzy Hash: 5b525f6c788143e3634fb6d2e89c09a06fd857ea4366a1f0246f35d2a2132420
                          • Instruction Fuzzy Hash: 09417170E04319AADB109FBA8C49D6EFFF8EF51B10F10452FE519E7290DAB8A401CE61
                          APIs
                          • GetClassNameW.USER32(?,?,00000100), ref: 00E1AAA5
                          • __swprintf.LIBCMT ref: 00E1AB46
                          • _wcscmp.LIBCMT ref: 00E1AB59
                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00E1ABAE
                          • _wcscmp.LIBCMT ref: 00E1ABEA
                          • GetClassNameW.USER32(?,?,00000400), ref: 00E1AC21
                          • GetDlgCtrlID.USER32(?), ref: 00E1AC73
                          • GetWindowRect.USER32(?,?), ref: 00E1ACA9
                          • GetParent.USER32(?), ref: 00E1ACC7
                          • ScreenToClient.USER32(00000000), ref: 00E1ACCE
                          • GetClassNameW.USER32(?,?,00000100), ref: 00E1AD48
                          • _wcscmp.LIBCMT ref: 00E1AD5C
                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E1AD82
                          • _wcscmp.LIBCMT ref: 00E1AD96
                            • Part of subcall function 00DE386C: _iswctype.LIBCMT ref: 00DE3874
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                          • String ID: %s%u
                          • API String ID: 3744389584-679674701
                          • Opcode ID: e692507d39ffe042013182c406686abfc6e48e35a5d90601652762389dae9c70
                          • Instruction ID: 64e557f6c4ef321057994a95b123cd243ab66b80fe1ebb601b32d20e4ef73cd7
                          • Opcode Fuzzy Hash: e692507d39ffe042013182c406686abfc6e48e35a5d90601652762389dae9c70
                          • Instruction Fuzzy Hash: F3A1CE71205646AFD714DF20D884BFAF7E8FF44319F085629F999A2190DB30E985CBA2
                          APIs
                          • GetClassNameW.USER32(00000008,?,00000400), ref: 00E1B3DB
                          • _wcscmp.LIBCMT ref: 00E1B3EC
                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 00E1B414
                          • CharUpperBuffW.USER32(?,00000000), ref: 00E1B431
                          • _wcscmp.LIBCMT ref: 00E1B44F
                          • _wcsstr.LIBCMT ref: 00E1B460
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E1B498
                          • _wcscmp.LIBCMT ref: 00E1B4A8
                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 00E1B4CF
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E1B518
                          • _wcscmp.LIBCMT ref: 00E1B528
                          • GetClassNameW.USER32(00000010,?,00000400), ref: 00E1B550
                          • GetWindowRect.USER32(00000004,?), ref: 00E1B5B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                          • String ID: @$ThumbnailClass
                          • API String ID: 1788623398-1539354611
                          • Opcode ID: 3b8dfe90d599e6ead9267d73f61f08802cf467a83030b6ecafa70680663293f9
                          • Instruction ID: 5f4ddd1ca63f84355c8b0ca1d4a58d4e496e0f16c171483b33570c2db09707f0
                          • Opcode Fuzzy Hash: 3b8dfe90d599e6ead9267d73f61f08802cf467a83030b6ecafa70680663293f9
                          • Instruction Fuzzy Hash: C781D0710043059FDB04DF11C885FEA7BE9EF44718F04906AFD95AA0A2EB34DD89CBA1
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • DragQueryPoint.SHELL32(?,?), ref: 00E4C917
                            • Part of subcall function 00E4ADF1: ClientToScreen.USER32(?,?), ref: 00E4AE1A
                            • Part of subcall function 00E4ADF1: GetWindowRect.USER32(?,?), ref: 00E4AE90
                            • Part of subcall function 00E4ADF1: PtInRect.USER32(?,?,00E4C304), ref: 00E4AEA0
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E4C980
                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00E4C98B
                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00E4C9AE
                          • _wcscat.LIBCMT ref: 00E4C9DE
                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00E4C9F5
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E4CA0E
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00E4CA25
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00E4CA47
                          • DragFinish.SHELL32(?), ref: 00E4CA4E
                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00E4CB41
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pr
                          • API String ID: 169749273-2073472848
                          • Opcode ID: f02035785d5f74cda19f7c1f04c62b893f9e4ca9f22a58d1c1fc2011b99b0d8e
                          • Instruction ID: 0f66eeac3953641a9103e51b38f665f707f6352591f387aa05868b45e52623dc
                          • Opcode Fuzzy Hash: f02035785d5f74cda19f7c1f04c62b893f9e4ca9f22a58d1c1fc2011b99b0d8e
                          • Instruction Fuzzy Hash: 6A617D71508301AFC701EF61DC85E9FBBE8EF89750F00092EF595A31A1DB709A49CBA2
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                          • API String ID: 1038674560-1810252412
                          • Opcode ID: 50c44ea9ac27249a35f1c01bd92ed13959c5931a728a384b39008edbc4f41f7b
                          • Instruction ID: ed7c16cbd4b0abe3493b21e4d7d4aebc7ebab0dc40edb02e6c8e61fd4efa0ce1
                          • Opcode Fuzzy Hash: 50c44ea9ac27249a35f1c01bd92ed13959c5931a728a384b39008edbc4f41f7b
                          • Instruction Fuzzy Hash: BD318B31A04306A6DB14FAA1DD43EEE77A8EF20750F605129F415B20E2EF61AE48CA71
                          APIs
                          • LoadIconW.USER32(00000063), ref: 00E1C4D4
                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E1C4E6
                          • SetWindowTextW.USER32(?,?), ref: 00E1C4FD
                          • GetDlgItem.USER32(?,000003EA), ref: 00E1C512
                          • SetWindowTextW.USER32(00000000,?), ref: 00E1C518
                          • GetDlgItem.USER32(?,000003E9), ref: 00E1C528
                          • SetWindowTextW.USER32(00000000,?), ref: 00E1C52E
                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00E1C54F
                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00E1C569
                          • GetWindowRect.USER32(?,?), ref: 00E1C572
                          • SetWindowTextW.USER32(?,?), ref: 00E1C5DD
                          • GetDesktopWindow.USER32 ref: 00E1C5E3
                          • GetWindowRect.USER32(00000000), ref: 00E1C5EA
                          • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00E1C636
                          • GetClientRect.USER32(?,?), ref: 00E1C643
                          • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00E1C668
                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E1C693
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                          • String ID:
                          • API String ID: 3869813825-0
                          • Opcode ID: 7989e9880e81e6ab2ea7b5783756f32b1a06ea4866acce8e3f5b0186fd4a7d0c
                          • Instruction ID: db027ee00bfab576aab9ce65a69f9531168f50456dffeb1184a296bfbfd0af57
                          • Opcode Fuzzy Hash: 7989e9880e81e6ab2ea7b5783756f32b1a06ea4866acce8e3f5b0186fd4a7d0c
                          • Instruction Fuzzy Hash: B0515E70900709AFDB209FA9DD89BAEBBF5FF04B05F104528E696F25A0C774B945CB50
                          APIs
                          • _memset.LIBCMT ref: 00E4A4C8
                          • DestroyWindow.USER32(?,?), ref: 00E4A542
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00E4A5BC
                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00E4A5DE
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E4A5F1
                          • DestroyWindow.USER32(00000000), ref: 00E4A613
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00DC0000,00000000), ref: 00E4A64A
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00E4A663
                          • GetDesktopWindow.USER32 ref: 00E4A67C
                          • GetWindowRect.USER32(00000000), ref: 00E4A683
                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00E4A69B
                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00E4A6B3
                            • Part of subcall function 00DC25DB: GetWindowLongW.USER32(?,000000EB), ref: 00DC25EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                          • String ID: 0$tooltips_class32
                          • API String ID: 1297703922-3619404913
                          • Opcode ID: ded244737c86b9c68ceba50ccbfed8c6152be53921edb5095406eb35106c4088
                          • Instruction ID: f66554a2e8d353c5513f8804b6a69db1c4e88464d5bd3c7465771c7a3dc30c84
                          • Opcode Fuzzy Hash: ded244737c86b9c68ceba50ccbfed8c6152be53921edb5095406eb35106c4088
                          • Instruction Fuzzy Hash: CE71DD71180205AFD724CF28DC49F6A7BE5FB88714F49456DF989A72A0C770E906CF62
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00E446AB
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E446F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharMessageSendUpper
                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                          • API String ID: 3974292440-4258414348
                          • Opcode ID: 31dc5c5a926ad2f1f0b6f86dc9760aa4682ca426c49b0e4506cb5eecd50a18cf
                          • Instruction ID: 215ef2e5a665df89d13d10e9b52d749905b25269d46a84dadb59971fae16b2d5
                          • Opcode Fuzzy Hash: 31dc5c5a926ad2f1f0b6f86dc9760aa4682ca426c49b0e4506cb5eecd50a18cf
                          • Instruction Fuzzy Hash: 5F9161742047029FCB14EF20D451BAAB7E1EF84314F05A45DF89A6B7A2DB70ED46CB61
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00E4BB6E
                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00E49431), ref: 00E4BBCA
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E4BC03
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00E4BC46
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00E4BC7D
                          • FreeLibrary.KERNEL32(?), ref: 00E4BC89
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00E4BC99
                          • DestroyIcon.USER32(?,?,?,?,?,00E49431), ref: 00E4BCA8
                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00E4BCC5
                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00E4BCD1
                            • Part of subcall function 00DE313D: __wcsicmp_l.LIBCMT ref: 00DE31C6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                          • String ID: .dll$.exe$.icl
                          • API String ID: 1212759294-1154884017
                          • Opcode ID: ba804bd891910f53c182fe462c277b9073f0f9adb9f39c7bb00c7c738a005d1d
                          • Instruction ID: 063d220434efebbe34dcdbaa61d49ded65df285dc2f44b1aafffe82af2cb2712
                          • Opcode Fuzzy Hash: ba804bd891910f53c182fe462c277b9073f0f9adb9f39c7bb00c7c738a005d1d
                          • Instruction Fuzzy Hash: F061E271900215BEEB14DF65DC86FBEB7A8EB08B14F10411AF815E61C0DB74DA95CBA0
                          APIs
                          • LoadStringW.USER32(00000066,?,00000FFF,00E4FB78), ref: 00E2A0FC
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • LoadStringW.USER32(?,?,00000FFF,?), ref: 00E2A11E
                          • __swprintf.LIBCMT ref: 00E2A177
                          • __swprintf.LIBCMT ref: 00E2A190
                          • _wprintf.LIBCMT ref: 00E2A246
                          • _wprintf.LIBCMT ref: 00E2A264
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: LoadString__swprintf_wprintf$_memmove
                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR$%
                          • API String ID: 311963372-1048875529
                          • Opcode ID: 8b1810f64e24551be6a12b3f72dc1dc427d924a3b66a58bac5eb7e8f1e169f5b
                          • Instruction ID: a5da5b5d6b742891dde77fc38c8dee0d0235a400898800d600632539011a0dbf
                          • Opcode Fuzzy Hash: 8b1810f64e24551be6a12b3f72dc1dc427d924a3b66a58bac5eb7e8f1e169f5b
                          • Instruction Fuzzy Hash: B151297290021AABCB15EBE0DD86EEEB779EF04300F1451A9B505730A1EB316E99DF71
                          APIs
                          • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00E29EEA
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00E29F0B
                          • __swprintf.LIBCMT ref: 00E29F64
                          • __swprintf.LIBCMT ref: 00E29F7D
                          • _wprintf.LIBCMT ref: 00E2A024
                          • _wprintf.LIBCMT ref: 00E2A042
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: LoadString__swprintf_wprintf$_memmove
                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                          • API String ID: 311963372-3080491070
                          • Opcode ID: d7d9fb0244dbc36d7069e37dafcbc6926d79b7f9e86fdaee3726b29f4dcc5fbc
                          • Instruction ID: 2d3a464ba793e055fd839b4fc594c99795b43ef99427e91163a4c1de2e244c0c
                          • Opcode Fuzzy Hash: d7d9fb0244dbc36d7069e37dafcbc6926d79b7f9e86fdaee3726b29f4dcc5fbc
                          • Instruction Fuzzy Hash: FC514F3190021AAACF15EBE0DD86EEEB779EF04300F1441A9B509730A2DB352F59DB71
                          APIs
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • CharLowerBuffW.USER32(?,?), ref: 00E2A636
                          • GetDriveTypeW.KERNEL32 ref: 00E2A683
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E2A6CB
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E2A702
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E2A730
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                          • API String ID: 2698844021-4113822522
                          • Opcode ID: 4746307810f7cd247a129a2481cccac073bfc20e2d28ae6a3d8b8035556a89b0
                          • Instruction ID: 4d3a52de0b3e1cabe6c1acbdc3f2c64dc0d110ff9cccd62bcbec5a05ae2f5e4c
                          • Opcode Fuzzy Hash: 4746307810f7cd247a129a2481cccac073bfc20e2d28ae6a3d8b8035556a89b0
                          • Instruction Fuzzy Hash: B0514D711043059FC700EF21D891D6AB7F4EF94718F18996DF89AA7251DB31AE0ACB62
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00DFE452,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00E1FDEF
                          • LoadStringW.USER32(00000000,?,00DFE452,00000001), ref: 00E1FDF8
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,00DFE452,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00E1FE1A
                          • LoadStringW.USER32(00000000,?,00DFE452,00000001), ref: 00E1FE1D
                          • __swprintf.LIBCMT ref: 00E1FE6D
                          • __swprintf.LIBCMT ref: 00E1FE7E
                          • _wprintf.LIBCMT ref: 00E1FF27
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E1FF3E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                          • API String ID: 984253442-2268648507
                          • Opcode ID: 10a39f02dbe8e85f751f2e30d8aeb7312410a3fe111ffbf11d43eadcd183ad76
                          • Instruction ID: 644f78aec1a8403a8ed273aa445c3214333184339b89c97bdaa281e666bb495d
                          • Opcode Fuzzy Hash: 10a39f02dbe8e85f751f2e30d8aeb7312410a3fe111ffbf11d43eadcd183ad76
                          • Instruction Fuzzy Hash: AB412B7290420AAACB14FBE1DD86EEEB778EF19700F500169F505B3092DA716F49CBB0
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E2A47A
                          • __swprintf.LIBCMT ref: 00E2A49C
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E2A4D9
                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00E2A4FE
                          • _memset.LIBCMT ref: 00E2A51D
                          • _wcsncpy.LIBCMT ref: 00E2A559
                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00E2A58E
                          • CloseHandle.KERNEL32(00000000), ref: 00E2A599
                          • RemoveDirectoryW.KERNEL32(?), ref: 00E2A5A2
                          • CloseHandle.KERNEL32(00000000), ref: 00E2A5AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                          • String ID: :$\$\??\%s
                          • API String ID: 2733774712-3457252023
                          • Opcode ID: edca7f150eccdf8d5bc6c9ad3b3673ba39afab44f1337076bbe90b21f217d5f0
                          • Instruction ID: 096c49d698ff0baa67f9a8d3f8c275f5867f24ef09683d9a30f221202ec42273
                          • Opcode Fuzzy Hash: edca7f150eccdf8d5bc6c9ad3b3673ba39afab44f1337076bbe90b21f217d5f0
                          • Instruction Fuzzy Hash: BA31B0B5500219ABDB219FA1EC49FEB73BCEF89705F1441B6FA08E2160E77097458B35
                          APIs
                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00E49476,?,?), ref: 00E4BD10
                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD27
                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD32
                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD3F
                          • GlobalLock.KERNEL32(00000000,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD48
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD57
                          • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD60
                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD67
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00E49476,?,?,00000000,?), ref: 00E4BD78
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00E52CAC,?), ref: 00E4BD91
                          • GlobalFree.KERNEL32(00000000), ref: 00E4BDA1
                          • GetObjectW.GDI32(00000000,00000018,?), ref: 00E4BDC5
                          • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00E4BDF0
                          • DeleteObject.GDI32(00000000), ref: 00E4BE18
                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00E4BE2E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                          • String ID:
                          • API String ID: 3840717409-0
                          • Opcode ID: 3b58f0c257e32b3354bee180d144b15559fa2ca76bc474e063fda4cc016c0eb8
                          • Instruction ID: d48cc71772eb03e5484cd76cc56825d2cce06807294cf1afa6eeb63493a6da66
                          • Opcode Fuzzy Hash: 3b58f0c257e32b3354bee180d144b15559fa2ca76bc474e063fda4cc016c0eb8
                          • Instruction Fuzzy Hash: D8412B79A01208EFDB119F66DC48EAB7BB8FF8AB15F104068F905E7260D7709D05DB60
                          APIs
                          • __wsplitpath.LIBCMT ref: 00E2DC7B
                          • _wcscat.LIBCMT ref: 00E2DC93
                          • _wcscat.LIBCMT ref: 00E2DCA5
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E2DCBA
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E2DCCE
                          • GetFileAttributesW.KERNEL32(?), ref: 00E2DCE6
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00E2DD00
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00E2DD12
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                          • String ID: *.*
                          • API String ID: 34673085-438819550
                          • Opcode ID: 0402fe853e522d3bcff61f74496c1f7cfa25d637b83ce1eaf0669ab4e95b6a0a
                          • Instruction ID: 9cb089f26080ea8d7b3a968a659830cfc07dde6e073c7b8accad71ef2b918b97
                          • Opcode Fuzzy Hash: 0402fe853e522d3bcff61f74496c1f7cfa25d637b83ce1eaf0669ab4e95b6a0a
                          • Instruction Fuzzy Hash: 7681D3715082519FCB20EF24DC559AAB7E8FF88314F19982EF989E7250E670ED44CB62
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00E4C4EC
                          • GetFocus.USER32 ref: 00E4C4FC
                          • GetDlgCtrlID.USER32(00000000), ref: 00E4C507
                          • _memset.LIBCMT ref: 00E4C632
                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00E4C65D
                          • GetMenuItemCount.USER32(?), ref: 00E4C67D
                          • GetMenuItemID.USER32(?,00000000), ref: 00E4C690
                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00E4C6C4
                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00E4C70C
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E4C744
                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00E4C779
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                          • String ID: 0
                          • API String ID: 1296962147-4108050209
                          • Opcode ID: 6a51b07c49f58610b3291101a9ac68fb14981c4bd0d5d512666ff3522c5c1a9c
                          • Instruction ID: 3bcba28d462e9214c790298952f68b9fda002508bdb3c473ae4a9ea350fef142
                          • Opcode Fuzzy Hash: 6a51b07c49f58610b3291101a9ac68fb14981c4bd0d5d512666ff3522c5c1a9c
                          • Instruction Fuzzy Hash: 4481B3705093019FD750DF25E884A6BBBE8FF88718F20552EF999A3291D731D905CFA2
                          APIs
                            • Part of subcall function 00E1874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E18766
                            • Part of subcall function 00E1874A: GetLastError.KERNEL32(?,00E1822A,?,?,?), ref: 00E18770
                            • Part of subcall function 00E1874A: GetProcessHeap.KERNEL32(00000008,?,?,00E1822A,?,?,?), ref: 00E1877F
                            • Part of subcall function 00E1874A: HeapAlloc.KERNEL32(00000000,?,00E1822A,?,?,?), ref: 00E18786
                            • Part of subcall function 00E1874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E1879D
                            • Part of subcall function 00E187E7: GetProcessHeap.KERNEL32(00000008,00E18240,00000000,00000000,?,00E18240,?), ref: 00E187F3
                            • Part of subcall function 00E187E7: HeapAlloc.KERNEL32(00000000,?,00E18240,?), ref: 00E187FA
                            • Part of subcall function 00E187E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00E18240,?), ref: 00E1880B
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E18458
                          • _memset.LIBCMT ref: 00E1846D
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E1848C
                          • GetLengthSid.ADVAPI32(?), ref: 00E1849D
                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E184DA
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E184F6
                          • GetLengthSid.ADVAPI32(?), ref: 00E18513
                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00E18522
                          • HeapAlloc.KERNEL32(00000000), ref: 00E18529
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E1854A
                          • CopySid.ADVAPI32(00000000), ref: 00E18551
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E18582
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E185A8
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E185BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                          • String ID:
                          • API String ID: 3996160137-0
                          • Opcode ID: 5b25a2c4fa1844218b3bfb293db6261a464b130239b60cbe766122782f31aa60
                          • Instruction ID: b71943d124e54ec97f0d6ed26c0de3212923349a052977960abbeaa664f2961a
                          • Opcode Fuzzy Hash: 5b25a2c4fa1844218b3bfb293db6261a464b130239b60cbe766122782f31aa60
                          • Instruction Fuzzy Hash: 2F615675A0020AAFDF00DFA1DD44AEEBBBAFF45714F448269E815B7291DB309A45CF60
                          APIs
                          • GetDC.USER32(00000000), ref: 00E376A2
                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00E376AE
                          • CreateCompatibleDC.GDI32(?), ref: 00E376BA
                          • SelectObject.GDI32(00000000,?), ref: 00E376C7
                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00E3771B
                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00E37757
                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00E3777B
                          • SelectObject.GDI32(00000006,?), ref: 00E37783
                          • DeleteObject.GDI32(?), ref: 00E3778C
                          • DeleteDC.GDI32(00000006), ref: 00E37793
                          • ReleaseDC.USER32(00000000,?), ref: 00E3779E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                          • String ID: (
                          • API String ID: 2598888154-3887548279
                          • Opcode ID: 0e624ef67f299129e5bbf227d11d9bfa7e1eea973e62aa4862c48c87d20a8f8d
                          • Instruction ID: 766351ce99a575ed2b9aaba80a0e98bee97b08299fef34a0b5db9d8b6000141e
                          • Opcode Fuzzy Hash: 0e624ef67f299129e5bbf227d11d9bfa7e1eea973e62aa4862c48c87d20a8f8d
                          • Instruction Fuzzy Hash: 8D515175904209EFCB25CFA9CC89EAEBBB9EF49710F14841DF989A7210D731A845CB60
                          APIs
                            • Part of subcall function 00DE0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00DC6C6C,?,00008000), ref: 00DE0BB7
                            • Part of subcall function 00DC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DC48A1,?,?,00DC37C0,?), ref: 00DC48CE
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00DC6D0D
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00DC6E5A
                            • Part of subcall function 00DC59CD: _wcscpy.LIBCMT ref: 00DC5A05
                            • Part of subcall function 00DE387D: _iswctype.LIBCMT ref: 00DE3885
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CurrentDirectory$FullNamePath_iswctype_malloc_wcscpy
                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                          • API String ID: 489323609-1018226102
                          • Opcode ID: 1584a951740ad5d12e9ad06579dba7c144a4e7589ff4f2f7f1852a8846e0424d
                          • Instruction ID: bd769db663e13c9efa367d126d514db86631a38d7a71e44d78c47b487d768bb2
                          • Opcode Fuzzy Hash: 1584a951740ad5d12e9ad06579dba7c144a4e7589ff4f2f7f1852a8846e0424d
                          • Instruction Fuzzy Hash: 6E026B301083469FC724EF24C891EAFBBE5EF95354F14491DF58A972A1DB30E989CB62
                          APIs
                          • _memset.LIBCMT ref: 00DC45F9
                          • GetMenuItemCount.USER32(00E86890), ref: 00DFD7CD
                          • GetMenuItemCount.USER32(00E86890), ref: 00DFD87D
                          • GetCursorPos.USER32(?), ref: 00DFD8C1
                          • SetForegroundWindow.USER32(00000000), ref: 00DFD8CA
                          • TrackPopupMenuEx.USER32(00E86890,00000000,?,00000000,00000000,00000000), ref: 00DFD8DD
                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00DFD8E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                          • String ID:
                          • API String ID: 2751501086-0
                          • Opcode ID: cff7d631f948d82514c43181df0a3e6b0631494718c65ea1223485844067c442
                          • Instruction ID: 68aa801549692f54e19c784c29800a23ee35f0b1f23ab3b79ddb75373bc8e890
                          • Opcode Fuzzy Hash: cff7d631f948d82514c43181df0a3e6b0631494718c65ea1223485844067c442
                          • Instruction Fuzzy Hash: A571263164020ABEEB319F55DC45FBABF66FF05764F24821AF615AA1E0C7B19C10DBA0
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00E38BEC
                          • CoInitialize.OLE32(00000000), ref: 00E38C19
                          • CoUninitialize.OLE32 ref: 00E38C23
                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00E38D23
                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00E38E50
                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00E52C0C), ref: 00E38E84
                          • CoGetObject.OLE32(?,00000000,00E52C0C,?), ref: 00E38EA7
                          • SetErrorMode.KERNEL32(00000000), ref: 00E38EBA
                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00E38F3A
                          • VariantClear.OLEAUT32(?), ref: 00E38F4A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                          • String ID: ,,
                          • API String ID: 2395222682-1556401989
                          • Opcode ID: c43b372652c0b6ecd268224bab1060aec2e4b8caa16e4fe08089ec74c1ecf36d
                          • Instruction ID: a721eda8a577dd0fd04fe33797144ce0aaa2636b4bcf5820b726777d038948dd
                          • Opcode Fuzzy Hash: c43b372652c0b6ecd268224bab1060aec2e4b8caa16e4fe08089ec74c1ecf36d
                          • Instruction Fuzzy Hash: DBC15571208305AFC700DF64C98892BBBE9FF89708F00595DF58AAB251DB71ED06CB62
                          APIs
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          • _memset.LIBCMT ref: 00E17DB3
                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E17DE8
                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E17E04
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00E17E20
                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00E17E4A
                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00E17E72
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E17E7D
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E17E82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                          • API String ID: 1411258926-22481851
                          • Opcode ID: 0ccb99ceb1000d94c1d2746493da7c41c3083d244c0cfbfc3e4389edd58337b7
                          • Instruction ID: 961386d46815bec8e7054a3d78679c8d2be24c836efad3743efb7139305e2d40
                          • Opcode Fuzzy Hash: 0ccb99ceb1000d94c1d2746493da7c41c3083d244c0cfbfc3e4389edd58337b7
                          • Instruction Fuzzy Hash: 3041E87681422EABCB11EBA4DC85DEDB7B8FF08700F044169F855B31A1DB305E45CBA0
                          APIs
                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E40038,?,?), ref: 00E410BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                          • API String ID: 3964851224-909552448
                          • Opcode ID: dce0f73992a10d29487e16699be6897e6a5b3a5f2cbd8ff8885dbf66f0da0f60
                          • Instruction ID: 1b1f21aec8106d7f5090093bb2d11e2a00caeecdc2b333e79617bcc5c7763fc2
                          • Opcode Fuzzy Hash: dce0f73992a10d29487e16699be6897e6a5b3a5f2cbd8ff8885dbf66f0da0f60
                          • Instruction Fuzzy Hash: 8C416F3015128E8BCF10EF91EC91AEA3B24FF51314F505498FD95AB691DB70AD9ACB70
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00DFE6C9,00000010,?,Bad directive syntax error,00E4F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00E1FCD2
                          • LoadStringW.USER32(00000000,?,00DFE6C9,00000010), ref: 00E1FCD9
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • _wprintf.LIBCMT ref: 00E1FD0C
                          • __swprintf.LIBCMT ref: 00E1FD2E
                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00E1FD9D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                          • API String ID: 1506413516-4153970271
                          • Opcode ID: 55d2e816f450452d27864dd09b54b921b7a7295bb58d29be9ca182f4f7bc5372
                          • Instruction ID: c9d97a0ec4109b8128d18105d4b96456d5c99e05568092e9f36cf59b370e44fd
                          • Opcode Fuzzy Hash: 55d2e816f450452d27864dd09b54b921b7a7295bb58d29be9ca182f4f7bc5372
                          • Instruction Fuzzy Hash: F6214D3290021AABCF12EBA0DC4AFFE7779FF14700F044469F515760A2DA71AA58DBB1
                          APIs
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                            • Part of subcall function 00DC7A84: _memmove.LIBCMT ref: 00DC7B0D
                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E255D2
                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E255E8
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E255F9
                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E2560B
                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E2561C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: SendString$_memmove
                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                          • API String ID: 2279737902-1007645807
                          • Opcode ID: e4fbcf6b1e495c85273bb1314cefdff03bf1e1d253092f1e1e943707a2fc9d98
                          • Instruction ID: 95b4b52f4efa9b2eba47d27840ea9f165e1e2d4db1239087953b53071df6ad92
                          • Opcode Fuzzy Hash: e4fbcf6b1e495c85273bb1314cefdff03bf1e1d253092f1e1e943707a2fc9d98
                          • Instruction Fuzzy Hash: FF11602155026A79E720BAA2DC8AEFF7B7CEFD1B00F485469B419B70D1DEA01D05CAB1
                          APIs
                          • timeGetTime.WINMM ref: 00E2521C
                            • Part of subcall function 00DE0719: timeGetTime.WINMM(?,75A4B400,00DD0FF9), ref: 00DE071D
                          • Sleep.KERNEL32(0000000A), ref: 00E25248
                          • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00E2526C
                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00E2528E
                          • SetActiveWindow.USER32 ref: 00E252AD
                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E252BB
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E252DA
                          • Sleep.KERNEL32(000000FA), ref: 00E252E5
                          • IsWindow.USER32 ref: 00E252F1
                          • EndDialog.USER32(00000000), ref: 00E25302
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                          • String ID: BUTTON
                          • API String ID: 1194449130-3405671355
                          • Opcode ID: ac34d1c9ed07f982834f62529d31d03c6283b49632fc624b33634247504d6419
                          • Instruction ID: cb31d47b66461e8e449b2aa71a8fe30cdd632e26991dcd9745e38172a2995ad9
                          • Opcode Fuzzy Hash: ac34d1c9ed07f982834f62529d31d03c6283b49632fc624b33634247504d6419
                          • Instruction Fuzzy Hash: 3121C676104714EFE7005B32FE89B263B6AEB4679AF103474F009B11B1DBB59C498B71
                          APIs
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • CoInitialize.OLE32(00000000), ref: 00E2D855
                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00E2D8E8
                          • SHGetDesktopFolder.SHELL32(?), ref: 00E2D8FC
                          • CoCreateInstance.OLE32(00E52D7C,00000000,00000001,00E7A89C,?), ref: 00E2D948
                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00E2D9B7
                          • CoTaskMemFree.OLE32(?,?), ref: 00E2DA0F
                          • _memset.LIBCMT ref: 00E2DA4C
                          • SHBrowseForFolderW.SHELL32(?), ref: 00E2DA88
                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00E2DAAB
                          • CoTaskMemFree.OLE32(00000000), ref: 00E2DAB2
                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00E2DAE9
                          • CoUninitialize.OLE32(00000001,00000000), ref: 00E2DAEB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                          • String ID:
                          • API String ID: 1246142700-0
                          • Opcode ID: 73f91a2798651efc2cccfc206be2c0f893ae953e01057e6d95c18036373f6f8c
                          • Instruction ID: a07c947cfaa74773b311b6659037334cfac278c9058d2f07e524dc050eccaa99
                          • Opcode Fuzzy Hash: 73f91a2798651efc2cccfc206be2c0f893ae953e01057e6d95c18036373f6f8c
                          • Instruction Fuzzy Hash: 48B10B75A00119AFDB04DF65DC88EAEBBF9EF48304B1484A9F909EB251DB30ED45CB60
                          APIs
                          • GetKeyboardState.USER32(?), ref: 00E205A7
                          • SetKeyboardState.USER32(?), ref: 00E20612
                          • GetAsyncKeyState.USER32(000000A0), ref: 00E20632
                          • GetKeyState.USER32(000000A0), ref: 00E20649
                          • GetAsyncKeyState.USER32(000000A1), ref: 00E20678
                          • GetKeyState.USER32(000000A1), ref: 00E20689
                          • GetAsyncKeyState.USER32(00000011), ref: 00E206B5
                          • GetKeyState.USER32(00000011), ref: 00E206C3
                          • GetAsyncKeyState.USER32(00000012), ref: 00E206EC
                          • GetKeyState.USER32(00000012), ref: 00E206FA
                          • GetAsyncKeyState.USER32(0000005B), ref: 00E20723
                          • GetKeyState.USER32(0000005B), ref: 00E20731
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: 58951b7e044831b79b90d5b7fcc3ec3ea288fc9032c76d12a216be01556145ca
                          • Instruction ID: 05796e8c1d397c144bde1dee415995eea8c7739f8b30f0e9dcc87548e4f5e411
                          • Opcode Fuzzy Hash: 58951b7e044831b79b90d5b7fcc3ec3ea288fc9032c76d12a216be01556145ca
                          • Instruction Fuzzy Hash: 63512C30A047A819FB35EBB0A4547EABFF49F11384F08559AC5C2765C3DA649B8CCF61
                          APIs
                          • GetDlgItem.USER32(?,00000001), ref: 00E1C746
                          • GetWindowRect.USER32(00000000,?), ref: 00E1C758
                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00E1C7B6
                          • GetDlgItem.USER32(?,00000002), ref: 00E1C7C1
                          • GetWindowRect.USER32(00000000,?), ref: 00E1C7D3
                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00E1C827
                          • GetDlgItem.USER32(?,000003E9), ref: 00E1C835
                          • GetWindowRect.USER32(00000000,?), ref: 00E1C846
                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00E1C889
                          • GetDlgItem.USER32(?,000003EA), ref: 00E1C897
                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E1C8B4
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E1C8C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$ItemMoveRect$Invalidate
                          • String ID:
                          • API String ID: 3096461208-0
                          • Opcode ID: 1ced92245293d37b24b994100113b1e574ec90df011eb57d351b7cb57027edb4
                          • Instruction ID: 5db6ad371d7c4db9145aa00cc00534d370a57742dc26f32aeac4973ac83d8371
                          • Opcode Fuzzy Hash: 1ced92245293d37b24b994100113b1e574ec90df011eb57d351b7cb57027edb4
                          • Instruction Fuzzy Hash: BD517075B00205AFDB08CF69DD89AAEBBB6EB89710F14812DF515E7290D770AD44CB50
                          APIs
                            • Part of subcall function 00DC1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00DC2036,?,00000000,?,?,?,?,00DC16CB,00000000,?), ref: 00DC1B9A
                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00DC20D3
                          • KillTimer.USER32(-00000001,?,?,?,?,00DC16CB,00000000,?,?,00DC1AE2,?,?), ref: 00DC216E
                          • DestroyAcceleratorTable.USER32(00000000), ref: 00DFBEF6
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DC16CB,00000000,?,?,00DC1AE2,?,?), ref: 00DFBF27
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DC16CB,00000000,?,?,00DC1AE2,?,?), ref: 00DFBF3E
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00DC16CB,00000000,?,?,00DC1AE2,?,?), ref: 00DFBF5A
                          • DeleteObject.GDI32(00000000), ref: 00DFBF6C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                          • String ID:
                          • API String ID: 641708696-0
                          • Opcode ID: 7443283d7baff8e59435e2e0d081be9b2eeba874b98264155e855dc067811dab
                          • Instruction ID: 32f13e3657276a15b3eed0d03a35b3e4b1d71127d3506db639148c96803fafca
                          • Opcode Fuzzy Hash: 7443283d7baff8e59435e2e0d081be9b2eeba874b98264155e855dc067811dab
                          • Instruction Fuzzy Hash: 25617A34500616DFCB299F15DD48B39B7F1FF41322F18842EE18A67960C776A895EFA0
                          APIs
                            • Part of subcall function 00DC25DB: GetWindowLongW.USER32(?,000000EB), ref: 00DC25EC
                          • GetSysColor.USER32(0000000F), ref: 00DC21D3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ColorLongWindow
                          • String ID:
                          • API String ID: 259745315-0
                          • Opcode ID: eeb37af4496280b30a200e323727cd32a85ebc64fd02b611135fa64d04ea7fd3
                          • Instruction ID: 030931566f228210f7552dd32e28147900f92ab031fcd388af769745d14f3916
                          • Opcode Fuzzy Hash: eeb37af4496280b30a200e323727cd32a85ebc64fd02b611135fa64d04ea7fd3
                          • Instruction Fuzzy Hash: 2541CF35000245AFDB219F28DC88FB97B65EB06731F184269FE659B2E2C7318C42DB35
                          APIs
                          • CharLowerBuffW.USER32(?,?,00E4F910), ref: 00E2AB76
                          • GetDriveTypeW.KERNEL32(00000061,00E7A620,00000061), ref: 00E2AC40
                          • _wcscpy.LIBCMT ref: 00E2AC6A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharDriveLowerType_wcscpy
                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                          • API String ID: 2820617543-1000479233
                          • Opcode ID: 0adc7d2617591614594c67fbcb29373e125754594faad2128bcb4900b096fd10
                          • Instruction ID: b2c34860f882af3d30e3ae3b2041c59b3efc46013b4392fc0852f5ed749f70d9
                          • Opcode Fuzzy Hash: 0adc7d2617591614594c67fbcb29373e125754594faad2128bcb4900b096fd10
                          • Instruction Fuzzy Hash: C851A0301083529FC714EF14D892EAEB7A5EF80714F18582DF496A72A2DB71DD49CB63
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                            • Part of subcall function 00DC2344: GetCursorPos.USER32(?), ref: 00DC2357
                            • Part of subcall function 00DC2344: ScreenToClient.USER32(00E867B0,?), ref: 00DC2374
                            • Part of subcall function 00DC2344: GetAsyncKeyState.USER32(00000001), ref: 00DC2399
                            • Part of subcall function 00DC2344: GetAsyncKeyState.USER32(00000002), ref: 00DC23A7
                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00E4C2E4
                          • ImageList_EndDrag.COMCTL32 ref: 00E4C2EA
                          • ReleaseCapture.USER32 ref: 00E4C2F0
                          • SetWindowTextW.USER32(?,00000000), ref: 00E4C39A
                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00E4C3AD
                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00E4C48F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                          • String ID: @GUI_DRAGFILE$@GUI_DROPID$pr$pr
                          • API String ID: 1924731296-488423084
                          • Opcode ID: 8ffca48b33ef7eb29c08eadd81ed60c7c1723761e9186d44f2c86e6e922ff4ba
                          • Instruction ID: 0f62c5d8dbde1b073f83e3205227c1aa742b07fae4d32fe6cb0abde9c89657b7
                          • Opcode Fuzzy Hash: 8ffca48b33ef7eb29c08eadd81ed60c7c1723761e9186d44f2c86e6e922ff4ba
                          • Instruction Fuzzy Hash: B851BB74204301AFD704EF21D896F6A7BE1EF88714F10852DF599AB2E1CB70A948CB62
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __i64tow__itow__swprintf
                          • String ID: %.15g$0x%p$False$True
                          • API String ID: 421087845-2263619337
                          • Opcode ID: 71a41a13f3429bd65d775f6efa2943b7f1cd97cbba1e7f9032977e703675b6e1
                          • Instruction ID: 28df43ea7b0e3cad2cedf010ef6c792094d633988dd61ed51c515f63663f0c9f
                          • Opcode Fuzzy Hash: 71a41a13f3429bd65d775f6efa2943b7f1cd97cbba1e7f9032977e703675b6e1
                          • Instruction Fuzzy Hash: AF41B57160420AAADB24AB35D846F7AB7E8EF45300F24846EE689D7291EE71D941CF31
                          APIs
                          • _memset.LIBCMT ref: 00E473D9
                          • CreateMenu.USER32 ref: 00E473F4
                          • SetMenu.USER32(?,00000000), ref: 00E47403
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E47490
                          • IsMenu.USER32(?), ref: 00E474A6
                          • CreatePopupMenu.USER32 ref: 00E474B0
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E474DD
                          • DrawMenuBar.USER32 ref: 00E474E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                          • String ID: 0$F
                          • API String ID: 176399719-3044882817
                          • Opcode ID: 5f54432dad1394430be08bb98fd45421b1d8d232f6824b57aeda194b54124316
                          • Instruction ID: 93a53197d91210b2f3b47ad9480d8008f21f40dfdb12c7d33881a19e50e5a9e3
                          • Opcode Fuzzy Hash: 5f54432dad1394430be08bb98fd45421b1d8d232f6824b57aeda194b54124316
                          • Instruction Fuzzy Hash: 4B415A78A00205EFDB10DF65E844EAABBF5FF49305F144029E959B7350D735AD14CBA0
                          APIs
                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00E477CD
                          • CreateCompatibleDC.GDI32(00000000), ref: 00E477D4
                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00E477E7
                          • SelectObject.GDI32(00000000,00000000), ref: 00E477EF
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00E477FA
                          • DeleteDC.GDI32(00000000), ref: 00E47803
                          • GetWindowLongW.USER32(?,000000EC), ref: 00E4780D
                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00E47821
                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00E4782D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                          • String ID: static
                          • API String ID: 2559357485-2160076837
                          • Opcode ID: 7de898756c30d695dc626237ac9c3b8ae7a38b455c2fa5c37e38db4020cad467
                          • Instruction ID: cf1af90808e945b8ab6b1f845cb6d3c0277657d9129f8c972eb79d984e5cafa6
                          • Opcode Fuzzy Hash: 7de898756c30d695dc626237ac9c3b8ae7a38b455c2fa5c37e38db4020cad467
                          • Instruction Fuzzy Hash: 6A31AA36101215AFDF119FA5EC08FDA3B69EF0E725F110225FA55B60A0C731D826DBA0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _wcscpy$CleanupStartup_memmovegethostbynamegethostnameinet_ntoa
                          • String ID: 0.0.0.0
                          • API String ID: 325522624-3771769585
                          • Opcode ID: 6efe967804797e8f539c359bb75276f48c417d04ef4f3be04cf1ed348485d49b
                          • Instruction ID: 1a91bf94fb8067f2f5f79f99577ee386dd2a6a2fec72a364d18ed50c0c78569a
                          • Opcode Fuzzy Hash: 6efe967804797e8f539c359bb75276f48c417d04ef4f3be04cf1ed348485d49b
                          • Instruction Fuzzy Hash: 69110575904125AFDB24EB21EC4AEEF77ACDF81B10F040176F405B6091EF749AC68671
                          APIs
                          • _memset.LIBCMT ref: 00DE707B
                            • Part of subcall function 00DE8D68: __getptd_noexit.LIBCMT ref: 00DE8D68
                          • __gmtime64_s.LIBCMT ref: 00DE7114
                          • __gmtime64_s.LIBCMT ref: 00DE714A
                          • __gmtime64_s.LIBCMT ref: 00DE7167
                          • __allrem.LIBCMT ref: 00DE71BD
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE71D9
                          • __allrem.LIBCMT ref: 00DE71F0
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE720E
                          • __allrem.LIBCMT ref: 00DE7225
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00DE7243
                          • __invoke_watson.LIBCMT ref: 00DE72B4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                          • String ID:
                          • API String ID: 384356119-0
                          • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                          • Instruction ID: dd04f5fc0f126df7dca2295590aa031b35da4e929d4369efd1ca897a67aa3cb5
                          • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                          • Instruction Fuzzy Hash: FA71F871A04757ABD754BE7ACC42B6AB3B8FF10320F15822AF614E7681E770E94087B4
                          APIs
                          • _memset.LIBCMT ref: 00E22A31
                          • GetMenuItemInfoW.USER32(00E86890,000000FF,00000000,00000030), ref: 00E22A92
                          • SetMenuItemInfoW.USER32(00E86890,00000004,00000000,00000030), ref: 00E22AC8
                          • Sleep.KERNEL32(000001F4), ref: 00E22ADA
                          • GetMenuItemCount.USER32(?), ref: 00E22B1E
                          • GetMenuItemID.USER32(?,00000000), ref: 00E22B3A
                          • GetMenuItemID.USER32(?,-00000001), ref: 00E22B64
                          • GetMenuItemID.USER32(?,?), ref: 00E22BA9
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E22BEF
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E22C03
                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E22C24
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                          • String ID:
                          • API String ID: 4176008265-0
                          • Opcode ID: 477be848895ea2cb25704c7ba6041a421a78c2393c3930b16715821cce0e0ad7
                          • Instruction ID: 011d5f3bc2a42354e74ebac56de31034ca235a235c5eea8aa6449e05ee9b910f
                          • Opcode Fuzzy Hash: 477be848895ea2cb25704c7ba6041a421a78c2393c3930b16715821cce0e0ad7
                          • Instruction Fuzzy Hash: 5061BFB0900259BFDB21CF64EC88EEEBBB8EB41308F14556DEA41B7251D731AD06DB20
                          APIs
                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00E47214
                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00E47217
                          • GetWindowLongW.USER32(?,000000F0), ref: 00E4723B
                          • _memset.LIBCMT ref: 00E4724C
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E4725E
                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00E472D6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow_memset
                          • String ID:
                          • API String ID: 830647256-0
                          • Opcode ID: 2e1e44449717b312f46c6c63f2d75a860580d75e71490c1c136695e48f6f7c05
                          • Instruction ID: 2e24f9e8118ae7d45446c173c99159ecfb64bd25f5a11fd2419d958e3a826cd6
                          • Opcode Fuzzy Hash: 2e1e44449717b312f46c6c63f2d75a860580d75e71490c1c136695e48f6f7c05
                          • Instruction Fuzzy Hash: 37616875A00208AFDB10DFA4DC81EEE77F8EB09714F144199FA58B72A1C771AA45DBA0
                          APIs
                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00E17135
                          • SafeArrayAllocData.OLEAUT32(?), ref: 00E1718E
                          • VariantInit.OLEAUT32(?), ref: 00E171A0
                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00E171C0
                          • VariantCopy.OLEAUT32(?,?), ref: 00E17213
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00E17227
                          • VariantClear.OLEAUT32(?), ref: 00E1723C
                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00E17249
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E17252
                          • VariantClear.OLEAUT32(?), ref: 00E17264
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E1726F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                          • String ID:
                          • API String ID: 2706829360-0
                          • Opcode ID: a9748bb90c40b051ee89351efb7b97a36a03de043cf4fcd3afbf49c5f412b224
                          • Instruction ID: e7fe2bd7eba04471011f8cf6130439e000f1c80a8385b15cd5816fa68610eda8
                          • Opcode Fuzzy Hash: a9748bb90c40b051ee89351efb7b97a36a03de043cf4fcd3afbf49c5f412b224
                          • Instruction Fuzzy Hash: F6414075A04219AFCB04DF65D848DEEBBB8FF48754F008069F955B7261CB30A986CBA0
                          APIs
                          • GetKeyboardState.USER32(?), ref: 00E20241
                          • GetAsyncKeyState.USER32(000000A0), ref: 00E202C2
                          • GetKeyState.USER32(000000A0), ref: 00E202DD
                          • GetAsyncKeyState.USER32(000000A1), ref: 00E202F7
                          • GetKeyState.USER32(000000A1), ref: 00E2030C
                          • GetAsyncKeyState.USER32(00000011), ref: 00E20324
                          • GetKeyState.USER32(00000011), ref: 00E20336
                          • GetAsyncKeyState.USER32(00000012), ref: 00E2034E
                          • GetKeyState.USER32(00000012), ref: 00E20360
                          • GetAsyncKeyState.USER32(0000005B), ref: 00E20378
                          • GetKeyState.USER32(0000005B), ref: 00E2038A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: 42d45c8702a56434b5ec5c06ee816d267b9b83b193bb70e14a90907b0a1859b1
                          • Instruction ID: 12004de3c3dcabf2992217822e478ca92a0ce56b109d1c41968d5c5bc2ec7e66
                          • Opcode Fuzzy Hash: 42d45c8702a56434b5ec5c06ee816d267b9b83b193bb70e14a90907b0a1859b1
                          • Instruction Fuzzy Hash: 5941A8345047E9AFFF31DB64A8083A5BFA06F16348F08509ED5C6761D3EBA45DC887A2
                          APIs
                          • WSAStartup.WSOCK32(00000101,?), ref: 00E35AA6
                          • inet_addr.WSOCK32(?,?,?), ref: 00E35AEB
                          • gethostbyname.WSOCK32(?), ref: 00E35AF7
                          • IcmpCreateFile.IPHLPAPI ref: 00E35B05
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00E35B75
                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00E35B8B
                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00E35C00
                          • WSACleanup.WSOCK32 ref: 00E35C06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartup_mallocgethostbynameinet_addr
                          • String ID: Ping
                          • API String ID: 2388376717-2246546115
                          • Opcode ID: fd609c434f508c9883eff309ed6cb3aea5a6024b81ab72b5aa1191c03bb68b08
                          • Instruction ID: 17f8ed18fe7c43c42d9ed49368d6e6e702b76ebb36cb969ab9dd5db4f15cb753
                          • Opcode Fuzzy Hash: fd609c434f508c9883eff309ed6cb3aea5a6024b81ab72b5aa1191c03bb68b08
                          • Instruction Fuzzy Hash: 6951BE322047019FD710EF25DC49B6ABBE4EF48714F04992AF95AEB3A1DB70E844CB21
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00E2B73B
                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00E2B7B1
                          • GetLastError.KERNEL32 ref: 00E2B7BB
                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00E2B828
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Error$Mode$DiskFreeLastSpace
                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                          • API String ID: 4194297153-14809454
                          • Opcode ID: 6957f81aee824f54f89e72d6f715b602217310c28b050da0b08380a38a359739
                          • Instruction ID: ad68ff98bafcc7609803cf0bb2e93b9c1f9bf6d80a02efe57b37e637a687d862
                          • Opcode Fuzzy Hash: 6957f81aee824f54f89e72d6f715b602217310c28b050da0b08380a38a359739
                          • Instruction Fuzzy Hash: 9C31A135A002159FDB04EF64E889EAEB7B4EF84704F14912AF405F7292DB719942CB61
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E1B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00E1B0E7
                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00E194F6
                          • GetDlgCtrlID.USER32 ref: 00E19501
                          • GetParent.USER32 ref: 00E1951D
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E19520
                          • GetDlgCtrlID.USER32(?), ref: 00E19529
                          • GetParent.USER32(?), ref: 00E19545
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00E19548
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 1536045017-1403004172
                          • Opcode ID: cb1dc12f4be5760c5e5b9a684e8f6abcbf65e2e646471b41d895cf82bf480712
                          • Instruction ID: 14d672b526d08734a2fdfab2b3cf9ae3b98e0f29d8dd5b1f969b1a15eb8ca266
                          • Opcode Fuzzy Hash: cb1dc12f4be5760c5e5b9a684e8f6abcbf65e2e646471b41d895cf82bf480712
                          • Instruction Fuzzy Hash: 0421E074E00204AFDF00ABA1CCD5EFEBBA5EF49300F104169F922A72A2DB7559599B70
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E1B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00E1B0E7
                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00E195DF
                          • GetDlgCtrlID.USER32 ref: 00E195EA
                          • GetParent.USER32 ref: 00E19606
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E19609
                          • GetDlgCtrlID.USER32(?), ref: 00E19612
                          • GetParent.USER32(?), ref: 00E1962E
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00E19631
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 1536045017-1403004172
                          • Opcode ID: 9ac0fe2ef5721266583f7851432afb00cddab2dbd963bf2d5f59b4d6c959428c
                          • Instruction ID: 0e4dd3ef8be1031fef74e6143653dcaf93d5fcf162683bcc1b49970198612823
                          • Opcode Fuzzy Hash: 9ac0fe2ef5721266583f7851432afb00cddab2dbd963bf2d5f59b4d6c959428c
                          • Instruction Fuzzy Hash: 5921CF74E00204BFDF00ABA1CC95EFEBBA8EF49300F114059F921A72A2DB7599599B70
                          APIs
                          • GetParent.USER32 ref: 00E19651
                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00E19666
                          • _wcscmp.LIBCMT ref: 00E19678
                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00E196F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ClassMessageNameParentSend_wcscmp
                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                          • API String ID: 1704125052-3381328864
                          • Opcode ID: dc3bdd0a29a35da4da8e434dfd91127b8354fc97f165eaa10c27418676e48d21
                          • Instruction ID: 6e6a5e0e12d952c2d81e95483f7129b0087c9b3d54724e08b99a12d0a6818d09
                          • Opcode Fuzzy Hash: dc3bdd0a29a35da4da8e434dfd91127b8354fc97f165eaa10c27418676e48d21
                          • Instruction Fuzzy Hash: E7113A36248313BAFA063621DC2ADE6779CDF01764B201026F904B60D3FE5169814678
                          APIs
                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00E27CF6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ArraySafeVartype
                          • String ID:
                          • API String ID: 1725837607-0
                          • Opcode ID: 8d9dc069e7a57856d25d9e8affdc731df27ab189dabdb7dfd6470d90f8e40db8
                          • Instruction ID: cd9039ae9dfbd68176b11866144ff97a81aa1721002094e45d01cec5d8547270
                          • Opcode Fuzzy Hash: 8d9dc069e7a57856d25d9e8affdc731df27ab189dabdb7dfd6470d90f8e40db8
                          • Instruction Fuzzy Hash: 0FB1AF75A0822A9FDB10DFA4E885BBEB7F4FF09324F215069E990F7241D7749941CBA0
                          APIs
                          • __swprintf.LIBCMT ref: 00E2419D
                          • __swprintf.LIBCMT ref: 00E241AA
                            • Part of subcall function 00DE38D8: __woutput_l.LIBCMT ref: 00DE3931
                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 00E241D4
                          • LoadResource.KERNEL32(?,00000000), ref: 00E241E0
                          • LockResource.KERNEL32(00000000), ref: 00E241ED
                          • FindResourceW.KERNEL32(?,?,00000003), ref: 00E2420D
                          • LoadResource.KERNEL32(?,00000000), ref: 00E2421F
                          • SizeofResource.KERNEL32(?,00000000), ref: 00E2422E
                          • LockResource.KERNEL32(?), ref: 00E2423A
                          • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00E2429B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                          • String ID:
                          • API String ID: 1433390588-0
                          • Opcode ID: d5e1b6eb5d0349f3f0af5982ce39930888d8ebb912a0c85377a8c560b30a1d3f
                          • Instruction ID: f3ab323f4370f484c8cf76a1a0ebdc659822ed8edee22f36a5315471b720d723
                          • Opcode Fuzzy Hash: d5e1b6eb5d0349f3f0af5982ce39930888d8ebb912a0c85377a8c560b30a1d3f
                          • Instruction Fuzzy Hash: B43182B650522AAFDB119FA2EC48EBF7BACEF05705F004525F905F21A0D770DA618BB4
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00E21700
                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00E20778,?,00000001), ref: 00E21714
                          • GetWindowThreadProcessId.USER32(00000000), ref: 00E2171B
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E20778,?,00000001), ref: 00E2172A
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E2173C
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E20778,?,00000001), ref: 00E21755
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E20778,?,00000001), ref: 00E21767
                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00E20778,?,00000001), ref: 00E217AC
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00E20778,?,00000001), ref: 00E217C1
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00E20778,?,00000001), ref: 00E217CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                          • String ID:
                          • API String ID: 2156557900-0
                          • Opcode ID: ba01f7d8ef81e1cde5e4ad0c5d4b1fa5ed05126293958edf2a18b9737b5b4cc4
                          • Instruction ID: 7dea5563c36a3678f53da0f3be29e813b951275b16f7550f1e7acd27ccb08b53
                          • Opcode Fuzzy Hash: ba01f7d8ef81e1cde5e4ad0c5d4b1fa5ed05126293958edf2a18b9737b5b4cc4
                          • Instruction Fuzzy Hash: B531C375600214BFEB119F16EC84F7A37E9EBA6B15F2140A6F904F62A0D774DE48CB60
                          APIs
                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00DCFC06
                          • OleUninitialize.OLE32(?,00000000), ref: 00DCFCA5
                          • UnregisterHotKey.USER32(?), ref: 00DCFDFC
                          • DestroyWindow.USER32(?), ref: 00E04A00
                          • FreeLibrary.KERNEL32(?), ref: 00E04A65
                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E04A92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                          • String ID: close all
                          • API String ID: 469580280-3243417748
                          • Opcode ID: 884aa6eca17a34b69246ea5e981b65816a94a978f390aa5fc5d36f0d7e4cf673
                          • Instruction ID: 3eb6c353c55ee127bdfbc7dfd042099f5b050ee6b2f9f72ae351898b7ef21398
                          • Opcode Fuzzy Hash: 884aa6eca17a34b69246ea5e981b65816a94a978f390aa5fc5d36f0d7e4cf673
                          • Instruction Fuzzy Hash: CAA16AB07012128FCB29EF55C594F69F7A5EF04700F1452ADE90AAB2A2DB30ED56CF64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$_memset
                          • String ID: ,,$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                          • API String ID: 2862541840-218231672
                          • Opcode ID: 72230b9b50dc436e5db87e2abdb5c20c38a944564d6f5f81b19ac2578019065c
                          • Instruction ID: 5df22b40517a769f89f56fada94fdc6c2b0ae1dafee8ded9aba59e35759d3b4b
                          • Opcode Fuzzy Hash: 72230b9b50dc436e5db87e2abdb5c20c38a944564d6f5f81b19ac2578019065c
                          • Instruction Fuzzy Hash: 3791E071A00215AFDF24DFA5C889FAEBBB8EF85314F109059F515BB282D7B09945CFA0
                          APIs
                          • EnumChildWindows.USER32(?,00E1AA64), ref: 00E1A9A2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ChildEnumWindows
                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                          • API String ID: 3555792229-1603158881
                          • Opcode ID: 17421a25e25b5598a8991215ae0ff5d86f281f9c7d959fe9a3ea7e2fef7b4219
                          • Instruction ID: f1a2ad53aac47006d5770cc25213f79cbf30f4f062adb95a8d65d0738fe7afab
                          • Opcode Fuzzy Hash: 17421a25e25b5598a8991215ae0ff5d86f281f9c7d959fe9a3ea7e2fef7b4219
                          • Instruction Fuzzy Hash: BB919230601646AADB08EF60D482BF9FB75FF44314F189129D89AB7151DB306AD9CBB1
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E31D44
                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00E31D70
                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00E31DB2
                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00E31DC7
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E31DD4
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00E31E04
                          • InternetCloseHandle.WININET(00000000), ref: 00E31E4B
                            • Part of subcall function 00E32777: GetLastError.KERNEL32(?,?,00E31B0B,00000000,00000000,00000001), ref: 00E3278C
                            • Part of subcall function 00E32777: SetEvent.KERNEL32(?,?,00E31B0B,00000000,00000000,00000001), ref: 00E327A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                          • String ID:
                          • API String ID: 2603140658-3916222277
                          • Opcode ID: 017c1783dadc15a0cec08858ea0b14b519b2655cad8f8d186531554400b96f3e
                          • Instruction ID: 7ea0e69e5fd64f20020d7367cf37b43215096a1df6f75d1070ad249b184eb8cb
                          • Opcode Fuzzy Hash: 017c1783dadc15a0cec08858ea0b14b519b2655cad8f8d186531554400b96f3e
                          • Instruction Fuzzy Hash: 9A418AB5500208BFEB129F51CC89FFB7BACEF09754F00516AFA05AA240D7759E45CBA0
                          APIs
                          • _memset.LIBCMT ref: 00E3F9C9
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E3FB5C
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00E3FB80
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E3FBC0
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00E3FBE2
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E3FD5E
                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00E3FD90
                          • CloseHandle.KERNEL32(?), ref: 00E3FDBF
                          • CloseHandle.KERNEL32(?), ref: 00E3FE36
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                          • String ID:
                          • API String ID: 4090791747-0
                          • Opcode ID: 41f18fbfd4aaff036f8a8028270b05f101b82708e72711c8119abda95f9d0431
                          • Instruction ID: a932ef4352a9afe7deb3921c38ee12b03965daa3668b5d3b58c1bb0c1b6e0784
                          • Opcode Fuzzy Hash: 41f18fbfd4aaff036f8a8028270b05f101b82708e72711c8119abda95f9d0431
                          • Instruction Fuzzy Hash: 74E1C331604341DFCB14EF25C899B6ABBE1EF84714F14956DF899AB2A2CB30DC45CB62
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00E4896E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID:
                          • API String ID: 634782764-0
                          • Opcode ID: 629babccd5cbc53cbf9fcc1c0a05815e4a986a124071c0eb8f471a5f008a2635
                          • Instruction ID: c949a33e1531fe21ba58ad1c66a66dc20327e7f3f2cd403a47bf6435ec7d68cd
                          • Opcode Fuzzy Hash: 629babccd5cbc53cbf9fcc1c0a05815e4a986a124071c0eb8f471a5f008a2635
                          • Instruction Fuzzy Hash: F651E530500204BFDF349F25EE85BAD7BA5FB05354F606116F614F65A0CFB1A980DB91
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00DFC547
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00DFC569
                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00DFC581
                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00DFC59F
                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00DFC5C0
                          • DestroyIcon.USER32(00000000), ref: 00DFC5CF
                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00DFC5EC
                          • DestroyIcon.USER32(?), ref: 00DFC5FB
                            • Part of subcall function 00E4A71E: DeleteObject.GDI32(00000000), ref: 00E4A757
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                          • String ID:
                          • API String ID: 2819616528-0
                          • Opcode ID: 33845584564ec560bf309182f46193a1f60c313558ed3147709971df7d61a307
                          • Instruction ID: 5db5a018e1836ff62533ef81c97d335698f04dd4119bfecaef92586dc0ac9f44
                          • Opcode Fuzzy Hash: 33845584564ec560bf309182f46193a1f60c313558ed3147709971df7d61a307
                          • Instruction Fuzzy Hash: B1519874A1020AAFDB24DF25DC45FBA3BB5EB48720F14452CF946A72A0DB70ED90DB60
                          APIs
                            • Part of subcall function 00E1AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E1AE77
                            • Part of subcall function 00E1AE57: GetCurrentThreadId.KERNEL32 ref: 00E1AE7E
                            • Part of subcall function 00E1AE57: AttachThreadInput.USER32(00000000,?,00E19B65,?,00000001), ref: 00E1AE85
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E19B70
                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00E19B8D
                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00E19B90
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E19B99
                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00E19BB7
                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00E19BBA
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E19BC3
                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00E19BDA
                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00E19BDD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                          • String ID:
                          • API String ID: 2014098862-0
                          • Opcode ID: 2168c2f53b5885f18a615e6361ce16f6ac37ef12217a1ed3ef3eb47434941d9d
                          • Instruction ID: e906dd2ff043f0a4b175d6d71fe5dfa538a7bd187e95457c410a4fba7501660f
                          • Opcode Fuzzy Hash: 2168c2f53b5885f18a615e6361ce16f6ac37ef12217a1ed3ef3eb47434941d9d
                          • Instruction Fuzzy Hash: 9D1144B5940208BEF6102F21DC89FAA3F6CEB0DB51F110425F204BB1A1C9F35C91DAA4
                          APIs
                            • Part of subcall function 00E17652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?,?,?,00E1799D), ref: 00E1766F
                            • Part of subcall function 00E17652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?,?), ref: 00E1768A
                            • Part of subcall function 00E17652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?,?), ref: 00E17698
                            • Part of subcall function 00E17652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?), ref: 00E176A8
                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00E39B1B
                          • _memset.LIBCMT ref: 00E39B28
                          • _memset.LIBCMT ref: 00E39C6B
                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00E39C97
                          • CoTaskMemFree.OLE32(?), ref: 00E39CA2
                          Strings
                          • NULL Pointer assignment, xrefs: 00E39CF0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                          • String ID: NULL Pointer assignment
                          • API String ID: 1300414916-2785691316
                          • Opcode ID: d8a95db168dc407eb8a1cb0eb0a18d4517f04157e55c0dda7351a57c24c18ab0
                          • Instruction ID: bc49d688db7592d862527a3b576b304ccf445d6f41164eba5ba3a6a4c7c3c8b3
                          • Opcode Fuzzy Hash: d8a95db168dc407eb8a1cb0eb0a18d4517f04157e55c0dda7351a57c24c18ab0
                          • Instruction Fuzzy Hash: 1C910771D00229ABDB10DFA5DC85EDEBBB9EF08710F20415AF519B7281DB716A45CFA0
                          APIs
                            • Part of subcall function 00E23E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00E23EB6
                            • Part of subcall function 00E23E91: Process32FirstW.KERNEL32(00000000,?), ref: 00E23EC4
                            • Part of subcall function 00E23E91: CloseHandle.KERNEL32(00000000), ref: 00E23F8E
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E3ECB8
                          • GetLastError.KERNEL32 ref: 00E3ECCB
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00E3ECFA
                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00E3ED77
                          • GetLastError.KERNEL32(00000000), ref: 00E3ED82
                          • CloseHandle.KERNEL32(00000000), ref: 00E3EDB7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                          • String ID: SeDebugPrivilege
                          • API String ID: 2533919879-2896544425
                          • Opcode ID: aff39694c0c371b33ffa66b4dcd7a351c29adcc206b1a6d4025eb712e812c678
                          • Instruction ID: fee3d50522ee76d276dc925cd14a13ceec78837eb209c5c11acf67ca38dedcc2
                          • Opcode Fuzzy Hash: aff39694c0c371b33ffa66b4dcd7a351c29adcc206b1a6d4025eb712e812c678
                          • Instruction Fuzzy Hash: 42419E712002019FDB15EF24C899F6EBBA1AF40714F088459F846AB3C2DBB5A849CBA1
                          APIs
                          • LoadIconW.USER32(00000000,00007F03), ref: 00E232C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: IconLoad
                          • String ID: blank$info$question$stop$warning
                          • API String ID: 2457776203-404129466
                          • Opcode ID: 9f29109feeda4ce8c20646e0d7f97de0e4a7143c8f2fc3364610273be822ae90
                          • Instruction ID: 7e252cd8d5aa803d718f78e1ab7dbf86a0ea338dc7b05ab4283431bc8373349b
                          • Opcode Fuzzy Hash: 9f29109feeda4ce8c20646e0d7f97de0e4a7143c8f2fc3364610273be822ae90
                          • Instruction Fuzzy Hash: C91127332083A6FAE7056B65FC42CAEB3DCDF19774F20102AF504B6192E6A96B404DB5
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E2454E
                          • LoadStringW.USER32(00000000), ref: 00E24555
                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E2456B
                          • LoadStringW.USER32(00000000), ref: 00E24572
                          • _wprintf.LIBCMT ref: 00E24598
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E245B6
                          Strings
                          • %s (%d) : ==> %s: %s %s, xrefs: 00E24593
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString$Message_wprintf
                          • String ID: %s (%d) : ==> %s: %s %s
                          • API String ID: 3648134473-3128320259
                          • Opcode ID: 54caf658e16f764c195cfcfa79a86a9795663913557ce060a19e30dfde20f37f
                          • Instruction ID: de29a3fc3d7535bb8bd716e305b0c56e194cb086bbcc5d72aa5ca689271055c3
                          • Opcode Fuzzy Hash: 54caf658e16f764c195cfcfa79a86a9795663913557ce060a19e30dfde20f37f
                          • Instruction Fuzzy Hash: E7014FF6900218BFE710E7A59D89EE7776CDB08701F0005A5FB49F2152EA749E8A8B70
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • GetSystemMetrics.USER32(0000000F), ref: 00E4D78A
                          • GetSystemMetrics.USER32(0000000F), ref: 00E4D7AA
                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00E4D9E5
                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00E4DA03
                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00E4DA24
                          • ShowWindow.USER32(00000003,00000000), ref: 00E4DA43
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E4DA68
                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00E4DA8B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                          • String ID:
                          • API String ID: 1211466189-0
                          • Opcode ID: c73826263a4300b4e08e3c56af7b33daf3f07df93aa074b665d4bde39e5fc51e
                          • Instruction ID: 463ed97cfc29d91d34a5f49d017d5bd1e2ad76a31db44bb98edc28c1d7e6308e
                          • Opcode Fuzzy Hash: c73826263a4300b4e08e3c56af7b33daf3f07df93aa074b665d4bde39e5fc51e
                          • Instruction Fuzzy Hash: B2B1B931604225EFDF18CF69D9897BD7BB1FF48704F08906AED48AB295D734A950CBA0
                          APIs
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00DFC417,00000004,00000000,00000000,00000000), ref: 00DC2ACF
                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00DFC417,00000004,00000000,00000000,00000000,000000FF), ref: 00DC2B17
                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00DFC417,00000004,00000000,00000000,00000000), ref: 00DFC46A
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00DFC417,00000004,00000000,00000000,00000000), ref: 00DFC4D6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ShowWindow
                          • String ID:
                          • API String ID: 1268545403-0
                          • Opcode ID: 2634ff31b5000a9441e996304f3030927a3fd177de58da8962fa9d2d4300c4c6
                          • Instruction ID: 5dec6f2bd67ea202fceb33d86be5cb70a68cae359bf5b9b571640ea6b540f7f4
                          • Opcode Fuzzy Hash: 2634ff31b5000a9441e996304f3030927a3fd177de58da8962fa9d2d4300c4c6
                          • Instruction Fuzzy Hash: 854128302146869EC7398B299D9CF7B3BA2AF86310F1DC81DE18BD75A0C675E856D730
                          APIs
                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00E2737F
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                            • Part of subcall function 00DE0FF6: std::exception::exception.LIBCMT ref: 00DE102C
                            • Part of subcall function 00DE0FF6: __CxxThrowException@8.LIBCMT ref: 00DE1041
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00E273B6
                          • EnterCriticalSection.KERNEL32(?), ref: 00E273D2
                          • _memmove.LIBCMT ref: 00E27420
                          • _memmove.LIBCMT ref: 00E2743D
                          • LeaveCriticalSection.KERNEL32(?), ref: 00E2744C
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00E27461
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E27480
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrow_mallocstd::exception::exception
                          • String ID:
                          • API String ID: 3094542793-0
                          • Opcode ID: 9a16202cda753c127a36f6074faa4746ad30fece56601ebdd54e35000669e513
                          • Instruction ID: ae1e818638874146054e8f31e7779c01a30164182c009d3b7bac9210e011b8b7
                          • Opcode Fuzzy Hash: 9a16202cda753c127a36f6074faa4746ad30fece56601ebdd54e35000669e513
                          • Instruction Fuzzy Hash: AE31BA36A04205EFCF10EF66DC85AAFBBB8EF45710B1440A5F904AB256DB70DA54CBB0
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 00E4645A
                          • GetDC.USER32(00000000), ref: 00E46462
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E4646D
                          • ReleaseDC.USER32(00000000,00000000), ref: 00E46479
                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00E464B5
                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00E464C6
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00E49299,?,?,000000FF,00000000,?,000000FF,?), ref: 00E46500
                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00E46520
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                          • String ID:
                          • API String ID: 3864802216-0
                          • Opcode ID: 7644b319bb20a5dfed483ed40025add7fa8976e16f0586fa5e3314b82c03eb4c
                          • Instruction ID: 74950ff54bebe326d35e6d76b7ba95a796a19fedc54a830f301ba5578cbb709c
                          • Opcode Fuzzy Hash: 7644b319bb20a5dfed483ed40025add7fa8976e16f0586fa5e3314b82c03eb4c
                          • Instruction Fuzzy Hash: 7E319176201210BFEF108F51DC49FEB3FA9EF4A765F050065FE08AA191C6759C42CBA0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: dc772621cd8f864ef515af9c019135457c7a635c4f1a7369936ac3be7832444f
                          • Instruction ID: b336449fd0a9ba94932f145175a8e7cee0ddbe1397fb3fba4f16fce38aaf5ce5
                          • Opcode Fuzzy Hash: dc772621cd8f864ef515af9c019135457c7a635c4f1a7369936ac3be7832444f
                          • Instruction Fuzzy Hash: CD21C5767C1305B7D210B5218C42FEB23ACEF15399B242028FE09F6283E761DD55C2B6
                          APIs
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                            • Part of subcall function 00DDFEC6: _wcscpy.LIBCMT ref: 00DDFEE9
                          • _wcstok.LIBCMT ref: 00E2EEFF
                          • _wcscpy.LIBCMT ref: 00E2EF8E
                          • _memset.LIBCMT ref: 00E2EFC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                          • String ID: X
                          • API String ID: 774024439-3081909835
                          • Opcode ID: 2c0373b98b1845464b536fc7eb39a409228af53783f858358a4eb8a4c47a82df
                          • Instruction ID: 4ab8f0d8e722325603aa938cba3d3b1e2d989587eb8a20aed5ce54f1e6bc4207
                          • Opcode Fuzzy Hash: 2c0373b98b1845464b536fc7eb39a409228af53783f858358a4eb8a4c47a82df
                          • Instruction Fuzzy Hash: B7C1AF316083519FD724EF24D995E5AB7E4FF84314F00492DF899AB2A2DB30ED45CBA2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 52b7b42cb65c9e5f8dad0cc539310a556fa8013dd2fd57ea9dd3be426d8cf8f6
                          • Instruction ID: c023e70d1d4a52a7bc4bf21f752acfd3a0d993fcc4b91be944f056ca72d52d7e
                          • Opcode Fuzzy Hash: 52b7b42cb65c9e5f8dad0cc539310a556fa8013dd2fd57ea9dd3be426d8cf8f6
                          • Instruction Fuzzy Hash: 9E714B3890411AEFCB049F58C845EBEBB79FF86324F248159F915AB252C734AA51CFB4
                          APIs
                          • IsWindow.USER32(01304CB0), ref: 00E4B6A5
                          • IsWindowEnabled.USER32(01304CB0), ref: 00E4B6B1
                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00E4B795
                          • SendMessageW.USER32(01304CB0,000000B0,?,?), ref: 00E4B7CC
                          • IsDlgButtonChecked.USER32(?,?), ref: 00E4B809
                          • GetWindowLongW.USER32(01304CB0,000000EC), ref: 00E4B82B
                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00E4B843
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                          • String ID:
                          • API String ID: 4072528602-0
                          • Opcode ID: b7b8b356100c64cc7674248a83de4b49ebb2fc372ccc16213c47ccb39b853bb7
                          • Instruction ID: ed42d88f36e028eeca0616da8357eb7bbfd3bb18c020a2646f79b33747645c02
                          • Opcode Fuzzy Hash: b7b8b356100c64cc7674248a83de4b49ebb2fc372ccc16213c47ccb39b853bb7
                          • Instruction Fuzzy Hash: F671BE34A00204AFDB249F65E898FAA7BB9FF89304F1551AAF949B7261C731E941CB50
                          APIs
                          • _memset.LIBCMT ref: 00E3F75C
                          • _memset.LIBCMT ref: 00E3F825
                          • ShellExecuteExW.SHELL32(?), ref: 00E3F86A
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                            • Part of subcall function 00DDFEC6: _wcscpy.LIBCMT ref: 00DDFEE9
                          • GetProcessId.KERNEL32(00000000), ref: 00E3F8E1
                          • CloseHandle.KERNEL32(00000000), ref: 00E3F910
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                          • String ID: @
                          • API String ID: 3522835683-2766056989
                          • Opcode ID: 4010d098dba53c20ba48ccc0c614b2df4a5c21bfbdf38a0a9628f78a8c662e0d
                          • Instruction ID: fff7abb672548c1eb4b2f06408ca816d13e9d3e65b71335ac605b3ccb04cf8e1
                          • Opcode Fuzzy Hash: 4010d098dba53c20ba48ccc0c614b2df4a5c21bfbdf38a0a9628f78a8c662e0d
                          • Instruction Fuzzy Hash: 2B619E75E006199FCB18EF65C499AADBBB1FF48310F14846DE84ABB351CB30AD41CBA0
                          APIs
                          • GetParent.USER32(?), ref: 00E2149C
                          • GetKeyboardState.USER32(?), ref: 00E214B1
                          • SetKeyboardState.USER32(?), ref: 00E21512
                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E21540
                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E2155F
                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E215A5
                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E215C8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 7c6630cbceb1ea23e939b8db73fb6129a401b1e52a340cb0a4792349cba7fa64
                          • Instruction ID: 3aa9cca3c073b8cc97bb7e662cf59785b70439de040bb173a446382044b1398f
                          • Opcode Fuzzy Hash: 7c6630cbceb1ea23e939b8db73fb6129a401b1e52a340cb0a4792349cba7fa64
                          • Instruction Fuzzy Hash: A15104A0A447E53EFB3246349C05BBA7EE95B56308F0C54C9E1D9658C2C3E8DEC4D750
                          APIs
                          • GetParent.USER32(00000000), ref: 00E212B5
                          • GetKeyboardState.USER32(?), ref: 00E212CA
                          • SetKeyboardState.USER32(?), ref: 00E2132B
                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E21357
                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E21374
                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E213B8
                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E213D9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 8a72f88718ffe3962e1a9ef71d5ffb38cd8093a09726285c179b8a1e88ad517e
                          • Instruction ID: 55f11056aff209d66c52adccbe898fba429e6b46df46c5766c61e3f6a2f246b4
                          • Opcode Fuzzy Hash: 8a72f88718ffe3962e1a9ef71d5ffb38cd8093a09726285c179b8a1e88ad517e
                          • Instruction Fuzzy Hash: 2A5139A05043E57DFB3287249C05B7A7FAA5F17308F0854C9F1D8668C2D395EE88E760
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _wcsncpy$LocalTime
                          • String ID:
                          • API String ID: 2945705084-0
                          • Opcode ID: 15ddd74b802ee4fe7fdcc25098123735c90a84b93941449c6eb3c64aa9d62f64
                          • Instruction ID: a5abb4d583352b4bc32723fa249efaceaf91b93674959ca4aff7a95103bf7a22
                          • Opcode Fuzzy Hash: 15ddd74b802ee4fe7fdcc25098123735c90a84b93941449c6eb3c64aa9d62f64
                          • Instruction Fuzzy Hash: EA41AFAAC2026876CB11FBB5888B9DFB3ACDF04710F509866F518E3121E634E714C7B9
                          APIs
                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00E1DAC5
                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00E1DAFB
                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00E1DB0C
                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00E1DB8E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorMode$AddressCreateInstanceProc
                          • String ID: ,,$DllGetClassObject
                          • API String ID: 753597075-2867008933
                          • Opcode ID: 02446b430e9583f939536bf5259774f20fd413c73481fb24b240f6261d23ef74
                          • Instruction ID: 290ff33dea09c85473f5a004c635c54e126aa2356f39d1bbe8555f6ebc368db0
                          • Opcode Fuzzy Hash: 02446b430e9583f939536bf5259774f20fd413c73481fb24b240f6261d23ef74
                          • Instruction Fuzzy Hash: 5D418FB1608208EFDB15CF55CC84EDABBA9EF44310F1591A9ED06AF206D7B1DD84CBA0
                          APIs
                            • Part of subcall function 00E248AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E238D3,?), ref: 00E248C7
                            • Part of subcall function 00E248AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E238D3,?), ref: 00E248E0
                          • lstrcmpiW.KERNEL32(?,?), ref: 00E238F3
                          • _wcscmp.LIBCMT ref: 00E2390F
                          • MoveFileW.KERNEL32(?,?), ref: 00E23927
                          • _wcscat.LIBCMT ref: 00E2396F
                          • SHFileOperationW.SHELL32(?), ref: 00E239DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                          • String ID: \*.*
                          • API String ID: 1377345388-1173974218
                          • Opcode ID: bfc3d8f9fd9e7273d9ac594d44256b7719fb73a557af9ba6f2db1b1b8944337f
                          • Instruction ID: 52abe5b3d2cb241b2b99621089335615584f6f1eec511fd9479070e8922f140f
                          • Opcode Fuzzy Hash: bfc3d8f9fd9e7273d9ac594d44256b7719fb73a557af9ba6f2db1b1b8944337f
                          • Instruction Fuzzy Hash: 084183B15083949EC751EF64D441AEFB7ECEF89340F00192EF489E3151EA74D688CB62
                          APIs
                          • _memset.LIBCMT ref: 00E47519
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E475C0
                          • IsMenu.USER32(?), ref: 00E475D8
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00E47620
                          • DrawMenuBar.USER32 ref: 00E47633
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Menu$Item$DrawInfoInsert_memset
                          • String ID: 0
                          • API String ID: 3866635326-4108050209
                          • Opcode ID: 6c0760203d542ce5a226afe9c9d5b2176116396570fe880e8528ddb85b3291e3
                          • Instruction ID: 61abbeb9c34dab9a3c4a94db876bd5bf1c43199cdb1cb74ce66cd916ab794578
                          • Opcode Fuzzy Hash: 6c0760203d542ce5a226afe9c9d5b2176116396570fe880e8528ddb85b3291e3
                          • Instruction Fuzzy Hash: AF416974A04608EFDB10DF55E884E9ABBF9FB04314F058069ED99AB250D730AD44CFE0
                          APIs
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00E4125C
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E41286
                          • FreeLibrary.KERNEL32(00000000), ref: 00E4133D
                            • Part of subcall function 00E4122D: RegCloseKey.ADVAPI32(?), ref: 00E412A3
                            • Part of subcall function 00E4122D: FreeLibrary.KERNEL32(?), ref: 00E412F5
                            • Part of subcall function 00E4122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00E41318
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00E412E0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                          • String ID:
                          • API String ID: 395352322-0
                          • Opcode ID: 7b60beb70e7d591b2200118638b8f0ff19c29994a92c91e1df0fad669a15d7b7
                          • Instruction ID: 4b406f84cef87f3e2f94fbcd43bf80b52102351ebfe02beb16c38fb1c6034515
                          • Opcode Fuzzy Hash: 7b60beb70e7d591b2200118638b8f0ff19c29994a92c91e1df0fad669a15d7b7
                          • Instruction Fuzzy Hash: 11314BB5901119BFDF149F91EC89EFEB7BCEF09304F0001A9E501F2151EA74AE899AA4
                          APIs
                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00E4655B
                          • GetWindowLongW.USER32(01304CB0,000000F0), ref: 00E4658E
                          • GetWindowLongW.USER32(01304CB0,000000F0), ref: 00E465C3
                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00E465F5
                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00E4661F
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00E46630
                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00E4664A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend
                          • String ID:
                          • API String ID: 2178440468-0
                          • Opcode ID: 107049982258426b811b462b66958391a478c964fe4ef7c608dbe45d4271df9a
                          • Instruction ID: ab6e3e1f777897b23b6ada3ba0096e492a7f20b66e0d8ef62365e8dcf387c179
                          • Opcode Fuzzy Hash: 107049982258426b811b462b66958391a478c964fe4ef7c608dbe45d4271df9a
                          • Instruction Fuzzy Hash: AF313534604210AFDB20CF19EC84F553BE1FB4A718F1A11A8F509AB2B5CB75EC44DB82
                          APIs
                            • Part of subcall function 00E380A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E380CB
                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00E364D9
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E364E8
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00E36521
                          • connect.WSOCK32(00000000,?,00000010), ref: 00E3652A
                          • WSAGetLastError.WSOCK32 ref: 00E36534
                          • closesocket.WSOCK32(00000000), ref: 00E3655D
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00E36576
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                          • String ID:
                          • API String ID: 910771015-0
                          • Opcode ID: 1428352cdca54f5c842c4c996182bfe17451cb9c157494e180ee37865b18b6ac
                          • Instruction ID: df181c043a13bdbb716aad8b2888805c019abc7a2a68dde695eee841a8c84d67
                          • Opcode Fuzzy Hash: 1428352cdca54f5c842c4c996182bfe17451cb9c157494e180ee37865b18b6ac
                          • Instruction Fuzzy Hash: 8231A135600218BFDB109F24DC89FBE7BA8EB45714F018029F909BB291DB74AD09CB61
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E1E0FA
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E1E120
                          • SysAllocString.OLEAUT32(00000000), ref: 00E1E123
                          • SysAllocString.OLEAUT32 ref: 00E1E144
                          • SysFreeString.OLEAUT32 ref: 00E1E14D
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00E1E167
                          • SysAllocString.OLEAUT32(?), ref: 00E1E175
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: 71081a435345d3cd69de0e71218e3f42c3e29a671735c7eff27bdbe137181ab3
                          • Instruction ID: 860ee337807efc06942db9c118b1dc5689225588ee879a98ac04a0f3c9d9e22f
                          • Opcode Fuzzy Hash: 71081a435345d3cd69de0e71218e3f42c3e29a671735c7eff27bdbe137181ab3
                          • Instruction Fuzzy Hash: 16217136705108BF9B10AFA9DC88CEB77ECEB09760B508125FD15EB360DA70DC858B64
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                          • API String ID: 1038674560-2734436370
                          • Opcode ID: 6a5c87e341363f8abecd66581ef72e0952088e62477940d6b160827dd5d86b8a
                          • Instruction ID: ae58b42b71e3396f66eeaaad6c42c86d757d1fb9fd297a4a3152ad580213be1c
                          • Opcode Fuzzy Hash: 6a5c87e341363f8abecd66581ef72e0952088e62477940d6b160827dd5d86b8a
                          • Instruction Fuzzy Hash: A92167B2208251A6D330F621DC12EF7B398EF51344F54543AF886A7141EB50ADC2E3F9
                          APIs
                            • Part of subcall function 00DC1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DC1D73
                            • Part of subcall function 00DC1D35: GetStockObject.GDI32(00000011), ref: 00DC1D87
                            • Part of subcall function 00DC1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DC1D91
                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00E478A1
                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00E478AE
                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00E478B9
                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00E478C8
                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00E478D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$CreateObjectStockWindow
                          • String ID: Msctls_Progress32
                          • API String ID: 1025951953-3636473452
                          • Opcode ID: d04ae392f7e391113d2560df9b1de753a00b8b478400cc0e953c8b845f02e77d
                          • Instruction ID: a027717172a8d1cf6bf80f625fef8f080c34b391657a6207f713e38add7043c1
                          • Opcode Fuzzy Hash: d04ae392f7e391113d2560df9b1de753a00b8b478400cc0e953c8b845f02e77d
                          • Instruction Fuzzy Hash: 64118EB2510229BFEF159E60CC85EE77F6DEF0C798F015115FA48A6090C7729C21DBA0
                          APIs
                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00DE4292,?), ref: 00DE41E3
                          • GetProcAddress.KERNEL32(00000000), ref: 00DE41EA
                          • EncodePointer.KERNEL32(00000000), ref: 00DE41F6
                          • DecodePointer.KERNEL32(00000001,00DE4292,?), ref: 00DE4213
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                          • String ID: RoInitialize$combase.dll
                          • API String ID: 3489934621-340411864
                          • Opcode ID: b2d3799b608db49b48e3cdd1484191a797e98a7263d514dce6db70c7dc76131b
                          • Instruction ID: 2131053e9f5418b47d01569d5bbf08897ef6e18770a0bc105b61cd472abebf95
                          • Opcode Fuzzy Hash: b2d3799b608db49b48e3cdd1484191a797e98a7263d514dce6db70c7dc76131b
                          • Instruction Fuzzy Hash: 35E0EDB45913419FEB216F73EC0DB0436A4BB52B42F504424F555F50E0DBB5409E8B14
                          APIs
                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00DE41B8), ref: 00DE42B8
                          • GetProcAddress.KERNEL32(00000000), ref: 00DE42BF
                          • EncodePointer.KERNEL32(00000000), ref: 00DE42CA
                          • DecodePointer.KERNEL32(00DE41B8), ref: 00DE42E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                          • String ID: RoUninitialize$combase.dll
                          • API String ID: 3489934621-2819208100
                          • Opcode ID: 7cf493eb058980f3c87ae31335956d2c21520b32f0a814a880b0227857b0d41c
                          • Instruction ID: 2f26160e7c4bb1ca3149294b7877ebfd2330ba9c592abfe63ec6c36afb62cf44
                          • Opcode Fuzzy Hash: 7cf493eb058980f3c87ae31335956d2c21520b32f0a814a880b0227857b0d41c
                          • Instruction Fuzzy Hash: 0FE09ABC5427019FEA109F62EC0DB053AA4F715F46F145428F505F11E0DBB4454D8B18
                          APIs
                          • GetClientRect.USER32(?,?), ref: 00DC1DDC
                          • GetWindowRect.USER32(?,?), ref: 00DC1E1D
                          • ScreenToClient.USER32(?,?), ref: 00DC1E45
                          • GetClientRect.USER32(?,?), ref: 00DC1F74
                          • GetWindowRect.USER32(?,?), ref: 00DC1F8D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Rect$Client$Window$Screen
                          • String ID:
                          • API String ID: 1296646539-0
                          • Opcode ID: c8e611a586a44719b1c791fd01d8f2b06786f546a22d3173b8a11aa60d32fec0
                          • Instruction ID: b9a622e153d8facfdf9fc1183c8d091ecba4d71d3c0f3a6727f21635fcfb837f
                          • Opcode Fuzzy Hash: c8e611a586a44719b1c791fd01d8f2b06786f546a22d3173b8a11aa60d32fec0
                          • Instruction Fuzzy Hash: DBB15C7990024ADBDF10CFA9C480BEEB7B1FF09310F18956AED99DB251DB30A950CB65
                          APIs
                          • _memmove.LIBCMT ref: 00E268AD
                          • _memmove.LIBCMT ref: 00E267E8
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • _memmove.LIBCMT ref: 00E2685B
                          • _memmove.LIBCMT ref: 00E26942
                          • _memmove.LIBCMT ref: 00E2695B
                          • _memmove.LIBCMT ref: 00E26977
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memmove$__itow__swprintf_malloc
                          • String ID:
                          • API String ID: 83262069-0
                          • Opcode ID: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                          • Instruction ID: 7d08fb2dfea5dde60c205e130ca9c01118668a40b7139f1b625788f090fc448f
                          • Opcode Fuzzy Hash: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                          • Instruction Fuzzy Hash: 39619A315002AAABCF15EF20D896FFE77A5EF44708F044659F8596B192DE34AD42CBB0
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E410A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E40038,?,?), ref: 00E410BC
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E40548
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E40588
                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00E405AB
                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00E405D4
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00E40617
                          • RegCloseKey.ADVAPI32(00000000), ref: 00E40624
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_malloc_memmove
                          • String ID:
                          • API String ID: 1251895206-0
                          • Opcode ID: faee0559b66a9b5da224fbc546310df99e626def31848d91ba8d0470995e01a7
                          • Instruction ID: bb7e5c60a7961a1bffcc1fc9df6085143eb5fe885cf82121f9e62d9b12add117
                          • Opcode Fuzzy Hash: faee0559b66a9b5da224fbc546310df99e626def31848d91ba8d0470995e01a7
                          • Instruction Fuzzy Hash: FC517A31208241AFCB10EF64D885E6FBBE8FF89714F04496DF545A72A1DB31E945CB62
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • GetMenu.USER32(?), ref: 00E45A82
                          • GetMenuItemCount.USER32(00000000), ref: 00E45AB9
                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00E45AE1
                          • GetMenuItemID.USER32(?,?), ref: 00E45B50
                          • GetSubMenu.USER32(?,?), ref: 00E45B5E
                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00E45BAF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Menu$Item$CountMessagePostString_malloc
                          • String ID:
                          • API String ID: 1778855708-0
                          • Opcode ID: e419dd9c5bea21492ac41a70ced19178c23cd9827b860dde4868abc51a3ae15c
                          • Instruction ID: dfe8c204554cb891763152803676c17b33de534599be61ced945714c1d10d5f1
                          • Opcode Fuzzy Hash: e419dd9c5bea21492ac41a70ced19178c23cd9827b860dde4868abc51a3ae15c
                          • Instruction Fuzzy Hash: 0D518136A00615EFCF15EFA5D845AAEB7B4EF48710F104469E815BB352CB70AE41CBA0
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00E1F3F7
                          • VariantClear.OLEAUT32(00000013), ref: 00E1F469
                          • VariantClear.OLEAUT32(00000000), ref: 00E1F4C4
                          • _memmove.LIBCMT ref: 00E1F4EE
                          • VariantClear.OLEAUT32(?), ref: 00E1F53B
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E1F569
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeInitType_memmove
                          • String ID:
                          • API String ID: 1101466143-0
                          • Opcode ID: 82d91dafc10058a50f6db8de0d13723c0cd73382537c7f6e785c8cb76491042e
                          • Instruction ID: b9d853c913d5ff0236bdd9393874acc35a3ca02f8f23e0b49cdce93e95c959b6
                          • Opcode Fuzzy Hash: 82d91dafc10058a50f6db8de0d13723c0cd73382537c7f6e785c8cb76491042e
                          • Instruction Fuzzy Hash: 175168B5A00209EFCB14CF58D880AAAB7F9FF4C314B158169E959EB300D730E952CBA0
                          APIs
                            • Part of subcall function 00DC5045: _fseek.LIBCMT ref: 00DC505D
                            • Part of subcall function 00E299BE: _wcscmp.LIBCMT ref: 00E29AAE
                            • Part of subcall function 00E299BE: _wcscmp.LIBCMT ref: 00E29AC1
                          • _malloc.LIBCMT ref: 00E298E0
                          • _malloc.LIBCMT ref: 00E298EA
                          • _free.LIBCMT ref: 00E2992C
                          • _free.LIBCMT ref: 00E29933
                          • _free.LIBCMT ref: 00E2999E
                            • Part of subcall function 00DE2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00DE9C64), ref: 00DE2FA9
                            • Part of subcall function 00DE2F95: GetLastError.KERNEL32(00000000,?,00DE9C64), ref: 00DE2FBB
                          • _free.LIBCMT ref: 00E299A6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _free$_malloc_wcscmp$ErrorFreeHeapLast_fseek
                          • String ID:
                          • API String ID: 2231465579-0
                          • Opcode ID: fd18de759458e21508ccb8b902dfc4ac475c3880c7526805842eb646ad61b447
                          • Instruction ID: fe424a7e9c954a8825a2116f5ee48cfda745a03b5e630ecb59a542e419ca2b8d
                          • Opcode Fuzzy Hash: fd18de759458e21508ccb8b902dfc4ac475c3880c7526805842eb646ad61b447
                          • Instruction Fuzzy Hash: 665151B1904258AFDF249F65DC81A9EBBB9EF48310F14049EB609A7241DB715D80CF69
                          APIs
                          • _memset.LIBCMT ref: 00E22747
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E22792
                          • IsMenu.USER32(00000000), ref: 00E227B2
                          • CreatePopupMenu.USER32 ref: 00E227E6
                          • GetMenuItemCount.USER32(000000FF), ref: 00E22844
                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00E22875
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                          • String ID:
                          • API String ID: 3311875123-0
                          • Opcode ID: c9dab6f6ca287e4ae9fa0d3c80fdd85e1b059c2a49ce6c6a261b058bba5d6e0f
                          • Instruction ID: 80b8286bc6a91f3f945854d8005d2aa6f62c7750a64724b435a36031ebd75526
                          • Opcode Fuzzy Hash: c9dab6f6ca287e4ae9fa0d3c80fdd85e1b059c2a49ce6c6a261b058bba5d6e0f
                          • Instruction Fuzzy Hash: F6517070900269EFDF2CCF64E888AADBBF5AF45318F10525DE611BB291D7709944CB51
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 00DC179A
                          • GetWindowRect.USER32(?,?), ref: 00DC17FE
                          • ScreenToClient.USER32(?,?), ref: 00DC181B
                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00DC182C
                          • EndPaint.USER32(?,?), ref: 00DC1876
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                          • String ID:
                          • API String ID: 1827037458-0
                          • Opcode ID: ccfbe252b2c6e928da7a77de7c878a4e5d3b869fec2b7db3d566cbf577b11803
                          • Instruction ID: c520a0674eaa63007b143268865ab06f3f6a80c63037945d9628bb055f5b1e0f
                          • Opcode Fuzzy Hash: ccfbe252b2c6e928da7a77de7c878a4e5d3b869fec2b7db3d566cbf577b11803
                          • Instruction Fuzzy Hash: B541BC74104212AFD710DF25CC84FBA7BF8EB4A724F14466DFA989B2A2C7309809DB71
                          APIs
                          • ShowWindow.USER32(00E867B0,00000000,01304CB0,?,?,00E867B0,?,00E4B862,?,?), ref: 00E4B9CC
                          • EnableWindow.USER32(00000000,00000000), ref: 00E4B9F0
                          • ShowWindow.USER32(00E867B0,00000000,01304CB0,?,?,00E867B0,?,00E4B862,?,?), ref: 00E4BA50
                          • ShowWindow.USER32(00000000,00000004,?,00E4B862,?,?), ref: 00E4BA62
                          • EnableWindow.USER32(00000000,00000001), ref: 00E4BA86
                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00E4BAA9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$Show$Enable$MessageSend
                          • String ID:
                          • API String ID: 642888154-0
                          • Opcode ID: f702949893fcbd3f31d6e0eaa19b1bdefabd4bf45aaf3a394918fb2ad53f0723
                          • Instruction ID: dd4e791b8d74e836c627d6da01924b13f178b65a2cb1eece5d613fb2f051e1c7
                          • Opcode Fuzzy Hash: f702949893fcbd3f31d6e0eaa19b1bdefabd4bf45aaf3a394918fb2ad53f0723
                          • Instruction Fuzzy Hash: 3B416334600241AFDB21CF15E489B957BE0FF49718F1852B9FA58AF2A2C731E84ADB51
                          APIs
                            • Part of subcall function 00E185F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E18608
                            • Part of subcall function 00E185F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E18612
                            • Part of subcall function 00E185F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E18621
                            • Part of subcall function 00E185F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E18628
                            • Part of subcall function 00E185F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E1863E
                          • GetLengthSid.ADVAPI32(?,00000000,00E18977), ref: 00E18DAC
                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E18DB8
                          • HeapAlloc.KERNEL32(00000000), ref: 00E18DBF
                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E18DD8
                          • GetProcessHeap.KERNEL32(00000000,00000000,00E18977), ref: 00E18DEC
                          • HeapFree.KERNEL32(00000000), ref: 00E18DF3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                          • String ID:
                          • API String ID: 3008561057-0
                          • Opcode ID: f9e722edce993ebef1a94d070f3f0d5df05a294622556e2870fa73dcc6ed884d
                          • Instruction ID: bb2779d2f51b2cd795061fd820f3bad269913aa4fe6f65b586dafb70c671d448
                          • Opcode Fuzzy Hash: f9e722edce993ebef1a94d070f3f0d5df05a294622556e2870fa73dcc6ed884d
                          • Instruction Fuzzy Hash: 5011DC35901604FFDB108FA5ED49BEE7BADEF42319F104129E845B3251CB329985CB60
                          APIs
                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00E18B2A
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00E18B31
                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00E18B40
                          • CloseHandle.KERNEL32(00000004), ref: 00E18B4B
                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00E18B7A
                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00E18B8E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                          • String ID:
                          • API String ID: 1413079979-0
                          • Opcode ID: 3e2d78d8297006c73f8d51de0217d4d6a887afcf8a5283447b61fa216b87004b
                          • Instruction ID: 2c6b1711eaef5ce6cc964488f4bbcb64466fb9a0940803011a28f6705ec38e1e
                          • Opcode Fuzzy Hash: 3e2d78d8297006c73f8d51de0217d4d6a887afcf8a5283447b61fa216b87004b
                          • Instruction Fuzzy Hash: 531189BA504209AFDF018FA5ED49FDA7BA9EF49708F045025FE04B2060C7768DA5EB60
                          APIs
                            • Part of subcall function 00DC12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DC134D
                            • Part of subcall function 00DC12F3: SelectObject.GDI32(?,00000000), ref: 00DC135C
                            • Part of subcall function 00DC12F3: BeginPath.GDI32(?), ref: 00DC1373
                            • Part of subcall function 00DC12F3: SelectObject.GDI32(?,00000000), ref: 00DC139C
                          • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00E4C1C4
                          • LineTo.GDI32(00000000,00000003,?), ref: 00E4C1D8
                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E4C1E6
                          • LineTo.GDI32(00000000,00000000,?), ref: 00E4C1F6
                          • EndPath.GDI32(00000000), ref: 00E4C206
                          • StrokePath.GDI32(00000000), ref: 00E4C216
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                          • String ID:
                          • API String ID: 43455801-0
                          • Opcode ID: 23f04778486245c8e29506376d2ae905ed0ddf12db38f5cfc4c50c21886ce23f
                          • Instruction ID: 4101a3445a609198a89b8a25da1b3929eb7eb6f0eb8e619ef0922d4fa426d47e
                          • Opcode Fuzzy Hash: 23f04778486245c8e29506376d2ae905ed0ddf12db38f5cfc4c50c21886ce23f
                          • Instruction Fuzzy Hash: 7A111B7A40014DBFDF119F91EC88FAA7FADEB09354F048021FA186A162C7B19D59DBA0
                          APIs
                          • GetDC.USER32(00000000), ref: 00E1BC78
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E1BC89
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E1BC90
                          • ReleaseDC.USER32(00000000,00000000), ref: 00E1BC98
                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00E1BCAF
                          • MulDiv.KERNEL32(000009EC,?,?), ref: 00E1BCC1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CapsDevice$Release
                          • String ID:
                          • API String ID: 1035833867-0
                          • Opcode ID: 01bbcbace47c2da25272e08501eb28cb943358fc5a9b4e206bdea1b20ed7f102
                          • Instruction ID: 585bab10331129cc136d1065580418d5f0b46a1a17cdfd7944eeaf5b3900471c
                          • Opcode Fuzzy Hash: 01bbcbace47c2da25272e08501eb28cb943358fc5a9b4e206bdea1b20ed7f102
                          • Instruction Fuzzy Hash: CB018475E00208BFEB109BA69D49E5EBFB8EB49751F0040A5FE08B7391D6309C11CF90
                          APIs
                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00DE03D3
                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00DE03DB
                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00DE03E6
                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00DE03F1
                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00DE03F9
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00DE0401
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Virtual
                          • String ID:
                          • API String ID: 4278518827-0
                          • Opcode ID: 7a8607281c51e1e925a83036a6b11267b3cd1adef2f7017f3d4dcb518da5aa9e
                          • Instruction ID: fad603145508c08e3093f60d611cef4c7c459242fa10b0caaf3f6b676c3f6fd6
                          • Opcode Fuzzy Hash: 7a8607281c51e1e925a83036a6b11267b3cd1adef2f7017f3d4dcb518da5aa9e
                          • Instruction Fuzzy Hash: 9F016CB09027597DE3008F5A8C85B52FFA8FF19754F00415BE15C47941C7F5A868CBE5
                          APIs
                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E2569B
                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E256B1
                          • GetWindowThreadProcessId.USER32(?,?), ref: 00E256C0
                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E256CF
                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E256D9
                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E256E0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                          • String ID:
                          • API String ID: 839392675-0
                          • Opcode ID: 294f83ce871208edbb75ffe1bc569bc80dc5e8588417aab6112d41d680116477
                          • Instruction ID: d8adb0f239460f1b03c5a74e88596cff695267e07fbe04e96057d49b65332dbf
                          • Opcode Fuzzy Hash: 294f83ce871208edbb75ffe1bc569bc80dc5e8588417aab6112d41d680116477
                          • Instruction Fuzzy Hash: 34F06D36241158BFE3205BA3AC0DEAB7A7CEBC7F11F0001A9FA00E105196A01A0686B5
                          APIs
                          • InterlockedExchange.KERNEL32(?,?), ref: 00E274E5
                          • EnterCriticalSection.KERNEL32(?,?,00DD1044,?,?), ref: 00E274F6
                          • TerminateThread.KERNEL32(00000000,000001F6,?,00DD1044,?,?), ref: 00E27503
                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00DD1044,?,?), ref: 00E27510
                            • Part of subcall function 00E26ED7: CloseHandle.KERNEL32(00000000,?,00E2751D,?,00DD1044,?,?), ref: 00E26EE1
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00E27523
                          • LeaveCriticalSection.KERNEL32(?,?,00DD1044,?,?), ref: 00E2752A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                          • String ID:
                          • API String ID: 3495660284-0
                          • Opcode ID: ffbb917c861d475d27f56b2c38309f3375269ffb4b54151bfe0609a075f66f6f
                          • Instruction ID: 111a62710f17d7ef2d2d97668a75b46517226ae2fc39bb92bc5753480ad4c6d2
                          • Opcode Fuzzy Hash: ffbb917c861d475d27f56b2c38309f3375269ffb4b54151bfe0609a075f66f6f
                          • Instruction Fuzzy Hash: 10F05E3E540A22EFEB111B65FC8C9EB776AEF46B02B001531F602B10B1CBB55906CB54
                          APIs
                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00E52C7C,?), ref: 00E17C32
                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00E52C7C,?), ref: 00E17C4A
                          • CLSIDFromProgID.OLE32(?,?,00000000,00E4FB80,000000FF,?,00000000,00000800,00000000,?,00E52C7C,?), ref: 00E17C6F
                          • _memcmp.LIBCMT ref: 00E17C90
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FromProg$FreeTask_memcmp
                          • String ID: ,,
                          • API String ID: 314563124-1556401989
                          • Opcode ID: 8ef31edc093d60177ea2f69178d91880a47ddb8a0b3ff14efbffff7b528786fc
                          • Instruction ID: 7516fff94688a0366f29c177c00b6547b998b52274db05aff1e9c073fd7791a9
                          • Opcode Fuzzy Hash: 8ef31edc093d60177ea2f69178d91880a47ddb8a0b3ff14efbffff7b528786fc
                          • Instruction Fuzzy Hash: D4812A76A04109EFCB04DF94C884EEEB7B9FF89715F204198E546BB250DB31AE46CB60
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00E38928
                          • CharUpperBuffW.USER32(?,?), ref: 00E38A37
                          • VariantClear.OLEAUT32(?), ref: 00E38BAF
                            • Part of subcall function 00E27804: VariantInit.OLEAUT32(00000000), ref: 00E27844
                            • Part of subcall function 00E27804: VariantCopy.OLEAUT32(00000000,?), ref: 00E2784D
                            • Part of subcall function 00E27804: VariantClear.OLEAUT32(00000000), ref: 00E27859
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                          • API String ID: 4237274167-1221869570
                          • Opcode ID: 358c35d9e0cea585b32bab31fe99731be79f1ddd9ade0c95abc989f822040e3f
                          • Instruction ID: 7edae620b705d002e9b25eb6e435f9c148f3d7e0ed534d336dbee036116c8f70
                          • Opcode Fuzzy Hash: 358c35d9e0cea585b32bab31fe99731be79f1ddd9ade0c95abc989f822040e3f
                          • Instruction Fuzzy Hash: 6D91AF746083029FC710DF24C588E5ABBE4EFC8704F14996EF89A9B361DB31E945CB62
                          APIs
                          • _memset.LIBCMT ref: 00E22CAF
                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00E22CCB
                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00E22D11
                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00E86890,00000000), ref: 00E22D5A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Menu$Delete$InfoItem_memset
                          • String ID: 0
                          • API String ID: 1173514356-4108050209
                          • Opcode ID: 7b8f268537fd8c0fa0413f7266c0c5d5fe848544dd0cb16a6682121b67af59a1
                          • Instruction ID: 9cb72ea3ca719c0a7ff31c2693965b306cdbb7c3def2010ca027bcce8f78cb4a
                          • Opcode Fuzzy Hash: 7b8f268537fd8c0fa0413f7266c0c5d5fe848544dd0cb16a6682121b67af59a1
                          • Instruction Fuzzy Hash: B441C130204312AFD724DF24E845B5BBBE8EF85324F00461DFA65A72E1DB70E905CBA2
                          APIs
                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00E3DAD9
                            • Part of subcall function 00DC79AB: _memmove.LIBCMT ref: 00DC79F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharLower_memmove
                          • String ID: cdecl$none$stdcall$winapi
                          • API String ID: 3425801089-567219261
                          • Opcode ID: 1e1adf7c760cb5242f0dacc520013de4a40c481314545457351d10f0c3b242c8
                          • Instruction ID: c43cd1b00141bbefad64ced34415a69909ed4c6a1e57def2ce22772583f39a75
                          • Opcode Fuzzy Hash: 1e1adf7c760cb5242f0dacc520013de4a40c481314545457351d10f0c3b242c8
                          • Instruction Fuzzy Hash: 6731A17090421AAFCF00EF94DC819EEF7B4FF45324F108629E865A76D1CB71A905CBA0
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E1B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00E1B0E7
                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00E193F6
                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00E19409
                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00E19439
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$_memmove$ClassName
                          • String ID: ComboBox$ListBox
                          • API String ID: 365058703-1403004172
                          • Opcode ID: 36c0fc03189580519bcdbe9634e8d5ea8ed00e04a3cfd8a2c9e33cd1621eebcc
                          • Instruction ID: afd20c476b48ebfccb6036bc3d517db7b97f0d66dcf2ef4ec2fe75fa3e77b7be
                          • Opcode Fuzzy Hash: 36c0fc03189580519bcdbe9634e8d5ea8ed00e04a3cfd8a2c9e33cd1621eebcc
                          • Instruction Fuzzy Hash: C7210471900104BEDB14ABB1DC95DFFB778DF05750B105119F836B71E2DB34198A9A30
                          APIs
                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E31B40
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E31B66
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00E31B96
                          • InternetCloseHandle.WININET(00000000), ref: 00E31BDD
                            • Part of subcall function 00E32777: GetLastError.KERNEL32(?,?,00E31B0B,00000000,00000000,00000001), ref: 00E3278C
                            • Part of subcall function 00E32777: SetEvent.KERNEL32(?,?,00E31B0B,00000000,00000000,00000001), ref: 00E327A1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                          • String ID:
                          • API String ID: 3113390036-3916222277
                          • Opcode ID: 72327e2d142dc9ef2157d2ed4feffbfe1343ab0c1c1dae1e0f9a722246038b49
                          • Instruction ID: 6723d3ccf1011c150b6cf220311688ace2ae09ac76c273c7a0d4d86a8f7e796b
                          • Opcode Fuzzy Hash: 72327e2d142dc9ef2157d2ed4feffbfe1343ab0c1c1dae1e0f9a722246038b49
                          • Instruction Fuzzy Hash: C421CFB5500208BFEB119F219C89EFFBAECEB89B48F10116EF505B2240EA349D099771
                          APIs
                            • Part of subcall function 00DC1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DC1D73
                            • Part of subcall function 00DC1D35: GetStockObject.GDI32(00000011), ref: 00DC1D87
                            • Part of subcall function 00DC1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00DC1D91
                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00E466D0
                          • LoadLibraryW.KERNEL32(?), ref: 00E466D7
                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00E466EC
                          • DestroyWindow.USER32(?), ref: 00E466F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                          • String ID: SysAnimate32
                          • API String ID: 4146253029-1011021900
                          • Opcode ID: df05d184af9b8e4e2086d9a59999b4938faf36c334e1a9817cd97c8506f4a902
                          • Instruction ID: e0ac8b71bcdade8c87a800d51fbda7c1a7f3d8a80aa5a01c77415da31fcfb031
                          • Opcode Fuzzy Hash: df05d184af9b8e4e2086d9a59999b4938faf36c334e1a9817cd97c8506f4a902
                          • Instruction Fuzzy Hash: 1C21CDB1200206AFEF104F64FC80EBB37ADEB5A768F126629F911B3190C771CC519762
                          APIs
                          • GetStdHandle.KERNEL32(0000000C), ref: 00E2705E
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E27091
                          • GetStdHandle.KERNEL32(0000000C), ref: 00E270A3
                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00E270DD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: 757d3231e4ffe2c18221c43ba12a6bfe3a4c6a0ec397144eebf5f14b3cab66b9
                          • Instruction ID: 791bf8565f34946719bc08bc6ffe9beea46146567b5e3052288e4b12fad994b5
                          • Opcode Fuzzy Hash: 757d3231e4ffe2c18221c43ba12a6bfe3a4c6a0ec397144eebf5f14b3cab66b9
                          • Instruction Fuzzy Hash: 13218174604229ABDF209F29EC05E9A77E8AF45724F205619FCE1F72D0E7B09848CB50
                          APIs
                          • GetStdHandle.KERNEL32(000000F6), ref: 00E2712B
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00E2715D
                          • GetStdHandle.KERNEL32(000000F6), ref: 00E2716E
                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00E271A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: 8acf7273aec275c51063e956ddd4ab214fa41baf7d8c498dd51e042a4c4314f3
                          • Instruction ID: cc5331bb5c9fb25a15aa06f521b2fa4950e4180d37cb65df89cb659f409a8806
                          • Opcode Fuzzy Hash: 8acf7273aec275c51063e956ddd4ab214fa41baf7d8c498dd51e042a4c4314f3
                          • Instruction Fuzzy Hash: 8921B3756053259BDF209F69AC04AAAB7E8AF55724F201719FCF1F32D0D7B09861CB50
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00E2AEBF
                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00E2AF13
                          • __swprintf.LIBCMT ref: 00E2AF2C
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,00E4F910), ref: 00E2AF6A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume__swprintf
                          • String ID: %lu
                          • API String ID: 3164766367-685833217
                          • Opcode ID: 07ae0353110ddeb65e3d76f57ecc5acda12db2544f629e7815f36dcf04276567
                          • Instruction ID: 8185d6e25213ef9c6d7722b44d7983ed5f9ec7471d545cc1726d67b6b14397c4
                          • Opcode Fuzzy Hash: 07ae0353110ddeb65e3d76f57ecc5acda12db2544f629e7815f36dcf04276567
                          • Instruction Fuzzy Hash: 0A217434A00209AFDB10EF65D985EAEB7B8EF89704B004069F509EB251DB71EE45CB31
                          APIs
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                            • Part of subcall function 00E1A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00E1A399
                            • Part of subcall function 00E1A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E1A3AC
                            • Part of subcall function 00E1A37C: GetCurrentThreadId.KERNEL32 ref: 00E1A3B3
                            • Part of subcall function 00E1A37C: AttachThreadInput.USER32(00000000), ref: 00E1A3BA
                          • GetFocus.USER32 ref: 00E1A554
                            • Part of subcall function 00E1A3C5: GetParent.USER32(?), ref: 00E1A3D3
                          • GetClassNameW.USER32(?,?,00000100), ref: 00E1A59D
                          • EnumChildWindows.USER32(?,00E1A615), ref: 00E1A5C5
                          • __swprintf.LIBCMT ref: 00E1A5DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                          • String ID: %s%d
                          • API String ID: 1941087503-1110647743
                          • Opcode ID: d520db8f64559757496cebc43761fc46bfacab1073bfac669acb2b2c61256266
                          • Instruction ID: cecfcbd295389aa282f38da21e26851c16b517f278dd46e1c43a68c6402c3a8f
                          • Opcode Fuzzy Hash: d520db8f64559757496cebc43761fc46bfacab1073bfac669acb2b2c61256266
                          • Instruction Fuzzy Hash: 2C119071601209ABDF117FA1EC85FFE37A8DF49700F085079F919BA152CA7059858B75
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00E22048
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                          • API String ID: 3964851224-769500911
                          • Opcode ID: 344aad4716da988dbb646030f5f372bfb8b7a060c8a271aabaad9cab933e87d1
                          • Instruction ID: ce430a0a744fa787140fec3bfe9980b9b67cab4b06e055989871227be1c09ac4
                          • Opcode Fuzzy Hash: 344aad4716da988dbb646030f5f372bfb8b7a060c8a271aabaad9cab933e87d1
                          • Instruction Fuzzy Hash: 14116D7090011ADFCF00EFA4E8819EEB7B4FF55304B5094A8D855B7252EB32690ACB60
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E410A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00E40038,?,?), ref: 00E410BC
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00E40388
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00E403C7
                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00E4040E
                          • RegCloseKey.ADVAPI32(?,?), ref: 00E4043A
                          • RegCloseKey.ADVAPI32(00000000), ref: 00E40447
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                          • String ID:
                          • API String ID: 3440857362-0
                          • Opcode ID: 210e8b615a301de44de013a068ba278e7c2597b0a52fa76eb7718dad8113ff01
                          • Instruction ID: 1e49c45e6e9f189d85c364a2aca53404dcabe5c18767b047be52a573cab6bf93
                          • Opcode Fuzzy Hash: 210e8b615a301de44de013a068ba278e7c2597b0a52fa76eb7718dad8113ff01
                          • Instruction Fuzzy Hash: A6515B31208205AFD704EF65D881F6EB7E8FF84704F04992DF695A7291DB31E905CB62
                          APIs
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00E3DC3B
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00E3DCBE
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00E3DCDA
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00E3DD1B
                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00E3DD35
                            • Part of subcall function 00DC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E27B20,?,?,00000000), ref: 00DC5B8C
                            • Part of subcall function 00DC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E27B20,?,?,00000000,?,?), ref: 00DC5BB0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                          • String ID:
                          • API String ID: 327935632-0
                          • Opcode ID: e22e502cd11747e90b503c1f65d5505a171ba39c97b22daa1358ec7cf24437c5
                          • Instruction ID: fb79fa4285e7197eda279c7f70cd9e067d59a774fd4746e2884728d25b5a4cfd
                          • Opcode Fuzzy Hash: e22e502cd11747e90b503c1f65d5505a171ba39c97b22daa1358ec7cf24437c5
                          • Instruction Fuzzy Hash: 42511835A042069FCB01EFA8D898DADFBF4EF49314B059169E819AB312DB30AD45CF61
                          APIs
                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00E2E88A
                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00E2E8B3
                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00E2E8F2
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00E2E917
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00E2E91F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                          • String ID:
                          • API String ID: 1389676194-0
                          • Opcode ID: 95e7e8ea61e33a1335ee7566ba731ca253ee654820a53f510166c5529c8bcbb0
                          • Instruction ID: 22f44d6c8e06c399765d8f917ebf40ed463c93316bc88260c55a93fb3b140db9
                          • Opcode Fuzzy Hash: 95e7e8ea61e33a1335ee7566ba731ca253ee654820a53f510166c5529c8bcbb0
                          • Instruction Fuzzy Hash: 5E512839A00215DFCF05EF65D995EAEBBF5EF08314B148099E849AB361CB31AD51CB60
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cfe89a8435feaddf7c1264ff63fd65351edc7891265e690d206868e1e4777a11
                          • Instruction ID: 006f1f7bc946c5545053e7f06206b3bf8d6ae99f459f63bc76e3d0feec693b0a
                          • Opcode Fuzzy Hash: cfe89a8435feaddf7c1264ff63fd65351edc7891265e690d206868e1e4777a11
                          • Instruction Fuzzy Hash: A941F139940204AFC720DF28EC48FEDBBA5EB09324F195175F829B72E0E770AD41DA91
                          APIs
                          • GetCursorPos.USER32(?), ref: 00DC2357
                          • ScreenToClient.USER32(00E867B0,?), ref: 00DC2374
                          • GetAsyncKeyState.USER32(00000001), ref: 00DC2399
                          • GetAsyncKeyState.USER32(00000002), ref: 00DC23A7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AsyncState$ClientCursorScreen
                          • String ID:
                          • API String ID: 4210589936-0
                          • Opcode ID: 171cae56858c27cceeaf9f96d80e313f4d7d4e62653d91a95d392e179d9a71c1
                          • Instruction ID: d7aae533d9187577f0c9fdca292dbc042a7f4d635d397a11145e5630d2f3d533
                          • Opcode Fuzzy Hash: 171cae56858c27cceeaf9f96d80e313f4d7d4e62653d91a95d392e179d9a71c1
                          • Instruction Fuzzy Hash: FD418C3550415AFBDB159F68C844EF9BBB4FB45320F20831AE928A3290C735A964DBA1
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E1695D
                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00E169A9
                          • TranslateMessage.USER32(?), ref: 00E169D2
                          • DispatchMessageW.USER32(?), ref: 00E169DC
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E169EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                          • String ID:
                          • API String ID: 2108273632-0
                          • Opcode ID: 9d8451414b1443d46dd6ab7fde4509c1d94e801eb74278ac30048f4a9f900c39
                          • Instruction ID: 51308dba7acc718d0922617454e7ae8089a1120e42a18c0bed42ec6002f83d56
                          • Opcode Fuzzy Hash: 9d8451414b1443d46dd6ab7fde4509c1d94e801eb74278ac30048f4a9f900c39
                          • Instruction Fuzzy Hash: 5531A371900246AFDB20CFB5DC44FF67BA8AB42708F1491A9E429F61A1D73598C9D7A0
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00E1B6C7
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E1B6E4
                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E1B71C
                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00E1B742
                          • _wcsstr.LIBCMT ref: 00E1B74C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                          • String ID:
                          • API String ID: 3902887630-0
                          • Opcode ID: 3a3252b632ee217471d209e51f12b610014666f43e329b69dc6d4b0eca1764af
                          • Instruction ID: 91a5d7282dc5e94332225f8c40fa0057089df25a5e0c7822ffc0b2a2b148b087
                          • Opcode Fuzzy Hash: 3a3252b632ee217471d209e51f12b610014666f43e329b69dc6d4b0eca1764af
                          • Instruction Fuzzy Hash: AC21F935604244BBEB255B3ADC49EBB7BACDF49B50F00417AFC05EA1A1EF61DC8196B0
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • GetWindowLongW.USER32(?,000000F0), ref: 00E4B44C
                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00E4B471
                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00E4B489
                          • GetSystemMetrics.USER32(00000004), ref: 00E4B4B2
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00E31184,00000000), ref: 00E4B4D0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$Long$MetricsSystem
                          • String ID:
                          • API String ID: 2294984445-0
                          • Opcode ID: 0872c3f19528f890223c8dfc0fb7fe98f80782c239c966504ea378dc977c89b2
                          • Instruction ID: 215968f23ccc84fe5016313f126a79b71d7d3be807fbf8a1ed6a46d45b3ae035
                          • Opcode Fuzzy Hash: 0872c3f19528f890223c8dfc0fb7fe98f80782c239c966504ea378dc977c89b2
                          • Instruction Fuzzy Hash: 3A218D31A10265AFCB249F39AC04A6A3BA4EB05725F115728F93AE21E1E730D811DB90
                          APIs
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E19802
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E19834
                          • __itow.LIBCMT ref: 00E1984C
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E19874
                          • __itow.LIBCMT ref: 00E19885
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$__itow$_memmove
                          • String ID:
                          • API String ID: 2983881199-0
                          • Opcode ID: 604dcedf1515af4d225906600332297af85e83d42f5579d02d7f1dd2253b6ae8
                          • Instruction ID: 4ef24dbb410eee183989618031b83f224082348f9236fd90b7c3b6b6e55f09f4
                          • Opcode Fuzzy Hash: 604dcedf1515af4d225906600332297af85e83d42f5579d02d7f1dd2253b6ae8
                          • Instruction Fuzzy Hash: C1210A31B00204BFDB14AA659C8AEEE3BADEF4AB14F041068FD05FB242D6708D8597F1
                          APIs
                          • IsWindow.USER32(00000000), ref: 00E35D81
                          • GetForegroundWindow.USER32 ref: 00E35D98
                          • GetDC.USER32(00000000), ref: 00E35DD4
                          • GetPixel.GDI32(00000000,?,00000003), ref: 00E35DE0
                          • ReleaseDC.USER32(00000000,00000003), ref: 00E35E1B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$ForegroundPixelRelease
                          • String ID:
                          • API String ID: 4156661090-0
                          • Opcode ID: cf69a785c2d44539f75eb6a468ff69998bff33d6f2cb0433afba45b2c626ac4b
                          • Instruction ID: ae26b6e55d49442998f4db4a87eaa757cc7927f8f8d82d92bd0ac6e86ae802a4
                          • Opcode Fuzzy Hash: cf69a785c2d44539f75eb6a468ff69998bff33d6f2cb0433afba45b2c626ac4b
                          • Instruction Fuzzy Hash: A6216235A00104AFD714EF65D948EAABBE5EF49710F058479E84AA7351CA30AD45CB50
                          APIs
                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DC134D
                          • SelectObject.GDI32(?,00000000), ref: 00DC135C
                          • BeginPath.GDI32(?), ref: 00DC1373
                          • SelectObject.GDI32(?,00000000), ref: 00DC139C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ObjectSelect$BeginCreatePath
                          • String ID:
                          • API String ID: 3225163088-0
                          • Opcode ID: 15f4bc55bff814470839c341b8c0eb7ea8007bc693585563cfa197ce447ecfb6
                          • Instruction ID: bc2d1d183667cd8697606d5e24f9c1704b15200a7305a1a766a0c7561d57d971
                          • Opcode Fuzzy Hash: 15f4bc55bff814470839c341b8c0eb7ea8007bc693585563cfa197ce447ecfb6
                          • Instruction Fuzzy Hash: AD21B874800355DFDB149F56EC09B697BB8F702725F14821AF41CB71A1D3719859CFA0
                          APIs
                          • _malloc.LIBCMT ref: 00DF533E
                            • Part of subcall function 00DE594C: __FF_MSGBANNER.LIBCMT ref: 00DE5963
                            • Part of subcall function 00DE594C: __NMSG_WRITE.LIBCMT ref: 00DE596A
                            • Part of subcall function 00DE594C: RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000000,?,?,?,00DE1013,?), ref: 00DE598F
                          • _free.LIBCMT ref: 00DF5351
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AllocateHeap_free_malloc
                          • String ID:
                          • API String ID: 1020059152-0
                          • Opcode ID: 0511500ceb7a56c58d1f6461d3e9a01c2e09bf566e7880dcea95b9bf50f79fb5
                          • Instruction ID: 4e60eb4cb660dfb7d10d6cd8baed283981d2d593f1d1701d08aa0d6c28714e64
                          • Opcode Fuzzy Hash: 0511500ceb7a56c58d1f6461d3e9a01c2e09bf566e7880dcea95b9bf50f79fb5
                          • Instruction Fuzzy Hash: CC110432404A1AAECB213F7ABC0467D37D8DF013A0F158429FB49AA195DA7289419770
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: 521e28a60e758ed4c4e3c0e2a4a03f8fc681f6c5b77c3f25dba75775f2e24818
                          • Instruction ID: e1e072b9a805a5c1fc3b78521c76401516e120b5017a40c652003e75e1c7a9c8
                          • Opcode Fuzzy Hash: 521e28a60e758ed4c4e3c0e2a4a03f8fc681f6c5b77c3f25dba75775f2e24818
                          • Instruction Fuzzy Hash: 2D01B9727C52057BD204B5255C42FEB73ACDB11398F645419FE04F7243E661DE9582F1
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00E24D5C
                          • __beginthreadex.LIBCMT ref: 00E24D7A
                          • MessageBoxW.USER32(?,?,?,?), ref: 00E24D8F
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E24DA5
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E24DAC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                          • String ID:
                          • API String ID: 3824534824-0
                          • Opcode ID: e1a1f1f1e1a6d4e4401774cd49da6358b82b876a69ae650e8dc493ce83e8d6f7
                          • Instruction ID: 09445a23a10badaeece45cf308fd6d1c748905c0dc8e7c9f493e340d5e92b395
                          • Opcode Fuzzy Hash: e1a1f1f1e1a6d4e4401774cd49da6358b82b876a69ae650e8dc493ce83e8d6f7
                          • Instruction Fuzzy Hash: 141108B6904258FFC7019FA9EC04ADA7FACEB45724F1442A5F918F73A1D6718D0887B0
                          APIs
                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E18766
                          • GetLastError.KERNEL32(?,00E1822A,?,?,?), ref: 00E18770
                          • GetProcessHeap.KERNEL32(00000008,?,?,00E1822A,?,?,?), ref: 00E1877F
                          • HeapAlloc.KERNEL32(00000000,?,00E1822A,?,?,?), ref: 00E18786
                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E1879D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 842720411-0
                          • Opcode ID: 2d81a0bdd8ec175597e7ef60164597755b87b93354820fda54477e9d1f6ac746
                          • Instruction ID: 4558adfe5d37513ba49547e8f6d3748878cb70f1bcb680ba86be9b091b2f3c22
                          • Opcode Fuzzy Hash: 2d81a0bdd8ec175597e7ef60164597755b87b93354820fda54477e9d1f6ac746
                          • Instruction Fuzzy Hash: F2016D75601204FFDB205FA6DD88DAB7BACFF8A755720047AF949E2260DA318C45CA60
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E25502
                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00E25510
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E25518
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00E25522
                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00E2555E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterSleep$Frequency
                          • String ID:
                          • API String ID: 2833360925-0
                          • Opcode ID: a85b644912ee4b0795b99812cbab434ae36d2e9603efcb5ba2f62e7c88f3eab7
                          • Instruction ID: c64dba1f28fbec7bd371b7c2e01cd7f3afb04d54ba9b79112d181c076372b3f4
                          • Opcode Fuzzy Hash: a85b644912ee4b0795b99812cbab434ae36d2e9603efcb5ba2f62e7c88f3eab7
                          • Instruction Fuzzy Hash: 45015B36C01A29DBCF00EFE9E9885EDBB79FB0A711F040056E911B2240DB305554C7A1
                          APIs
                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?,?,?,00E1799D), ref: 00E1766F
                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?,?), ref: 00E1768A
                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?,?), ref: 00E17698
                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?), ref: 00E176A8
                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00E1758C,80070057,?,?), ref: 00E176B4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: From$Prog$FreeStringTasklstrcmpi
                          • String ID:
                          • API String ID: 3897988419-0
                          • Opcode ID: 87d284233bde260df38629ff634b15d1faedceb630adc61a528215672dec956c
                          • Instruction ID: e2be7e6d51a81199d12b49da148e98c6649b25305bdfed2b47c58c71ced407d6
                          • Opcode Fuzzy Hash: 87d284233bde260df38629ff634b15d1faedceb630adc61a528215672dec956c
                          • Instruction Fuzzy Hash: A701B1B6600604AFDB104F59DC04AAA7FBCEB49F51F100028FD44E7211EB31DD8187A0
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E18608
                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E18612
                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E18621
                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E18628
                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E1863E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: b0153c8f16ca5c67163b595e0659267eab3f714befae33bfcbc004d9ec48bcaa
                          • Instruction ID: f38e96547cb7b586194f5de8cea5d2f95ff595712184a926028b3e1fc3253ce3
                          • Opcode Fuzzy Hash: b0153c8f16ca5c67163b595e0659267eab3f714befae33bfcbc004d9ec48bcaa
                          • Instruction Fuzzy Hash: A6F06235201204AFEB200FA6DD8DEAB3BACEF8AB58B001425F945E6151CB71DC86DA60
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E18669
                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E18673
                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E18682
                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E18689
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E1869F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: bc12312f27417ec86cddf4598460f3d3305a6d04cb951ba700021ee63f7e8b95
                          • Instruction ID: 1ec98915111cbf4a07c402b88526d0a579dcfe291a5c7ebdde503e4d418d0e77
                          • Opcode Fuzzy Hash: bc12312f27417ec86cddf4598460f3d3305a6d04cb951ba700021ee63f7e8b95
                          • Instruction Fuzzy Hash: 9DF06279201304AFEB211FA6EC88EA73BACEF8AB58B100035F945E6151CB71DD46DA60
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00E1C6BA
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00E1C6D1
                          • MessageBeep.USER32(00000000), ref: 00E1C6E9
                          • KillTimer.USER32(?,0000040A), ref: 00E1C705
                          • EndDialog.USER32(?,00000001), ref: 00E1C71F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                          • String ID:
                          • API String ID: 3741023627-0
                          • Opcode ID: 77213f7f82c90833b533fa3928ee9445a810f8d4877b9f56058840d265d231a6
                          • Instruction ID: e34295fedf9008e77a7500628c95d2084633e2ed8ec7812eeaac323f2ecaefcf
                          • Opcode Fuzzy Hash: 77213f7f82c90833b533fa3928ee9445a810f8d4877b9f56058840d265d231a6
                          • Instruction Fuzzy Hash: A5018F34440304ABEB215B21DD4EFE677B8FB05B05F0016AAF542F14E0DBE0A9998E90
                          APIs
                          • EndPath.GDI32(?), ref: 00DC13BF
                          • StrokeAndFillPath.GDI32(?,?,00DFBAD8,00000000,?), ref: 00DC13DB
                          • SelectObject.GDI32(?,00000000), ref: 00DC13EE
                          • DeleteObject.GDI32 ref: 00DC1401
                          • StrokePath.GDI32(?), ref: 00DC141C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Path$ObjectStroke$DeleteFillSelect
                          • String ID:
                          • API String ID: 2625713937-0
                          • Opcode ID: bf36f7cc94457193884ac90a891015fa10ea7e36001056d9c63bb90260c2046d
                          • Instruction ID: 4f6a3d17afcb7fbc26bc3ad255137b8498bf32f2cf97d96537b3abc8a58613c3
                          • Opcode Fuzzy Hash: bf36f7cc94457193884ac90a891015fa10ea7e36001056d9c63bb90260c2046d
                          • Instruction Fuzzy Hash: 15F0E134004349DFDB195F57EC0CB543FA4AB42726F18C228E46D690F2C731459ADF60
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 00E2C69D
                          • CoCreateInstance.OLE32(00E52D6C,00000000,00000001,00E52BDC,?), ref: 00E2C6B5
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          • CoUninitialize.OLE32 ref: 00E2C922
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateInitializeInstanceUninitialize_memmove
                          • String ID: .lnk
                          • API String ID: 2683427295-24824748
                          • Opcode ID: a3e02014e578a729817db3d893473e2cec415b213bc3b222586808e3db5a0546
                          • Instruction ID: d3a9ac81e561d5f86e76f67315710ac105e7dbc7bc155bad2a2495389bc2f45b
                          • Opcode Fuzzy Hash: a3e02014e578a729817db3d893473e2cec415b213bc3b222586808e3db5a0546
                          • Instruction Fuzzy Hash: 66A12B71108306AFD700EF54C895EABB7E8EF95704F04495CF1969B1A2EB70EA49CB72
                          APIs
                            • Part of subcall function 00DC48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00DC48A1,?,?,00DC37C0,?), ref: 00DC48CE
                          • CoInitialize.OLE32(00000000), ref: 00E2BC26
                          • CoCreateInstance.OLE32(00E52D6C,00000000,00000001,00E52BDC,?), ref: 00E2BC3F
                          • CoUninitialize.OLE32 ref: 00E2BC5C
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                          • String ID: .lnk
                          • API String ID: 2126378814-24824748
                          • Opcode ID: 8d15d8746f1798c84c27a4da848869b848be523c0dc16e1c4c18b3fedc6dc555
                          • Instruction ID: 6aeb71bb7ce867ecd7e4b81206fb26e026f8747097257af7af28d40d515724cc
                          • Opcode Fuzzy Hash: 8d15d8746f1798c84c27a4da848869b848be523c0dc16e1c4c18b3fedc6dc555
                          • Instruction Fuzzy Hash: 4EA155752043129FCB04DF24C494E5ABBE5FF88314F05898CF899AB2A1CB31ED45CBA1
                          APIs
                          • OleSetContainedObject.OLE32(?,00000001), ref: 00E1B981
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ContainedObject
                          • String ID: AutoIt3GUI$Container$%
                          • API String ID: 3565006973-1286912533
                          • Opcode ID: 9c127fd49a0572139405f5078768d7a505ada0bd5c7f86f96a74d24463f456c7
                          • Instruction ID: 407a112577d19bafa6cfa5866b394d33db7ca0bf0dad75e77af68049e204e12d
                          • Opcode Fuzzy Hash: 9c127fd49a0572139405f5078768d7a505ada0bd5c7f86f96a74d24463f456c7
                          • Instruction Fuzzy Hash: 69915D706003019FDB24DF24C885AA6BBF9FF49714F14956DF94AEB291DB70E881CB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID: pow
                          • API String ID: 0-2276729525
                          • Opcode ID: 6a35c16c793c240a26f3cc198614c724378508abaf8bd40aeb073253fd3cc13f
                          • Instruction ID: d77cd596e6f395fb1cf2597d612349d6b2b69638fb1ef2c0fd6456873d892eec
                          • Opcode Fuzzy Hash: 6a35c16c793c240a26f3cc198614c724378508abaf8bd40aeb073253fd3cc13f
                          • Instruction Fuzzy Hash: 9E516A20A0C6498ACB11B726E94137E6BD0EB00384F29CD68E6D4432DEEF74CCD8D676
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID: #$+
                          • API String ID: 0-2552117581
                          • Opcode ID: 2d433630c015ac5c1026d641fd4213107be9662ac912bf471614836d7c5c9c1b
                          • Instruction ID: aa34c345b583f0c15aa2eb44dfe40e0132ddacea66cfc3c420de0491fbace08b
                          • Opcode Fuzzy Hash: 2d433630c015ac5c1026d641fd4213107be9662ac912bf471614836d7c5c9c1b
                          • Instruction Fuzzy Hash: 38513676104246CFDF15EF29D488AFA7BA4EF96314F184055E891AB2A0C7749CC2CB71
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memset$_memmove
                          • String ID: ERCP
                          • API String ID: 2532777613-1384759551
                          • Opcode ID: 66f3fe2f4ebbff89c06aaf930dc6acae39da1346442004f89d282d9db14d3f7f
                          • Instruction ID: d7761ff814632c9615c2e6768cdc87ebd8ab039231c0e2e06dd78f79899e1155
                          • Opcode Fuzzy Hash: 66f3fe2f4ebbff89c06aaf930dc6acae39da1346442004f89d282d9db14d3f7f
                          • Instruction Fuzzy Hash: 9D51B171A043099BCB24DF65C8857EABBF4EF04314F24856FE64AD7241E771D684CBA0
                          APIs
                            • Part of subcall function 00E219CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E19778,?,?,00000034,00000800,?,00000034), ref: 00E219F6
                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E19D21
                            • Part of subcall function 00E21997: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E197A7,?,?,00000800,?,00001073,00000000,?,?), ref: 00E219C1
                            • Part of subcall function 00E218EE: GetWindowThreadProcessId.USER32(?,?), ref: 00E21919
                            • Part of subcall function 00E218EE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E1973C,00000034,?,?,00001004,00000000,00000000), ref: 00E21929
                            • Part of subcall function 00E218EE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E1973C,00000034,?,?,00001004,00000000,00000000), ref: 00E2193F
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E19D8E
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E19DDB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                          • String ID: @
                          • API String ID: 4150878124-2766056989
                          • Opcode ID: c6cf4555cce13468c2e5d6cc253fd6e5937ae384572b829958018da59ce5bca5
                          • Instruction ID: eefacb6b4a7f1c59995c9928127928dc152762815f6905b26a42983dd8d93e90
                          • Opcode Fuzzy Hash: c6cf4555cce13468c2e5d6cc253fd6e5937ae384572b829958018da59ce5bca5
                          • Instruction Fuzzy Hash: D4416C7690121CAFCB10DFA4DC91AEEBBB8EF49700F005095FA45B7191CA716E89CBA1
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00E4F910,00000000,?,?,?,?), ref: 00E47C4E
                          • GetWindowLongW.USER32 ref: 00E47C6B
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00E47C7B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$Long
                          • String ID: SysTreeView32
                          • API String ID: 847901565-1698111956
                          • Opcode ID: 1931a04e0e6721a6f45b0a1d7ad6ca077048daeb6e143113ff08d9af7b077684
                          • Instruction ID: ca6ae4e0b2a3e11eef70f64d0deb54b920b255d30d7ba9ca36e5b264eefe3328
                          • Opcode Fuzzy Hash: 1931a04e0e6721a6f45b0a1d7ad6ca077048daeb6e143113ff08d9af7b077684
                          • Instruction Fuzzy Hash: 5831B231604206AFDB118F34EC45BEA77A9EB49328F205729F8B5B31E0C731E8519BA0
                          APIs
                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00E476D0
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00E476E4
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00E47708
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: SysMonthCal32
                          • API String ID: 2326795674-1439706946
                          • Opcode ID: 4606e9890d282259c4a209a2f89eee1655ee49133ed2e4376f304f48a0e4740b
                          • Instruction ID: c2c156f68a5345f7b09403dd60349fed62189231561c032734c3013e11df91c1
                          • Opcode Fuzzy Hash: 4606e9890d282259c4a209a2f89eee1655ee49133ed2e4376f304f48a0e4740b
                          • Instruction Fuzzy Hash: 3321EF32500218AFDF158EA4DC46FEA3BA9EB48714F111254FE557B1D0DBB1A8508BE0
                          APIs
                          • __snwprintf.LIBCMT ref: 00E33D5A
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __snwprintf_memmove
                          • String ID: , $$AUTOITCALLVARIABLE%d$%
                          • API String ID: 3506404897-3879706725
                          • Opcode ID: 83ff5df09e23d632ff32d92adac9da4936c7dac1fa4c023e58b95acc2d6cb762
                          • Instruction ID: 350da4a098d7f6293edd5d6cc3174e25549a64793326a5641f77f3e387f6008a
                          • Opcode Fuzzy Hash: 83ff5df09e23d632ff32d92adac9da4936c7dac1fa4c023e58b95acc2d6cb762
                          • Instruction Fuzzy Hash: 50216F3160021AAACF10EF64DC86EED7BA5FF44700F505498F409BB182DB30AA41DBB1
                          APIs
                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00E479E1
                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00E479F6
                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00E47A03
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: msctls_trackbar32
                          • API String ID: 3850602802-1010561917
                          • Opcode ID: 0b01f0a59b7d3380f321010b8f3d8c267971d2246bddd2f687f752c863f3b346
                          • Instruction ID: fe3fd35ba295e59cb9717c6e4802b6182075b98a951e44a4d642656eb4be9a40
                          • Opcode Fuzzy Hash: 0b01f0a59b7d3380f321010b8f3d8c267971d2246bddd2f687f752c863f3b346
                          • Instruction Fuzzy Hash: 8111C132654248BAEF149E61DC05FEB37A9EF89B68F024519FA45B6090D372A811DBA0
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00E39009,?,00E4F910), ref: 00E39403
                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00E39415
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetModuleHandleExW$kernel32.dll
                          • API String ID: 2574300362-199464113
                          • Opcode ID: 09fd69cc65a6a4becc781cca1ff9a5fd50613ea6bb83414ae7f9cc540a9ab17a
                          • Instruction ID: 2f74d6732a006ee5aeab835c70662a516ea5c3762a4b52fda4d3ef526ff2cd33
                          • Opcode Fuzzy Hash: 09fd69cc65a6a4becc781cca1ff9a5fd50613ea6bb83414ae7f9cc540a9ab17a
                          • Instruction Fuzzy Hash: 2ED0C234500313CFC7205F31DA4C50776D4AF02741F10D839D495F2651D7B0C480C610
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00DC4C2E), ref: 00DC4CA3
                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00DC4CB5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetNativeSystemInfo$kernel32.dll
                          • API String ID: 2574300362-192647395
                          • Opcode ID: 15e280e7e9b7d2fe7d321a95c75fb0ac94d8f5159d058e3417a21d74b74c9f6e
                          • Instruction ID: 5d6e88512d1d59948fbd7cd154bbc23187f31fcaaec2433fbe92e1985a057dba
                          • Opcode Fuzzy Hash: 15e280e7e9b7d2fe7d321a95c75fb0ac94d8f5159d058e3417a21d74b74c9f6e
                          • Instruction Fuzzy Hash: 82D01274511723CFD7205F31DA18A0676D5AF06B91B15883DD885E6660DA70D480C660
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00DC4CE1,?), ref: 00DC4DA2
                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00DC4DB4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-1355242751
                          • Opcode ID: 3c16b2854dc1e3dd20bbf514123456367b36ee230166ec502c2824e9f483d8bc
                          • Instruction ID: 86eb22d21ba7d2169490417b27cbff1d58b8ac5eaa89c2d2576aa3311e3f961d
                          • Opcode Fuzzy Hash: 3c16b2854dc1e3dd20bbf514123456367b36ee230166ec502c2824e9f483d8bc
                          • Instruction Fuzzy Hash: 8ED01775950713CFD720AF32D818B4676E4AF06BA5B15C87ED8C6E6650EB70D880CA60
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00DC4D2E,?,00DC4F4F,?,00E862F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00DC4D6F
                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00DC4D81
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-3689287502
                          • Opcode ID: 75ee5af55effebd109810dc4f85f0c7cbd318836c25346bd9faa32cc4f029614
                          • Instruction ID: 03f94c8c6778c2144ac334d441da265d3748674446bc52b9dd5a9940db5ec829
                          • Opcode Fuzzy Hash: 75ee5af55effebd109810dc4f85f0c7cbd318836c25346bd9faa32cc4f029614
                          • Instruction Fuzzy Hash: FFD01274510713CFD7205F31D818B1676D8BF16751B19C97DD887E6650D670D480CA60
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fc9868469739cb9d5f008a8258c3d162c3c388a01a0468d50078fe65e55e9510
                          • Instruction ID: 0ab8f6441890e302e9e5ad7914838dd267bf6f6ab90ac3aec8aee787f7fe4583
                          • Opcode Fuzzy Hash: fc9868469739cb9d5f008a8258c3d162c3c388a01a0468d50078fe65e55e9510
                          • Instruction Fuzzy Hash: B1C17E74A04216EFCB14CF94C884EAEB7F5FF88B14B119599E885EB251D730EE81CB90
                          APIs
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • CharLowerBuffW.USER32(?,?), ref: 00E3E3D2
                          • CharLowerBuffW.USER32(?,?), ref: 00E3E415
                            • Part of subcall function 00E3DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00E3DAD9
                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00E3E615
                          • _memmove.LIBCMT ref: 00E3E628
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: BuffCharLower$AllocVirtual_malloc_memmove
                          • String ID:
                          • API String ID: 2789943684-0
                          • Opcode ID: a142ec5939e0206701ae4b00d8d9208115c62d711ae298abd4563ded2ae359bf
                          • Instruction ID: 61d79c59099c8574e82e22e78db72a980bddc337322fa5fcda132211350610a0
                          • Opcode Fuzzy Hash: a142ec5939e0206701ae4b00d8d9208115c62d711ae298abd4563ded2ae359bf
                          • Instruction Fuzzy Hash: 8BC15A716083019FC714DF28C484A6ABBE4FF88718F14896DF899AB391D771E946CF92
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 00E383D8
                          • CoUninitialize.OLE32 ref: 00E383E3
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                            • Part of subcall function 00E1DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00E1DAC5
                          • VariantInit.OLEAUT32(?), ref: 00E383EE
                          • VariantClear.OLEAUT32(?), ref: 00E386BF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize_malloc
                          • String ID:
                          • API String ID: 2241424957-0
                          • Opcode ID: 865571ba6ab21a2597b31ae77a9c22465be06245e3a02ad67040b94909657ef5
                          • Instruction ID: 176868bef721b92efc71298109e4f39493376c0c24dc69acc42c1d2953eda8d6
                          • Opcode Fuzzy Hash: 865571ba6ab21a2597b31ae77a9c22465be06245e3a02ad67040b94909657ef5
                          • Instruction Fuzzy Hash: CCA114752047029FCB10DF25C999B5ABBE4BF88714F15544CF99AAB3A1CB30ED05CB62
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Variant$AllocClearCopyInitString
                          • String ID:
                          • API String ID: 2808897238-0
                          • Opcode ID: 25bda8ae17dc0a476d02da9535a60d2868bff67189b567991983346516510c4e
                          • Instruction ID: 02c746ca74fe103407e6ca3e914d8cd22bdce7a2f3f2358c782c4635dd960b75
                          • Opcode Fuzzy Hash: 25bda8ae17dc0a476d02da9535a60d2868bff67189b567991983346516510c4e
                          • Instruction Fuzzy Hash: E85196747043029ADB20AF65D495BE9B3F5EF4C710F20A81FE596EB291DE70D8C19B11
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memmove$_free_malloc
                          • String ID:
                          • API String ID: 2856543016-0
                          • Opcode ID: fe864b6a8dc752687efbc5489d71340070ff63891141ecc3e2ac9a042ab94cd0
                          • Instruction ID: ec233d3edeb0fc7a6e56a563008ca96e01f8527bb8458a6701e9c7346a3ecdf1
                          • Opcode Fuzzy Hash: fe864b6a8dc752687efbc5489d71340070ff63891141ecc3e2ac9a042ab94cd0
                          • Instruction Fuzzy Hash: 45515CB1A083419FDB24CF29D441B2BBBE5EF85314F48492EE98997361D731E941CBA3
                          APIs
                          • GetWindowRect.USER32(0130E400,?), ref: 00E49AD2
                          • ScreenToClient.USER32(00000002,00000002), ref: 00E49B05
                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00E49B72
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$ClientMoveRectScreen
                          • String ID:
                          • API String ID: 3880355969-0
                          • Opcode ID: dd64c30067dd3e5b8129e4abad31b604ec2f0146c08a225ddb8a6d6c3c81d509
                          • Instruction ID: 2e49763e1e46a6941c75c1a4fd627761498307bfa7fc07ca7441d2c46ee0dde6
                          • Opcode Fuzzy Hash: dd64c30067dd3e5b8129e4abad31b604ec2f0146c08a225ddb8a6d6c3c81d509
                          • Instruction Fuzzy Hash: B9514D34A00209EFCF14DF68E881AAE7BB5FF45324F108259F819BB2A1D730AD41DB94
                          APIs
                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00E36CE4
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E36CF4
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00E36D58
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E36D64
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ErrorLast$__itow__swprintfsocket
                          • String ID:
                          • API String ID: 2214342067-0
                          • Opcode ID: 7e90f517339d4b8aca4f30542dc34bd099d4aba509d5a19c5f4715c86169973f
                          • Instruction ID: f7284c7f2c25d93d44384b139f8251e6b4556b088cb53120fea80530276d23cf
                          • Opcode Fuzzy Hash: 7e90f517339d4b8aca4f30542dc34bd099d4aba509d5a19c5f4715c86169973f
                          • Instruction Fuzzy Hash: D341C274740201AFEB10AF34DC8AF7A7BE9DB04B14F54801CFA19AF2C2DA719C018BA1
                          APIs
                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00E4F910), ref: 00E367BA
                          • _strlen.LIBCMT ref: 00E367EC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _strlen
                          • String ID:
                          • API String ID: 4218353326-0
                          • Opcode ID: e83a294200d87b692a108b681801b14df68c9129fc5c287a0527e15d2977585e
                          • Instruction ID: 884f3197c4b6c84c548f90576080aa09c812f86e6b07b917dcdbfb3a396a3d90
                          • Opcode Fuzzy Hash: e83a294200d87b692a108b681801b14df68c9129fc5c287a0527e15d2977585e
                          • Instruction Fuzzy Hash: 1F41E331A00105AFCB14EBB4DCD9FAEB7A9EF48314F158169F815AB292DB30AD40C760
                          APIs
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00E2BB09
                          • GetLastError.KERNEL32(?,00000000), ref: 00E2BB2F
                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00E2BB54
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00E2BB80
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateHardLink$DeleteErrorFileLast
                          • String ID:
                          • API String ID: 3321077145-0
                          • Opcode ID: 5b2a4a869b1c6fae25c145a385d19077320528abdeb1dd94a00f78f2087b2c24
                          • Instruction ID: 32adc9c450bd46d7d8f3963380c9b660f66cf9bf3ac68afeed6dcc3e082859e0
                          • Opcode Fuzzy Hash: 5b2a4a869b1c6fae25c145a385d19077320528abdeb1dd94a00f78f2087b2c24
                          • Instruction Fuzzy Hash: 17412B39200A11DFCB11EF25D599E5DBBE1EF49714B099498E84AAB362CB34FD01CFA1
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00E48B4D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID:
                          • API String ID: 634782764-0
                          • Opcode ID: 7c0ae72b91ce4bd33766c1785312beff46dff0c61178f531c2236188cfe26ee3
                          • Instruction ID: 396ed97b5d155c5d57db6d2fd266294d6508a4d18308a76b781b45c2eb070018
                          • Opcode Fuzzy Hash: 7c0ae72b91ce4bd33766c1785312beff46dff0c61178f531c2236188cfe26ee3
                          • Instruction Fuzzy Hash: 1B3104B8640204BFEF249E18EE45FED37A4EB05318F246616FA45F72A0CE30AD409751
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 00E4AE1A
                          • GetWindowRect.USER32(?,?), ref: 00E4AE90
                          • PtInRect.USER32(?,?,00E4C304), ref: 00E4AEA0
                          • MessageBeep.USER32(00000000), ref: 00E4AF11
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Rect$BeepClientMessageScreenWindow
                          • String ID:
                          • API String ID: 1352109105-0
                          • Opcode ID: c90b7feb97009939d6e53bede46bbc2872fe47f049655d40dc5141502bf6c230
                          • Instruction ID: 87ba08de20998e844d75fbfd452ed7326105273928456b6b12636c1eb5977dab
                          • Opcode Fuzzy Hash: c90b7feb97009939d6e53bede46bbc2872fe47f049655d40dc5141502bf6c230
                          • Instruction Fuzzy Hash: D041B170640105DFCB15CF59E884B997BF5FF49360F1891B9E428EB261C730A846CF92
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00DF644B
                          • __isleadbyte_l.LIBCMT ref: 00DF6479
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00DF64A7
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00DF64DD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: 4f597d25519881def4a1b5cb8d3785102eed05d38b64cd07a4502cdf6336631e
                          • Instruction ID: 391ddf883bd8eb331b48ba9abd18436570a5c2464c149af4b99814572c399951
                          • Opcode Fuzzy Hash: 4f597d25519881def4a1b5cb8d3785102eed05d38b64cd07a4502cdf6336631e
                          • Instruction Fuzzy Hash: EB31D23160824EAFDB21AF75C845BBA7BB5FF41710F1A8029E96487591D731D890DBB0
                          APIs
                          • GetForegroundWindow.USER32 ref: 00E45189
                            • Part of subcall function 00E2387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E23897
                            • Part of subcall function 00E2387D: GetCurrentThreadId.KERNEL32 ref: 00E2389E
                            • Part of subcall function 00E2387D: AttachThreadInput.USER32(00000000,?,00E252A7), ref: 00E238A5
                          • GetCaretPos.USER32(?), ref: 00E4519A
                          • ClientToScreen.USER32(00000000,?), ref: 00E451D5
                          • GetForegroundWindow.USER32 ref: 00E451DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                          • String ID:
                          • API String ID: 2759813231-0
                          • Opcode ID: 90251c42081bdf97f188cdbfac533dbf02547743e305cba1afb58bf5eca9d5c5
                          • Instruction ID: 41b4b5c2ed04a6a6b8d6bf7c081c95f652fb5bfd2a824c347bb2c448a89f6c3c
                          • Opcode Fuzzy Hash: 90251c42081bdf97f188cdbfac533dbf02547743e305cba1afb58bf5eca9d5c5
                          • Instruction Fuzzy Hash: EC312C76900109AFDB04EFA5D885EEFF7F9EF98300F10406AE415E7241EA759E45CBA0
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • GetCursorPos.USER32(?), ref: 00E4C7C2
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00DFBBFB,?,?,?,?,?), ref: 00E4C7D7
                          • GetCursorPos.USER32(?), ref: 00E4C824
                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00DFBBFB,?,?,?), ref: 00E4C85E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                          • String ID:
                          • API String ID: 2864067406-0
                          • Opcode ID: efdb20515a32fd86f31dd140dee6ec34710a5932b63d9d421dc809dd7ebc2679
                          • Instruction ID: 27ed319fd5e8ad0442e438ac56e86807e74d8d6cf43ac854ad991b94c151c029
                          • Opcode Fuzzy Hash: efdb20515a32fd86f31dd140dee6ec34710a5932b63d9d421dc809dd7ebc2679
                          • Instruction Fuzzy Hash: 3E310F35601018AFCB19CF5AD888EFA7BBAEB0D710F104069F908AB261D331AD50DFA0
                          APIs
                          • __setmode.LIBCMT ref: 00DE0BF2
                            • Part of subcall function 00DC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E27B20,?,?,00000000), ref: 00DC5B8C
                            • Part of subcall function 00DC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E27B20,?,?,00000000,?,?), ref: 00DC5BB0
                          • _fprintf.LIBCMT ref: 00DE0C29
                          • OutputDebugStringW.KERNEL32(?), ref: 00E16331
                            • Part of subcall function 00DE4CDA: _flsall.LIBCMT ref: 00DE4CF3
                          • __setmode.LIBCMT ref: 00DE0C5E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                          • String ID:
                          • API String ID: 521402451-0
                          • Opcode ID: 2c0b05e78b71d1328b5d7b3569c5cd5f4d24071aca1b1877a9189cc68a462f54
                          • Instruction ID: 9f8025033643c16b0b055e0ae670ecc58f3c47c71309fc912c6d84ec1e161da6
                          • Opcode Fuzzy Hash: 2c0b05e78b71d1328b5d7b3569c5cd5f4d24071aca1b1877a9189cc68a462f54
                          • Instruction Fuzzy Hash: 6511E4329042456ECB04B7B6AC46EBEBB69DF85320F24015AF108A71D2DE615DC687B5
                          APIs
                            • Part of subcall function 00E18652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E18669
                            • Part of subcall function 00E18652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E18673
                            • Part of subcall function 00E18652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E18682
                            • Part of subcall function 00E18652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E18689
                            • Part of subcall function 00E18652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E1869F
                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00E18BEB
                          • _memcmp.LIBCMT ref: 00E18C0E
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E18C44
                          • HeapFree.KERNEL32(00000000), ref: 00E18C4B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                          • String ID:
                          • API String ID: 1592001646-0
                          • Opcode ID: 049fe74a08ac2a5be4840aa6da94b8d43a1ea6daf49543b14977586500c440d1
                          • Instruction ID: 3710de35c7b8927119412f1b1a14337b6cbc8c70f4a80afc78eb7dfa489ed529
                          • Opcode Fuzzy Hash: 049fe74a08ac2a5be4840aa6da94b8d43a1ea6daf49543b14977586500c440d1
                          • Instruction Fuzzy Hash: BB216971E02208EFDB10DFA5CA45BEEB7B8EF54358F144059E854B7241DB31AA86CBA1
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00E31A97
                            • Part of subcall function 00E31B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00E31B40
                            • Part of subcall function 00E31B21: InternetCloseHandle.WININET(00000000), ref: 00E31BDD
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Internet$CloseConnectHandleOpen
                          • String ID:
                          • API String ID: 1463438336-0
                          • Opcode ID: 1687a46ffc20617c1336f39c61bc3074417e5ce602481528099ec300082ed664
                          • Instruction ID: 4a1d1c34bb5e27f6f9fb54e1591d569034811f27b813d8404b0900a9593b6c86
                          • Opcode Fuzzy Hash: 1687a46ffc20617c1336f39c61bc3074417e5ce602481528099ec300082ed664
                          • Instruction Fuzzy Hash: FA219F35200601BFDB119F608C09FBABBA9FF45705F10506EFA51A6650EB75D815DBA0
                          APIs
                          • GetFileAttributesW.KERNEL32(?,00E4FAC0), ref: 00E23CA0
                          • GetLastError.KERNEL32 ref: 00E23CAF
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E23CBE
                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00E4FAC0), ref: 00E23D1B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateDirectory$AttributesErrorFileLast
                          • String ID:
                          • API String ID: 2267087916-0
                          • Opcode ID: 37eeb7e505786349e23009cd4d1900c7cc4d7d5be122277ce9ec97ae7274f967
                          • Instruction ID: 2c698a9e530c59de42452b5b80f2f9ca95d792c8b6cf29906f0694a5864be65c
                          • Opcode Fuzzy Hash: 37eeb7e505786349e23009cd4d1900c7cc4d7d5be122277ce9ec97ae7274f967
                          • Instruction Fuzzy Hash: 0221D6745083119F8310DF34E88189AB7E8EF56758F145A1DF499E72A1DB30DE4ACF62
                          APIs
                            • Part of subcall function 00E1F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00E1E1C4,?,?,?,00E1EFB7,00000000,000000EF,00000119,?,?), ref: 00E1F5BC
                            • Part of subcall function 00E1F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00E1F5E2
                            • Part of subcall function 00E1F5AD: lstrcmpiW.KERNEL32(00000000,?,00E1E1C4,?,?,?,00E1EFB7,00000000,000000EF,00000119,?,?), ref: 00E1F613
                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00E1EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00E1E1DD
                            • Part of subcall function 00DE0FF6: _malloc.LIBCMT ref: 00DE100E
                          • lstrcpyW.KERNEL32(00000000,?), ref: 00E1E203
                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E1EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00E1E237
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: lstrcmpilstrcpylstrlen$_malloc
                          • String ID: cdecl
                          • API String ID: 3850814276-3896280584
                          • Opcode ID: e6211a3cfd04231927f6a3a07967beeb57e516fb10278906e8b68dd4b80d43ac
                          • Instruction ID: efbfd722753ccb2b9e6f5b1cd7e0dabb70961fcf5c41b4138d1a9a32e9a74ce2
                          • Opcode Fuzzy Hash: e6211a3cfd04231927f6a3a07967beeb57e516fb10278906e8b68dd4b80d43ac
                          • Instruction Fuzzy Hash: 3911D03A200341EFCB25AF64DC45DBA77A9FF89710B40902AF806DB260EB71D891C7A0
                          APIs
                          • _memset.LIBCMT ref: 00DC4560
                            • Part of subcall function 00DC410D: _memset.LIBCMT ref: 00DC418D
                            • Part of subcall function 00DC410D: _wcscpy.LIBCMT ref: 00DC41E1
                            • Part of subcall function 00DC410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DC41F1
                          • KillTimer.USER32(?,00000001,?,?), ref: 00DC45B5
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00DC45C4
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00DFD6CE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                          • String ID:
                          • API String ID: 1378193009-0
                          • Opcode ID: 47f59e8a8fece02a02dd249d34ae1a947668bb954d15d59f9871d315fc4bb14c
                          • Instruction ID: 1efc194b66ae94b86eb520ff20c822e8d4c2083023b3f1cb731376dc5ae6ff98
                          • Opcode Fuzzy Hash: 47f59e8a8fece02a02dd249d34ae1a947668bb954d15d59f9871d315fc4bb14c
                          • Instruction Fuzzy Hash: 5621D770904788AFEB328B24D859FF7BBED9F01304F04409EE79EA7241C7745A899B61
                          APIs
                            • Part of subcall function 00DC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00E27B20,?,?,00000000), ref: 00DC5B8C
                            • Part of subcall function 00DC5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00E27B20,?,?,00000000,?,?), ref: 00DC5BB0
                          • gethostbyname.WSOCK32(?,?,?), ref: 00E366AC
                          • WSAGetLastError.WSOCK32(00000000), ref: 00E366B7
                          • _memmove.LIBCMT ref: 00E366E4
                          • inet_ntoa.WSOCK32(?), ref: 00E366EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                          • String ID:
                          • API String ID: 1504782959-0
                          • Opcode ID: d1ed22d670a6857b413a676da3ff991639cdfb6692a69597b03de4aec544d169
                          • Instruction ID: 83dbc3b33363cff685422373fef23db2ee3abe715759e6002eb64457ed83bb19
                          • Opcode Fuzzy Hash: d1ed22d670a6857b413a676da3ff991639cdfb6692a69597b03de4aec544d169
                          • Instruction Fuzzy Hash: 1C115E36500509AFCB04EBA5EE9AEEEB7B9EF08710B144069F506B7161DF30AE44CB71
                          APIs
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E19043
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E19055
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E1906B
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E19086
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: eedea39c56fad8b70629ff81c8091a487824b2ea41bf0c65707303d80acbd528
                          • Instruction ID: 4f4940ce403f4bac863c074195d5f33f78c36124a2e6283554bf4e6a612487c9
                          • Opcode Fuzzy Hash: eedea39c56fad8b70629ff81c8091a487824b2ea41bf0c65707303d80acbd528
                          • Instruction Fuzzy Hash: BE115A79901218FFEB10DFA5CC84EEDBBB8FB48710F2040A5EA04B7290D6726E50DB90
                          APIs
                            • Part of subcall function 00DC2612: GetWindowLongW.USER32(?,000000EB), ref: 00DC2623
                          • DefDlgProcW.USER32(?,00000020,?), ref: 00DC12D8
                          • GetClientRect.USER32(?,?), ref: 00DFB84B
                          • GetCursorPos.USER32(?), ref: 00DFB855
                          • ScreenToClient.USER32(?,?), ref: 00DFB860
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Client$CursorLongProcRectScreenWindow
                          • String ID:
                          • API String ID: 4127811313-0
                          • Opcode ID: 9a14361dc91c4ac9f3030411b2feff6424faf88bf733165f3303912243d8c93c
                          • Instruction ID: 4585ab1eb2f9ef53dad6c2466b24fdacada75cc45d03ee2add66ceec1640352b
                          • Opcode Fuzzy Hash: 9a14361dc91c4ac9f3030411b2feff6424faf88bf733165f3303912243d8c93c
                          • Instruction Fuzzy Hash: 6B11EC3D90012AAFDB10DF95D886EBEB7B8FB06301F10445AE951E7151C730AA568BB9
                          APIs
                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00DC1D73
                          • GetStockObject.GDI32(00000011), ref: 00DC1D87
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00DC1D91
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CreateMessageObjectSendStockWindow
                          • String ID:
                          • API String ID: 3970641297-0
                          • Opcode ID: b17e7eabfc41a09749413f38365c5c25c7d77492ca63f4de70f536e82c31ee84
                          • Instruction ID: 03956cccd9a8c0926c7556c50fff2d60507cfe32d5c35c7cc07a7daf87a13623
                          • Opcode Fuzzy Hash: b17e7eabfc41a09749413f38365c5c25c7d77492ca63f4de70f536e82c31ee84
                          • Instruction Fuzzy Hash: 23118E76501229BFDF018F90DC44FEA7B69EF0A764F154119FA0553111C731DC659BB0
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00E201FD,?,00E21250,?,00008000), ref: 00E2166F
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00E201FD,?,00E21250,?,00008000), ref: 00E21694
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00E201FD,?,00E21250,?,00008000), ref: 00E2169E
                          • Sleep.KERNEL32(?,?,?,?,?,?,?,00E201FD,?,00E21250,?,00008000), ref: 00E216D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuerySleep
                          • String ID:
                          • API String ID: 2875609808-0
                          • Opcode ID: 779efe3fa971b471df0734b9cc11aabc7a5bca05d1e4cb2fb6d2d66e2dfd604d
                          • Instruction ID: 97177d725089cc4ec8a481d1048a57edcb9c3206d09aa8cc55ce0e88e55c18bd
                          • Opcode Fuzzy Hash: 779efe3fa971b471df0734b9cc11aabc7a5bca05d1e4cb2fb6d2d66e2dfd604d
                          • Instruction Fuzzy Hash: 98113C31C0152DDBCF00AFA6E948AEEBB78FF19751F054095E944B6240CB3056A4CBE6
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00E1DD3E
                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00E1DD55
                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00E1DD6A
                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00E1DD88
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Type$Register$FileLoadModuleNameUser
                          • String ID:
                          • API String ID: 1352324309-0
                          • Opcode ID: 8ae079107a550e87161a6819e165fb6a71ce5ba568dd442df4e61b81c89fcfd7
                          • Instruction ID: 38c1b096a57f197be659c67eb430b0bbdd05f71820efc49df2ee95ffca90f8e1
                          • Opcode Fuzzy Hash: 8ae079107a550e87161a6819e165fb6a71ce5ba568dd442df4e61b81c89fcfd7
                          • Instruction Fuzzy Hash: 90115EB5205314EFE720CF11EC48BD2BBBCEF01B18F108669A556E6150D7B0E989DBA1
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction ID: 4b9cc1de67c057dde2e115ce276a08a19b7724a375e2df6d331ae42ff6e9f10e
                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction Fuzzy Hash: 4A014C3604814EBBCF125E84DC018EE3F62BF69355B5AC615FB5858031D237C9B2ABA5
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00E4B59E
                          • ScreenToClient.USER32(?,?), ref: 00E4B5B6
                          • ScreenToClient.USER32(?,?), ref: 00E4B5DA
                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00E4B5F5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ClientRectScreen$InvalidateWindow
                          • String ID:
                          • API String ID: 357397906-0
                          • Opcode ID: af7fdd9febb8a440d6e11353566e7b242e09a0b497765d819769826b32f501e1
                          • Instruction ID: 7e556acdbe1fe0224f6641058d7deada6281724e720b127743a03de1423b430c
                          • Opcode Fuzzy Hash: af7fdd9febb8a440d6e11353566e7b242e09a0b497765d819769826b32f501e1
                          • Instruction Fuzzy Hash: A81146B9D00209EFDB41CF99D4449EEFBF5FB09310F104166E915E3220D735AA558F91
                          APIs
                          • _memset.LIBCMT ref: 00E4B8FE
                          • _memset.LIBCMT ref: 00E4B90D
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00E87F20,00E87F64), ref: 00E4B93C
                          • CloseHandle.KERNEL32 ref: 00E4B94E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _memset$CloseCreateHandleProcess
                          • String ID:
                          • API String ID: 3277943733-0
                          • Opcode ID: f0e329acbbd3469a6be0c9bf9fc26e8febe9dd095a90ea04c33925ab6cab6cfe
                          • Instruction ID: 564dfe55c2e04f430723b1e25103d9fcdb477301e1d9fc35c899c22399bbf78f
                          • Opcode Fuzzy Hash: f0e329acbbd3469a6be0c9bf9fc26e8febe9dd095a90ea04c33925ab6cab6cfe
                          • Instruction Fuzzy Hash: 25F05EB2658310BFE2103B67AC0AFBB3A9CEB09755F101060FB4CF6192D771990487B8
                          APIs
                            • Part of subcall function 00DC12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00DC134D
                            • Part of subcall function 00DC12F3: SelectObject.GDI32(?,00000000), ref: 00DC135C
                            • Part of subcall function 00DC12F3: BeginPath.GDI32(?), ref: 00DC1373
                            • Part of subcall function 00DC12F3: SelectObject.GDI32(?,00000000), ref: 00DC139C
                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00E4C030
                          • LineTo.GDI32(00000000,?,?), ref: 00E4C03D
                          • EndPath.GDI32(00000000), ref: 00E4C04D
                          • StrokePath.GDI32(00000000), ref: 00E4C05B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                          • String ID:
                          • API String ID: 1539411459-0
                          • Opcode ID: 264b9ea22ef54327a06b541668216cfdcbc580b95f4294d8ff663c0f45af5504
                          • Instruction ID: 549282bb92c3c3a57a4ded90aef065c5232b6bdd2bbc91d5d38b72ca80e74050
                          • Opcode Fuzzy Hash: 264b9ea22ef54327a06b541668216cfdcbc580b95f4294d8ff663c0f45af5504
                          • Instruction Fuzzy Hash: 5DF0BE39002269FFDB226F52AC0EFCE3F58AF06710F144000FA15320E287B5055ACBA5
                          APIs
                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00E1A399
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E1A3AC
                          • GetCurrentThreadId.KERNEL32 ref: 00E1A3B3
                          • AttachThreadInput.USER32(00000000), ref: 00E1A3BA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                          • String ID:
                          • API String ID: 2710830443-0
                          • Opcode ID: bd10ed6bdd4cc193d05ab86e49838fd76230dd0731981846847768d44a94594d
                          • Instruction ID: a003588233c585bf101ca45d9d70715be4a4131570e46b13bf7a65db637011ef
                          • Opcode Fuzzy Hash: bd10ed6bdd4cc193d05ab86e49838fd76230dd0731981846847768d44a94594d
                          • Instruction Fuzzy Hash: ECE01571542228BAEB211FA2DC0CFEB7E5CEF16BA1F048075F909A4060C671C5858BE0
                          APIs
                          • GetSysColor.USER32(00000008), ref: 00DC2231
                          • SetTextColor.GDI32(?,000000FF), ref: 00DC223B
                          • SetBkMode.GDI32(?,00000001), ref: 00DC2250
                          • GetStockObject.GDI32(00000005), ref: 00DC2258
                          • GetWindowDC.USER32(?,00000000), ref: 00DFC0D3
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00DFC0E0
                          • GetPixel.GDI32(00000000,?,00000000), ref: 00DFC0F9
                          • GetPixel.GDI32(00000000,00000000,?), ref: 00DFC112
                          • GetPixel.GDI32(00000000,?,?), ref: 00DFC132
                          • ReleaseDC.USER32(?,00000000), ref: 00DFC13D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                          • String ID:
                          • API String ID: 1946975507-0
                          • Opcode ID: b85f819f7d9dd4bcbe95176fe188454cbd282928d1920402e18cc62e010a337b
                          • Instruction ID: 9daf090d25b3776f5e75c273d9c442bf0c486fbbe80385c52e2d8967dddfa719
                          • Opcode Fuzzy Hash: b85f819f7d9dd4bcbe95176fe188454cbd282928d1920402e18cc62e010a337b
                          • Instruction Fuzzy Hash: C5E06D36500248EEEB215FA5FC0DBE87B10EB06736F048366FB69681E287714996DB21
                          APIs
                          • GetCurrentThread.KERNEL32 ref: 00E18C63
                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00E1882E), ref: 00E18C6A
                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00E1882E), ref: 00E18C77
                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00E1882E), ref: 00E18C7E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CurrentOpenProcessThreadToken
                          • String ID:
                          • API String ID: 3974789173-0
                          • Opcode ID: 3602a8783bbcedc8d9d2bcaf062be4927b63fb680a0be6f04d31c737333a390b
                          • Instruction ID: d1f0a3963183d43cbfc3ab9413ef548732adbc79620a598f5d4fca743d55f41c
                          • Opcode Fuzzy Hash: 3602a8783bbcedc8d9d2bcaf062be4927b63fb680a0be6f04d31c737333a390b
                          • Instruction Fuzzy Hash: 35E0863A642211DFD7205FB66E0CB977BACEF92B96F054828F245E9050DA34848ACB61
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID:
                          • String ID: %
                          • API String ID: 0-2291192146
                          • Opcode ID: 515b86ee452d4c076487f02341d74adb465f259550b68b44bce97a13932a1163
                          • Instruction ID: 1b701d43f6e182cc5d52aae632a16bb4c149bba0f8718c22e89045b899ffc36e
                          • Opcode Fuzzy Hash: 515b86ee452d4c076487f02341d74adb465f259550b68b44bce97a13932a1163
                          • Instruction Fuzzy Hash: 67B16C7590420B9ACF14EF98C481FEEB7B4EF44310F64412EE952A7295DA34DE82CBB1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: __itow_s
                          • String ID: xr$xr
                          • API String ID: 3653519197-2528877900
                          • Opcode ID: dc34f60ed04ab49dc6f6394a00a7eca244eafe4987a279b183f7958fe81ef859
                          • Instruction ID: 65eaedc81b18ea63362f5ffd3bcc02b169e9788778da81e2fa1e91dcbf5bd4eb
                          • Opcode Fuzzy Hash: dc34f60ed04ab49dc6f6394a00a7eca244eafe4987a279b183f7958fe81ef859
                          • Instruction Fuzzy Hash: 74B19170A00109EFCB14DF54C895EBEBBB9FF58304F149559FA46AB252EB70E941CB60
                          APIs
                            • Part of subcall function 00DDFEC6: _wcscpy.LIBCMT ref: 00DDFEE9
                            • Part of subcall function 00DC9997: __itow.LIBCMT ref: 00DC99C2
                            • Part of subcall function 00DC9997: __swprintf.LIBCMT ref: 00DC9A0C
                          • __wcsnicmp.LIBCMT ref: 00E2B298
                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00E2B361
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                          • String ID: LPT
                          • API String ID: 3222508074-1350329615
                          • Opcode ID: 6dbffba1dc8ff2eeccccadaeb5652897c027b5ef1a88991a1211ea361717e404
                          • Instruction ID: 7bab96765ca6ef369cae42d313578b998378b62346d85310f4d8d00be364c01c
                          • Opcode Fuzzy Hash: 6dbffba1dc8ff2eeccccadaeb5652897c027b5ef1a88991a1211ea361717e404
                          • Instruction Fuzzy Hash: 24616176A00225EFCB14EF94D895EEEB7B4EF08710F15506AF546BB291DB70AE40CB60
                          APIs
                          • Sleep.KERNEL32(00000000), ref: 00DD2AC8
                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00DD2AE1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: GlobalMemorySleepStatus
                          • String ID: @
                          • API String ID: 2783356886-2766056989
                          • Opcode ID: 749870e8af16ddcd6163cc982756af3b300c9f2dd3202e63d25e7510eff3a494
                          • Instruction ID: 744ad8972d6f371a7591aefd810498e6ca8409991fd3fd2f78c5b20384c55c6f
                          • Opcode Fuzzy Hash: 749870e8af16ddcd6163cc982756af3b300c9f2dd3202e63d25e7510eff3a494
                          • Instruction Fuzzy Hash: 655148724187459BD320AF11D89AFABBBE8FF84310F42485DF1D9921A5DB708529CB26
                          APIs
                            • Part of subcall function 00DC506B: __fread_nolock.LIBCMT ref: 00DC5089
                          • _wcscmp.LIBCMT ref: 00E29AAE
                          • _wcscmp.LIBCMT ref: 00E29AC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: _wcscmp$__fread_nolock
                          • String ID: FILE
                          • API String ID: 4029003684-3121273764
                          • Opcode ID: aeee313f08806482ea77db88e1b60d9a456707f27ae4fd86de4bf35e807e62b2
                          • Instruction ID: 2a4d51184a0253d3bb611aca795facfa88d4932846041e47414b33eb53c8b30f
                          • Opcode Fuzzy Hash: aeee313f08806482ea77db88e1b60d9a456707f27ae4fd86de4bf35e807e62b2
                          • Instruction Fuzzy Hash: 8E41D671A0061ABADF20AAA0EC46FEFB7BDEF45714F000079F904F7185DA75AA4487B1
                          APIs
                          • _memset.LIBCMT ref: 00E32892
                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00E328C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CrackInternet_memset
                          • String ID: |
                          • API String ID: 1413715105-2343686810
                          • Opcode ID: f2a89882e8e2daf20c4e26981abe01d7052f89ce977fa431c9849cb5be9b7747
                          • Instruction ID: 162657d1b814cd63df26fe53fbb1730a4c6a4536a56a9259654d385e2709628d
                          • Opcode Fuzzy Hash: f2a89882e8e2daf20c4e26981abe01d7052f89ce977fa431c9849cb5be9b7747
                          • Instruction Fuzzy Hash: 6D310771C0011AAFCF01AFA5DC89EEEBFB9FF08310F104069F915A6166DA315A56DBB0
                          APIs
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00E47DD0
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00E47DE5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: '
                          • API String ID: 3850602802-1997036262
                          • Opcode ID: 80dd5a97e5b734eed6d1fa6bb0a234b06c03754db986400c4ba5f577cd4caf21
                          • Instruction ID: 7f459092fc0733bb0387c65297829cec816fee4c98031e907837a9f03dc0e66e
                          • Opcode Fuzzy Hash: 80dd5a97e5b734eed6d1fa6bb0a234b06c03754db986400c4ba5f577cd4caf21
                          • Instruction Fuzzy Hash: 77412874E0520A9FDB14CF69D881BEA7BB5FF0A304F10116AE949EB341D730A941CFA0
                          APIs
                          • DestroyWindow.USER32(?,?,?,?), ref: 00E46D86
                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00E46DC2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Window$DestroyMove
                          • String ID: static
                          • API String ID: 2139405536-2160076837
                          • Opcode ID: f47ed4133e877b18630141599a2432ed27f7984816e089ffca24717f7b13efe3
                          • Instruction ID: e017eea4c87c2005f1f573aed374910b6218f744504e3701742c58756f7d35ca
                          • Opcode Fuzzy Hash: f47ed4133e877b18630141599a2432ed27f7984816e089ffca24717f7b13efe3
                          • Instruction Fuzzy Hash: 19319E71610604AEEB109F64DC80FFB73B8FF89724F109619F9A9A7190CA31AC95CB61
                          APIs
                          • _memset.LIBCMT ref: 00E22E00
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00E22E3B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: InfoItemMenu_memset
                          • String ID: 0
                          • API String ID: 2223754486-4108050209
                          • Opcode ID: adee014e58744609bb2a8d1bfa67916502f9bb4a5ab252b7b58c44dab25e13da
                          • Instruction ID: c7a9322a2f811f93ebfd33c8367597bdc14ef0fc723d119dc3f62d110af4f77a
                          • Opcode Fuzzy Hash: adee014e58744609bb2a8d1bfa67916502f9bb4a5ab252b7b58c44dab25e13da
                          • Instruction Fuzzy Hash: 37310931600329BBEB269F59E8457EEBBB5FF05304F15106DEA85B71A0D7709944EB20
                          APIs
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00E469D0
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00E469DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: Combobox
                          • API String ID: 3850602802-2096851135
                          • Opcode ID: 4a8d905bf42eabb5f205bb20128ce63407a896875bafa8cb7102290011f744fb
                          • Instruction ID: 981b05cd54f19d83c846b3b48e6dfc3f38b4bcdb169b1d3aa6bc7f26cf436eac
                          • Opcode Fuzzy Hash: 4a8d905bf42eabb5f205bb20128ce63407a896875bafa8cb7102290011f744fb
                          • Instruction Fuzzy Hash: 8011B271600209AFEF159E14DC80EFB376AEBDA3A8F115125FA58AB290D6B1DC5187A0
                          APIs
                          • GetWindowTextLengthW.USER32(00000000), ref: 00E46C11
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00E46C20
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: LengthMessageSendTextWindow
                          • String ID: edit
                          • API String ID: 2978978980-2167791130
                          • Opcode ID: 1d7c49a5c1f7d48d9d4f331f954484d450e2ad0b780c4ec106257d72aa70e5c9
                          • Instruction ID: 59be4850200fa43af441f74ce9772555cd958ada2503d44385c7bbc4ca8bcfa6
                          • Opcode Fuzzy Hash: 1d7c49a5c1f7d48d9d4f331f954484d450e2ad0b780c4ec106257d72aa70e5c9
                          • Instruction Fuzzy Hash: 2011BC71500208AFEB108E64EC81AFB37A9EB06378F205724F965E71E0C775DC919B61
                          APIs
                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00E32520
                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00E32549
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: Internet$OpenOption
                          • String ID: <local>
                          • API String ID: 942729171-4266983199
                          • Opcode ID: e6b9529ebcf861f85637bc407641a67076c673ed7e7148aad7f23a9ed9c084cc
                          • Instruction ID: 0de954326b7fb06a1b2844b0084f14e9f732065460a4052dddb060c9dce4cd14
                          • Opcode Fuzzy Hash: e6b9529ebcf861f85637bc407641a67076c673ed7e7148aad7f23a9ed9c084cc
                          • Instruction Fuzzy Hash: 7111A070501225BEDB248F618C9DEFBFF68FF06755F10912EFA85A6040D2706A45DAE2
                          APIs
                            • Part of subcall function 00E3830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00E380C8,?,00000000,?,?), ref: 00E38322
                          • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00E380CB
                          • htons.WSOCK32(00000000,?,00000000), ref: 00E38108
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ByteCharMultiWidehtonsinet_addr
                          • String ID: 255.255.255.255
                          • API String ID: 2496851823-2422070025
                          • Opcode ID: cde72c37cbfeecde7c7da8697782e90df4cd5328dc5ccca80df9721ae7b38edf
                          • Instruction ID: 0c01ce4c9dc0069cf339a3741502ff7e2fea17ffeaa6e7e9f0b4f7b26c476047
                          • Opcode Fuzzy Hash: cde72c37cbfeecde7c7da8697782e90df4cd5328dc5ccca80df9721ae7b38edf
                          • Instruction Fuzzy Hash: CF11CE34200305ABDB20AF64DD8AFEEB764EF44324F10952AF911A7291DA72A855C6A1
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E1B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00E1B0E7
                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00E19355
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: c16df6272bfcaea258246bd3809fcadaf97c86b3698a6f97465a3b84a1f48c74
                          • Instruction ID: c61d2152baa60f13996ad7b34e45fc7528230c4149d28ade207f607a98154282
                          • Opcode Fuzzy Hash: c16df6272bfcaea258246bd3809fcadaf97c86b3698a6f97465a3b84a1f48c74
                          • Instruction Fuzzy Hash: 5101DE71A01215AB8B04EBA0CCA1DFE73A9FF06320B101659F832A72D2DB3169488670
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00DC3C26,00E862F8,?,?,?), ref: 00DD0ACE
                            • Part of subcall function 00DC7D2C: _memmove.LIBCMT ref: 00DC7D66
                          • _wcscat.LIBCMT ref: 00E050E1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: FullNamePath_memmove_wcscat
                          • String ID: c
                          • API String ID: 257928180-921687731
                          • Opcode ID: bd2fe89cb59a26f221b3ee5d77b9ffac1a9d95ed845e95cb1150e4cb21bb3aa7
                          • Instruction ID: bb6a16c4486dc889dcccb054c50a2c5f826db637942d8bac832e8eb856582d8e
                          • Opcode Fuzzy Hash: bd2fe89cb59a26f221b3ee5d77b9ffac1a9d95ed845e95cb1150e4cb21bb3aa7
                          • Instruction Fuzzy Hash: 421165359042099B8B11FB74DC02F9D77B8EF88354F0140A7B99DE7251EA70DA888B31
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E1B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00E1B0E7
                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E1924D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: 33232afe91ba6bed16acd8487e2a0be7ef5f451a516e57b4150f61c9289be95d
                          • Instruction ID: f47ae7c8be24602e7335ab1184ab0e29e631a503c564cfdc0d2e6a7df99ae038
                          • Opcode Fuzzy Hash: 33232afe91ba6bed16acd8487e2a0be7ef5f451a516e57b4150f61c9289be95d
                          • Instruction Fuzzy Hash: B9018471A41205BBCB04EBA0D9A2EFF73A8DF05340F141159B91677292EA216E4CD6B1
                          APIs
                            • Part of subcall function 00DC7F41: _memmove.LIBCMT ref: 00DC7F82
                            • Part of subcall function 00E1B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00E1B0E7
                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00E192D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: d3a682f47d27cbd00fe09edca30c4dec6d82e0ad3c07f4ba68192a192675592e
                          • Instruction ID: fe3c491961f4def0a38f3ca11842aa4ba3714f0a11821dbd35bb20ce4550c59e
                          • Opcode Fuzzy Hash: d3a682f47d27cbd00fe09edca30c4dec6d82e0ad3c07f4ba68192a192675592e
                          • Instruction Fuzzy Hash: 3E01F271A41209BBCB00EAA0D892EFF73ECDF05340F241019B802B3292DA216E4C9671
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp
                          • String ID: #32770
                          • API String ID: 2292705959-463685578
                          • Opcode ID: 081f9f1ce70df5ab27c088b6d0f33b00d80d396992b4f33f94f9b112fc692382
                          • Instruction ID: f6bdb19fdcd5eae2fc62302172254e3f92bae0ff02e07460ad9cbf3ef756e43e
                          • Opcode Fuzzy Hash: 081f9f1ce70df5ab27c088b6d0f33b00d80d396992b4f33f94f9b112fc692382
                          • Instruction Fuzzy Hash: 53E02B335003285BD710A696AC09AA7F7ACEB41721F000067F914E3050E560990587E0
                          APIs
                            • Part of subcall function 00DFB564: _memset.LIBCMT ref: 00DFB571
                            • Part of subcall function 00DE0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00DFB540,?,?,?,00DC100A), ref: 00DE0B89
                          • IsDebuggerPresent.KERNEL32(?,?,?,00DC100A), ref: 00DFB544
                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00DC100A), ref: 00DFB553
                          Strings
                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00DFB54E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1273690437.0000000000DC1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00DC0000, based on PE: true
                          • Associated: 00000000.00000002.1273625139.0000000000DC0000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273770399.0000000000E75000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273830469.0000000000E7F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1273855655.0000000000E88000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_dc0000_DHL_67329033929228____________________________.jbxd
                          Similarity
                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                          • API String ID: 3158253471-631824599
                          • Opcode ID: ea1aca5282a6ebaa76f6afcf47d87293629786cc8c0e1a866a6c1fceb51cb254
                          • Instruction ID: 91acb339aa7a14a59259b06db80d2338a4f8aa77f4cecc2f7532ca0a877590cd
                          • Opcode Fuzzy Hash: ea1aca5282a6ebaa76f6afcf47d87293629786cc8c0e1a866a6c1fceb51cb254
                          • Instruction Fuzzy Hash: F2E06D742007158FD721DF2AE4087527BE0EB00B68F05C92EE546D7360DBB9D448CB71