Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe

Overview

General Information

Sample name:Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
Analysis ID:1446729
MD5:a09a09c68544d2bb8dfc72f93a3f5291
SHA1:2731e2f42310b2b9114a43778f18455a4fe78bb9
SHA256:967e07ed35fc477b00fe777c8bd4f5e7ead02d2581987bb75f6386a485799078
Tags:AgentTeslaDHlESPexegeo
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "urchman@elquijotebanquetes.com", "Password": "-GN,s*KH{VEhPmo)+f"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3275f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x327d1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3285b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x328ed:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32957:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x329c9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32a5f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x32aef:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2f897:$s2: GetPrivateProfileString
                • 0x2ef0c:$s3: get_OSFullName
                • 0x305df:$s5: remove_Key
                • 0x30767:$s5: remove_Key
                • 0x31704:$s6: FtpWebRequest
                • 0x32741:$s7: logins
                • 0x32cb3:$s7: logins
                • 0x359b8:$s7: logins
                • 0x35a76:$s7: logins
                • 0x373c9:$s7: logins
                • 0x36610:$s9: 1.85 (Hash, version 2, native byte-order)
                7.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "urchman@elquijotebanquetes.com", "Password": "-GN,s*KH{VEhPmo)+f"}
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeReversingLabs: Detection: 44%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeJoe Sandbox ML: detected
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1294409097.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1295030994.0000000003C80000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1294409097.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1295030994.0000000003C80000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A54696 GetFileAttributesW,FindFirstFileW,FindClose,5_2_00A54696
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_00A5C9C7
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5C93C FindFirstFileW,FindClose,5_2_00A5C93C
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00A5F200
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00A5F35D
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_00A5F65E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A53A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00A53A2B
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A53D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00A53D4E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_00A5BF27

                  Networking

                  barindex
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A625E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,5_2_00A625E2
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
                  Source: RegSvcs.exe, 00000007.00000002.2539056022.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002D00000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002CE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000007.00000002.2539056022.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002CE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, umlRMRbjNqD.cs.Net Code: HekSQQsMT
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A6425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,5_2_00A6425A
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A64458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00A64458
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A6425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,5_2_00A6425A
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A50219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,5_2_00A50219
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A7CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,5_2_00A7CDAC

                  System Summary

                  barindex
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: This is a third-party compiled AutoIt script.5_2_009F3B4C
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bdcdca89-7
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_570db7f3-e
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_101f1021-2
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f59924c3-e
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A540B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,5_2_00A540B1
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A48858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,5_2_00A48858
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,5_2_00A5545F
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009FE8005_2_009FE800
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1DBB55_2_00A1DBB5
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A7804A5_2_00A7804A
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009FE0605_2_009FE060
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A041405_2_00A04140
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A124055_2_00A12405
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A265225_2_00A26522
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A706655_2_00A70665
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A2267E5_2_00A2267E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1283A5_2_00A1283A
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A068435_2_00A06843
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A289DF5_2_00A289DF
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A26A945_2_00A26A94
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A70AE25_2_00A70AE2
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A08A0E5_2_00A08A0E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A4EB075_2_00A4EB07
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A58B135_2_00A58B13
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1CD615_2_00A1CD61
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A270065_2_00A27006
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A031905_2_00A03190
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A0710E5_2_00A0710E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F12875_2_009F1287
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A133C75_2_00A133C7
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1F4195_2_00A1F419
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A056805_2_00A05680
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A116C45_2_00A116C4
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A058C05_2_00A058C0
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A178D35_2_00A178D3
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A11BB85_2_00A11BB8
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A29D055_2_00A29D05
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009FFE405_2_009FFE40
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1BFE65_2_00A1BFE6
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A11FD05_2_00A11FD0
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00B936605_2_00B93660
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00FFA6E87_2_00FFA6E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00FFD9607_2_00FFD960
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00FF4A887_2_00FF4A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00FF3E707_2_00FF3E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00FF41B87_2_00FF41B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_063C25887_2_063C2588
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_063C13D87_2_063C13D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_063C3D287_2_063C3D28
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_063C36407_2_063C3640
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: String function: 00A18B40 appears 42 times
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: String function: 00A10D27 appears 70 times
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: String function: 009F7F41 appears 35 times
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1294800365.0000000003C03000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1295030994.0000000003DAD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename07823960-0dbd-43bb-aade-b6626acc7f4a.exe0 vs Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, v9Lsz.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, VFo.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, 5FJ0H20tobu.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, NtdoTGO.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, XBsYgp.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, AwxUa2Na.csCryptographic APIs: 'CreateDecryptor'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, 19C9FfZ.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, 19C9FfZ.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, soCD8XkwU.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, soCD8XkwU.csCryptographic APIs: 'TransformFinalBlock'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/1
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5A2D5 GetLastError,FormatMessageW,5_2_00A5A2D5
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A48713 AdjustTokenPrivileges,CloseHandle,5_2_00A48713
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A48CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,5_2_00A48CC3
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,5_2_00A5B59E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A6F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,5_2_00A6F121
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A686D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,5_2_00A686D0
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,5_2_009F4FE9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeFile created: C:\Users\user\AppData\Local\Temp\autE51E.tmpJump to behavior
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000007.00000002.2539056022.0000000002D1D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002D30000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeReversingLabs: Detection: 44%
                  Source: unknownProcess created: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe "C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe"
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe"
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1294409097.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1295030994.0000000003C80000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1294409097.0000000003AE0000.00000004.00001000.00020000.00000000.sdmp, Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000003.1295030994.0000000003C80000.00000004.00001000.00020000.00000000.sdmp
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A6C304 LoadLibraryA,GetProcAddress,5_2_00A6C304
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A18B85 push ecx; ret 5_2_00A18B98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_063CCCB2 push es; ret 7_2_063CCCC0
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeFile created: \aviso de cuenta vencida de dhl - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeFile created: \aviso de cuenta vencida de dhl - 1606622076_865764325678976645423546567678967564423567890008765 .exeJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_009F4A35
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A755FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,5_2_00A755FD
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A133C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,5_2_00A133C7
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe PID: 6288, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002D00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_5-100532
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeAPI coverage: 5.1 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A54696 GetFileAttributesW,FindFirstFileW,FindClose,5_2_00A54696
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,5_2_00A5C9C7
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5C93C FindFirstFileW,FindClose,5_2_00A5C93C
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00A5F200
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_00A5F35D
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_00A5F65E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A53A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00A53A2B
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A53D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_00A53D4E
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A5BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,5_2_00A5BF27
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_009F4AFE
                  Source: RegSvcs.exe, 00000007.00000002.2539056022.0000000002D00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000007.00000002.2539056022.0000000002D00000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                  Source: RegSvcs.exe, 00000007.00000002.2539959789.0000000005F6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeAPI call chain: ExitProcess graph end nodegraph_5-99933

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_00FF7078 CheckRemoteDebuggerPresent,7_2_00FF7078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A641FD BlockInput,5_2_00A641FD
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,5_2_009F3B4C
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A25CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,5_2_00A25CCC
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A6C304 LoadLibraryA,GetProcAddress,5_2_00A6C304
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00B934F0 mov eax, dword ptr fs:[00000030h]5_2_00B934F0
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00B93550 mov eax, dword ptr fs:[00000030h]5_2_00B93550
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00B91ED0 mov eax, dword ptr fs:[00000030h]5_2_00B91ED0
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A481F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,5_2_00A481F7
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00A1A395
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1A364 SetUnhandledExceptionFilter,5_2_00A1A364
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A13008Jump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A48C93 LogonUserW,5_2_00A48C93
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,5_2_009F3B4C
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_009F4A35
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A54EF5 mouse_event,5_2_00A54EF5
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe"Jump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A481F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,5_2_00A481F7
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A54C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,5_2_00A54C03
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A1886B cpuid 5_2_00A1886B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A250D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_00A250D7
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A32230 GetUserNameW,5_2_00A32230
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A2418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,5_2_00A2418A
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_009F4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_009F4AFE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe PID: 6288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1428, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: WIN_81
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: WIN_XP
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: WIN_XPe
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: WIN_VISTA
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: WIN_7
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: WIN_8
                  Source: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000007.00000002.2539056022.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe PID: 6288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1428, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 7.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe.1c80000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe PID: 6288, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1428, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A66596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,5_2_00A66596
                  Source: C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exeCode function: 5_2_00A66A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,5_2_00A66A5A
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  121
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS38
                  System Information Discovery
                  Distributed Component Object Model121
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  2
                  Valid Accounts
                  LSA Secrets551
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
                  Virtualization/Sandbox Evasion
                  Cached Domain Credentials22
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                  Access Token Manipulation
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                  Process Injection
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe45%ReversingLabsWin32.Trojan.Leonem
                  Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://account.dyn.com/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  http://ip-api.com/line/?fields=hosting0%URL Reputationsafe
                  http://ip-api.com0%URL Reputationsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bg.microsoft.map.fastly.net
                  199.232.214.172
                  truefalse
                    unknown
                    ip-api.com
                    208.95.112.1
                    truetrue
                      unknown
                      198.187.3.20.in-addr.arpa
                      unknown
                      unknownfalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        http://ip-api.com/line/?fields=hostingfalse
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://account.dyn.com/Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe, 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000007.00000002.2539056022.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002CE6000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ip-api.comRegSvcs.exe, 00000007.00000002.2539056022.0000000002C21000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002CE6000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.2539056022.0000000002D00000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        208.95.112.1
                        ip-api.comUnited States
                        53334TUT-ASUStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1446729
                        Start date and time:2024-05-23 20:20:11 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 59s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:13
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/4@2/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 57
                        • Number of non-executed functions: 281
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        No simulations
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        208.95.112.1nv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
                        • ip-api.com/line/?fields=hosting
                        y9vR6M5sU6.exeGet hashmaliciousAsyncRAT, XWormBrowse
                        • ip-api.com/line/?fields=hosting
                        doc023571961504.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • ip-api.com/line/?fields=hosting
                        SecuriteInfo.com.Trojan.PackedNET.2595.1466.2669.exeGet hashmaliciousAsyncRAT, DcRat, StormKitty, VenomRATBrowse
                        • ip-api.com/line/?fields=hosting
                        PO_23052024.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        MOLEX 436500304-10000.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        rPurchaseOrderPO05232024.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • ip-api.com/line/?fields=hosting
                        t3h7DNer1Q.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                        • ip-api.com/line/?fields=hosting
                        INVOICE.jsGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        C30XdMP03R.exeGet hashmaliciousAgentTeslaBrowse
                        • ip-api.com/line/?fields=hosting
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ip-api.comnv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
                        • 208.95.112.1
                        y9vR6M5sU6.exeGet hashmaliciousAsyncRAT, XWormBrowse
                        • 208.95.112.1
                        doc023571961504.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 208.95.112.1
                        SecuriteInfo.com.Trojan.PackedNET.2595.1466.2669.exeGet hashmaliciousAsyncRAT, DcRat, StormKitty, VenomRATBrowse
                        • 208.95.112.1
                        PO_23052024.exeGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        MOLEX 436500304-10000.exeGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        rPurchaseOrderPO05232024.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 208.95.112.1
                        t3h7DNer1Q.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                        • 208.95.112.1
                        INVOICE.jsGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        C30XdMP03R.exeGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        bg.microsoft.map.fastly.nethttp://ahmetorak.com/neuromarketGet hashmaliciousHTMLPhisherBrowse
                        • 199.232.210.172
                        https://steamcommunnittly.com/gift/activation/feor37565hFh6dseGet hashmaliciousUnknownBrowse
                        • 199.232.214.172
                        windows.vbsGet hashmaliciousAsyncRAT, GuLoaderBrowse
                        • 199.232.210.172
                        https://sites.google.com/view/bakcsa3/?yj0&d=DwMFaQGet hashmaliciousUnknownBrowse
                        • 199.232.210.172
                        https://js.schema-forms.orgGet hashmaliciousUnknownBrowse
                        • 199.232.210.172
                        http://al.levels.fyiGet hashmaliciousUnknownBrowse
                        • 199.232.214.172
                        https://github.com/ustaxes/UsTaxes/files/15378217/All.2023.Tax.Documents.zipGet hashmaliciousUnknownBrowse
                        • 199.232.210.172
                        https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:90c503cb-cf61-4be1-b108-1df5bcac434aGet hashmaliciousUnknownBrowse
                        • 199.232.214.172
                        https://invitebowlcheckout.info/bowlGet hashmaliciousHTMLPhisherBrowse
                        • 199.232.214.172
                        https://community.tcpsoftware.com/apex/TCPSurveySupport?case_Id=500PU00000ChAtHGet hashmaliciousUnknownBrowse
                        • 199.232.214.172
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        TUT-ASUSnv6mqExGOo.exeGet hashmaliciousAsyncRAT, XWormBrowse
                        • 208.95.112.1
                        y9vR6M5sU6.exeGet hashmaliciousAsyncRAT, XWormBrowse
                        • 208.95.112.1
                        doc023571961504.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 208.95.112.1
                        SecuriteInfo.com.Trojan.PackedNET.2595.1466.2669.exeGet hashmaliciousAsyncRAT, DcRat, StormKitty, VenomRATBrowse
                        • 208.95.112.1
                        PO_23052024.exeGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        MOLEX 436500304-10000.exeGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        rPurchaseOrderPO05232024.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        • 208.95.112.1
                        t3h7DNer1Q.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                        • 208.95.112.1
                        INVOICE.jsGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        C30XdMP03R.exeGet hashmaliciousAgentTeslaBrowse
                        • 208.95.112.1
                        No context
                        No context
                        Process:C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        File Type:data
                        Category:dropped
                        Size (bytes):244736
                        Entropy (8bit):6.764091911831273
                        Encrypted:false
                        SSDEEP:6144:Uz3cI9fXkTrO94LDDJe4RGMGlJOkdu0KAbdlH3lVTud0ygGy+4W:Vq0e94HDJJ4XNJyY6
                        MD5:47CBE248319B809FEF99A08D83DC1D8E
                        SHA1:4BA6A137EE07499D327492AECCE66EE84A876100
                        SHA-256:2675A20C4B882ED7E337814CAF1CBEBD7B04C98370F4B08E2FDA80177811658D
                        SHA-512:3D2F81845E38F8521D54DDCC9E0E4C071212E9016991A8AA9659D2A82360BB3714B18BEC1737D1D2A04CBBA297937D74FA1A7F37AB5196618084F88D568D9822
                        Malicious:false
                        Reputation:low
                        Preview:...D14K1URMH..HG.AV6WCVS.D24K1QRMHB7HGFAV6WCVSDD24K1QRMHB7HG.AV6Y\.]D.;.j.P..i._!4f1$Y017>d'SZ%^%r/-bE=)f(8....s)+VQe<\XiHB7HGFA.sWC.RGD...TQRMHB7HG.AT7\B]SD.14K9QRMHB7.EAV.WCV.GD24.1QrMHB5HGBAV6WCVS@D24K1QRMhF7HEFAV6WCTS..24[1QBMHB7XGFQV6WCVSTD24K1QRMHB7(.EA.6WCV.GD.1K1QRMHB7HGFAV6WCVSDD64G1QRMHB7HGFAV6WCVSDD24K1QRMHB7HGFAV6WCVSDD24K1QRMHB7HgFA^6WCVSDD24K1YrMH.7HGFAV6WCVSj0WL?1QR..A7HgFAV.TCVQDD24K1QRMHB7HGfAVVy1%!'D24.4QRM.A7HAFAV.TCVSDD24K1QRMH.7H.h33Z8 VSHD24K1URMJB7H.EAV6WCVSDD24K1.RM.B7HGFAV6WCVSDD24..RRMHB7.GFAT6RC..FD>.J1RRMHC7HAFAV6WCVSDD24K1QRMHB7HGFAV6WCVSDD24K1QRMHB7HGFAV6J.....z..LoX/O... .B..D..*..=u^.*F...qE....p6P..D.;{..D...2.ISOV......T@@_:.?m8).[..j.~w'...2%.+...<..)@e.....ug....>%....C..%.;.63&?!jaU-P#;.J.6HGFA.......[L.k|QBVv%0....cQ......51QR)HB7:GFA76WC.SDD]4K1?RMH<7HG8AV6.CVS.D24|1QRhHB7%GFAr6WC(SDD.ID>..!1..GFAV6b..c.)...n.e...9.8.4....7...nNb.]%.5t....X..(..S.Y2h..ULNF2J@BBZ.Y....e00O4SUIKN.F......e.}..:...2.KHGFAV6.CV.DD2..1.RMH.7.G..V6W.S.D.4..R
                        Process:C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        File Type:data
                        Category:dropped
                        Size (bytes):154642
                        Entropy (8bit):7.912920264857487
                        Encrypted:false
                        SSDEEP:3072:NOF71aWl8hxsbBxHnvmUdP6bQJiNjCvxgOJcucNYsc7zVH6Z+5kq1son5:MByubvySiN2AuGdQzVYPo5
                        MD5:9408F6BD0BD322D47F9CEB001E017439
                        SHA1:A018CC5DA10F9619F9D60717108B6C76353DEF6A
                        SHA-256:9C2BF59CA16D843CE1C2BE324C117F95AC94DA194129AD3FEDC191ED88C522A2
                        SHA-512:54F67F9AEFFB31E8B096B57E003F21C01A6F8F5ACA9F09088957E2F524603A49BE254E0957681BD31363AF1D7002F50BF5196D3057B86F31A7252442F03E4099
                        Malicious:false
                        Reputation:low
                        Preview:EA06......z.I..1.....".G.Pj.j...S.Q&@..D.X.M..z0..h......X..=..'.w..bj....-_..,..%fa1...z.jK^......{).J'.h.2.s.....,.X..,f.s...U*=....U..5...&...v.D..M...ly..Z.Z,..l.....cQ....ZE...5.....i."..a..N...M+s......Q.....U.1.(.X#.`..u& ._<.iG.......=..^...d.....v.0..'.....A.,..J...Q.X.l...Z.1..d...h.,j.....a...7|.).".h...S..Z.H...s.P.....M|...6..a...5 ....,U&.*...F.O.t....C.n.....-R...^_.z.@........z...D.y.Z.\..^.J...l&.E.r7....mP.Ch....#...9.?..e.....m.....B....~u...g...o..yo.y<....IsR....<...4..>?..z..}.s...Ia.].N...Ie...g&..mV....#..)[.....e2???..[.@-w...v..">...c.....w.5..% .......n......O.7....8.." c........J.X\...@.a...'....C1.m.B+...c.Jty~.Ge.fq...fq..C.[.l.......MvK... ........#[..Z.2._.5Ze:.2.P(T*.....j..Y..4..i4.t*...n0Q}%.....:i.K..L....lj(un..a...u....o.. 4G.SS.Q9.N^.R.I.uY$..5...i,.Q2.. vX,..8.V&.9.U*....x....V.u".L..)0..Z.........M.Q.1.=..~...w.tN.2.Xtu9d..B..d.j.Ji..U.t.4.M..jT...aA..*.j...Q...SJ|n.P.Mf.zE....P*.:..D..".}}N....`V....<..7.H..J..,.+
                        Process:C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        File Type:data
                        Category:dropped
                        Size (bytes):9910
                        Entropy (8bit):7.600108801561331
                        Encrypted:false
                        SSDEEP:192:yyaFcTokxCW/EeiNo/GONuVROF9cfsSEy0OAbTbx1oDpRCO7ygdZ:cFxkUWceiNo3NiWe0OA/xmyAZ
                        MD5:A55B8FBC1D090D4337180338B38580F7
                        SHA1:9939183108827B5897694ECE2D692E884624A926
                        SHA-256:4D45609B0172593292E355B84AC5B65440F3E2A0DEC1159B7E6B73411302DA83
                        SHA-512:278FD36120692C4178BE03399CDCF0FF44ABF2EEE754A3E4741E66E121ED5BB75E42BAE4DAB9E2583626A968BCA8460EDFC789E71CEA231CECF2ABE55310B900
                        Malicious:false
                        Reputation:low
                        Preview:EA06..p4.M(...aD..fT)..D.Mh.z,.gA....5.......B.Mh..%.mF.Mf....qb.....-..c.L...$.m5...k..c0.M....k8.X.3i...l..%.o2....A8.6,.........3k....e.N&s0.oNf.)...k.K$.eb....5..f.........6.0.o.p....l39....V0...S..$.if...6....f.I...@.....i8........X@.4.1..........$.P...0z.5..$}3Y.....=5..`d....!d..V...7f.[$..8...|.I..W.d...|vI..W.d...|vK..W.d...|vK(.W.e...|vY..W,.O...k.`..X@..9..^.8..F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn.
                        Process:C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        File Type:ASCII text, with very long lines (28724), with no line terminators
                        Category:dropped
                        Size (bytes):28724
                        Entropy (8bit):3.5991309076111695
                        Encrypted:false
                        SSDEEP:768:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNboE+I026c024vfF3if6l:ViTZ+2QoioGRk6ZklputwjpjBkCiw2Ru
                        MD5:64A9ACDC42A40402C11E6650E97D688B
                        SHA1:0D9DA7748D6D7795F51F4690914A4FEF690E31C1
                        SHA-256:35DF740D849D42360987C7CA2409E496DFA1D2300C65061D246A619CE8C0619F
                        SHA-512:66DCBF6163149B1F06B2B32CF1457E1B63905AA8F931127F2059ADE71899B08F30C5B55C57F763896351C0C872D1924F6472F62E76A8D0A8E2D69438909B4CAA
                        Malicious:false
                        Reputation:low
                        Preview:84F98E0D192B10FD05E7E43AEF7957D5930866ABD5D0DA6FF50x558bec81eccc0200005657b86b00000066894584b96500000066894d86ba7200000066895588b86e0000006689458ab96500000066894d8cba6c0000006689558eb83300000066894590b93200000066894d92ba2e00000066895594b86400000066894596b96c00000066894d98ba6c0000006689559a33c06689459cb96e00000066898d44ffffffba7400000066899546ffffffb86400000066898548ffffffb96c00000066898d4affffffba6c0000006689954cffffffb82e0000006689854effffffb96400000066898d50ffffffba6c00000066899552ffffffb86c00000066898554ffffff33c966898d56ffffffba75000000668955d0b873000000668945d2b96500000066894dd4ba72000000668955d6b833000000668945d8b93200000066894ddaba2e000000668955dcb864000000668945deb96c00000066894de0ba6c000000668955e233c0668945e4b96100000066898d68ffffffba640000006689956affffffb8760000006689856cffffffb96100000066898d6effffffba7000000066899570ffffffb86900000066898572ffffffb93300000066898d74ffffffba3200000066899576ffffffb82e00000066898578ffffffb96400000066898d7affffffba6c0000006689957cffffffb86c0000
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.950487886245301
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        File size:1'047'040 bytes
                        MD5:a09a09c68544d2bb8dfc72f93a3f5291
                        SHA1:2731e2f42310b2b9114a43778f18455a4fe78bb9
                        SHA256:967e07ed35fc477b00fe777c8bd4f5e7ead02d2581987bb75f6386a485799078
                        SHA512:82f59bacfb64548b1d929f7cfe394e56a49892060e23c1dd26229d025157a73da56715fd4ca34c4384f2e094d4b997fcf039a53506d8120a56cd14b424936dc1
                        SSDEEP:24576:BAHnh+eWsN3skA4RV1Hom2KXMmHad4d2s6fIo3oHi5:Yh+ZkldoPK8Yadzs6fd
                        TLSH:D0259D0273D1C036FFABA2739B6AF24556BD79254133852F13981DB9BC701B2263E663
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                        Icon Hash:aaf3e3e3938382a0
                        Entrypoint:0x42800a
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                        Time Stamp:0x664E3005 [Wed May 22 17:48:53 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                        Instruction
                        call 00007FE57D1B6ECDh
                        jmp 00007FE57D1A9C84h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        push edi
                        push esi
                        mov esi, dword ptr [esp+10h]
                        mov ecx, dword ptr [esp+14h]
                        mov edi, dword ptr [esp+0Ch]
                        mov eax, ecx
                        mov edx, ecx
                        add eax, esi
                        cmp edi, esi
                        jbe 00007FE57D1A9E0Ah
                        cmp edi, eax
                        jc 00007FE57D1AA16Eh
                        bt dword ptr [004C41FCh], 01h
                        jnc 00007FE57D1A9E09h
                        rep movsb
                        jmp 00007FE57D1AA11Ch
                        cmp ecx, 00000080h
                        jc 00007FE57D1A9FD4h
                        mov eax, edi
                        xor eax, esi
                        test eax, 0000000Fh
                        jne 00007FE57D1A9E10h
                        bt dword ptr [004BF324h], 01h
                        jc 00007FE57D1AA2E0h
                        bt dword ptr [004C41FCh], 00000000h
                        jnc 00007FE57D1A9FADh
                        test edi, 00000003h
                        jne 00007FE57D1A9FBEh
                        test esi, 00000003h
                        jne 00007FE57D1A9F9Dh
                        bt edi, 02h
                        jnc 00007FE57D1A9E0Fh
                        mov eax, dword ptr [esi]
                        sub ecx, 04h
                        lea esi, dword ptr [esi+04h]
                        mov dword ptr [edi], eax
                        lea edi, dword ptr [edi+04h]
                        bt edi, 03h
                        jnc 00007FE57D1A9E13h
                        movq xmm1, qword ptr [esi]
                        sub ecx, 08h
                        lea esi, dword ptr [esi+08h]
                        movq qword ptr [edi], xmm1
                        lea edi, dword ptr [edi+08h]
                        test esi, 00000007h
                        je 00007FE57D1A9E65h
                        bt esi, 03h
                        Programming Language:
                        • [ASM] VS2013 build 21005
                        • [ C ] VS2013 build 21005
                        • [C++] VS2013 build 21005
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        • [ASM] VS2013 UPD5 build 40629
                        • [RES] VS2013 build 21005
                        • [LNK] VS2013 UPD5 build 40629
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x3524c.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000x7134.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xc80000x3524c0x3540094d082f20098be179bb4823b961ea603False0.8754126320422535data7.76588694735726IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xfe0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                        RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                        RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                        RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                        RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                        RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                        RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                        RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                        RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                        RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                        RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                        RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                        RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                        RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                        RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                        RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                        RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                        RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                        RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                        RT_RCDATA0xd07b80x2c4e2data1.000363688462259
                        RT_GROUP_ICON0xfcc9c0x76dataEnglishGreat Britain0.6610169491525424
                        RT_GROUP_ICON0xfcd140x14dataEnglishGreat Britain1.25
                        RT_GROUP_ICON0xfcd280x14dataEnglishGreat Britain1.15
                        RT_GROUP_ICON0xfcd3c0x14dataEnglishGreat Britain1.25
                        RT_VERSION0xfcd500x10cdataEnglishGreat Britain0.5932835820895522
                        RT_MANIFEST0xfce5c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                        DLLImport
                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                        PSAPI.DLLGetProcessMemoryInfo
                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                        UxTheme.dllIsThemeActive
                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                        Language of compilation systemCountry where language is spokenMap
                        EnglishGreat Britain
                        TimestampSource PortDest PortSource IPDest IP
                        May 23, 2024 20:21:00.565254927 CEST4970680192.168.2.9208.95.112.1
                        May 23, 2024 20:21:00.596893072 CEST8049706208.95.112.1192.168.2.9
                        May 23, 2024 20:21:00.596963882 CEST4970680192.168.2.9208.95.112.1
                        May 23, 2024 20:21:00.598212957 CEST4970680192.168.2.9208.95.112.1
                        May 23, 2024 20:21:00.611932993 CEST8049706208.95.112.1192.168.2.9
                        May 23, 2024 20:21:01.127446890 CEST8049706208.95.112.1192.168.2.9
                        May 23, 2024 20:21:01.174150944 CEST4970680192.168.2.9208.95.112.1
                        May 23, 2024 20:21:51.094973087 CEST8049706208.95.112.1192.168.2.9
                        May 23, 2024 20:21:51.095139980 CEST4970680192.168.2.9208.95.112.1
                        May 23, 2024 20:22:41.145209074 CEST4970680192.168.2.9208.95.112.1
                        May 23, 2024 20:22:41.165139914 CEST8049706208.95.112.1192.168.2.9
                        TimestampSource PortDest PortSource IPDest IP
                        May 23, 2024 20:21:00.154925108 CEST5556153192.168.2.91.1.1.1
                        May 23, 2024 20:21:00.559776068 CEST53555611.1.1.1192.168.2.9
                        May 23, 2024 20:21:30.218046904 CEST5361167162.159.36.2192.168.2.9
                        May 23, 2024 20:21:30.718543053 CEST6308353192.168.2.91.1.1.1
                        May 23, 2024 20:21:30.764018059 CEST53630831.1.1.1192.168.2.9
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        May 23, 2024 20:21:00.154925108 CEST192.168.2.91.1.1.10x3039Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                        May 23, 2024 20:21:30.718543053 CEST192.168.2.91.1.1.10x1569Standard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        May 23, 2024 20:20:54.946274042 CEST1.1.1.1192.168.2.90xfb72No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                        May 23, 2024 20:20:54.946274042 CEST1.1.1.1192.168.2.90xfb72No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                        May 23, 2024 20:21:00.559776068 CEST1.1.1.1192.168.2.90x3039No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                        May 23, 2024 20:21:30.764018059 CEST1.1.1.1192.168.2.90x1569Name error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                        • ip-api.com
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.949706208.95.112.1801428C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        TimestampBytes transferredDirectionData
                        May 23, 2024 20:21:00.598212957 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                        Host: ip-api.com
                        Connection: Keep-Alive
                        May 23, 2024 20:21:01.127446890 CEST175INHTTP/1.1 200 OK
                        Date: Thu, 23 May 2024 18:21:00 GMT
                        Content-Type: text/plain; charset=utf-8
                        Content-Length: 6
                        Access-Control-Allow-Origin: *
                        X-Ttl: 60
                        X-Rl: 44
                        Data Raw: 66 61 6c 73 65 0a
                        Data Ascii: false


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:5
                        Start time:14:20:57
                        Start date:23/05/2024
                        Path:C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe"
                        Imagebase:0x9f0000
                        File size:1'047'040 bytes
                        MD5 hash:A09A09C68544D2BB8DFC72F93A3F5291
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000005.00000002.1307190607.0000000001C80000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low
                        Has exited:true

                        Target ID:7
                        Start time:14:20:58
                        Start date:23/05/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765 .exe"
                        Imagebase:0x820000
                        File size:45'984 bytes
                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2535799149.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2539056022.0000000002C55000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.9%
                          Dynamic/Decrypted Code Coverage:0.4%
                          Signature Coverage:6%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:183
                          execution_graph 99313 a17e93 99314 a17e9f __initptd 99313->99314 99350 a1a048 GetStartupInfoW 99314->99350 99316 a17ea4 99352 a18dbc GetProcessHeap 99316->99352 99318 a17efc 99319 a17f07 99318->99319 99435 a17fe3 58 API calls 3 library calls 99318->99435 99353 a19d26 99319->99353 99322 a17f0d 99323 a17f18 __RTC_Initialize 99322->99323 99436 a17fe3 58 API calls 3 library calls 99322->99436 99374 a1d812 99323->99374 99326 a17f27 99327 a17f33 GetCommandLineW 99326->99327 99437 a17fe3 58 API calls 3 library calls 99326->99437 99393 a25173 GetEnvironmentStringsW 99327->99393 99330 a17f32 99330->99327 99333 a17f4d 99334 a17f58 99333->99334 99438 a132f5 58 API calls 3 library calls 99333->99438 99403 a24fa8 99334->99403 99337 a17f5e 99338 a17f69 99337->99338 99439 a132f5 58 API calls 3 library calls 99337->99439 99417 a1332f 99338->99417 99341 a17f71 99342 a17f7c __wwincmdln 99341->99342 99440 a132f5 58 API calls 3 library calls 99341->99440 99423 9f492e 99342->99423 99345 a17f90 99346 a17f9f 99345->99346 99441 a13598 58 API calls _doexit 99345->99441 99442 a13320 58 API calls _doexit 99346->99442 99349 a17fa4 __initptd 99351 a1a05e 99350->99351 99351->99316 99352->99318 99443 a133c7 36 API calls 2 library calls 99353->99443 99355 a19d2b 99444 a19f7c InitializeCriticalSectionAndSpinCount __mtinitlocks 99355->99444 99357 a19d34 99445 a19d9c 61 API calls 2 library calls 99357->99445 99358 a19d30 99358->99357 99446 a19fca TlsAlloc 99358->99446 99361 a19d46 99361->99357 99363 a19d51 99361->99363 99362 a19d39 99362->99322 99447 a18a15 99363->99447 99366 a19d93 99455 a19d9c 61 API calls 2 library calls 99366->99455 99369 a19d72 99369->99366 99371 a19d78 99369->99371 99370 a19d98 99370->99322 99454 a19c73 58 API calls 3 library calls 99371->99454 99373 a19d80 GetCurrentThreadId 99373->99322 99375 a1d81e __initptd 99374->99375 99467 a19e4b 99375->99467 99377 a1d825 99378 a18a15 __calloc_crt 58 API calls 99377->99378 99380 a1d836 99378->99380 99379 a1d8a1 GetStartupInfoW 99387 a1d8b6 99379->99387 99388 a1d9e5 99379->99388 99380->99379 99381 a1d841 __initptd @_EH4_CallFilterFunc@8 99380->99381 99381->99326 99382 a1daad 99476 a1dabd LeaveCriticalSection _doexit 99382->99476 99384 a18a15 __calloc_crt 58 API calls 99384->99387 99385 a1da32 GetStdHandle 99385->99388 99386 a1da45 GetFileType 99386->99388 99387->99384 99387->99388 99389 a1d904 99387->99389 99388->99382 99388->99385 99388->99386 99475 a1a06b InitializeCriticalSectionAndSpinCount 99388->99475 99389->99388 99390 a1d938 GetFileType 99389->99390 99474 a1a06b InitializeCriticalSectionAndSpinCount 99389->99474 99390->99389 99394 a17f43 99393->99394 99395 a25184 99393->99395 99399 a24d6b GetModuleFileNameW 99394->99399 99516 a18a5d 58 API calls 2 library calls 99395->99516 99397 a251aa _memmove 99398 a251c0 FreeEnvironmentStringsW 99397->99398 99398->99394 99400 a24d9f _wparse_cmdline 99399->99400 99402 a24ddf _wparse_cmdline 99400->99402 99517 a18a5d 58 API calls 2 library calls 99400->99517 99402->99333 99404 a24fc1 __NMSG_WRITE 99403->99404 99408 a24fb9 99403->99408 99405 a18a15 __calloc_crt 58 API calls 99404->99405 99413 a24fea __NMSG_WRITE 99405->99413 99406 a25041 99407 a12f95 _free 58 API calls 99406->99407 99407->99408 99408->99337 99409 a18a15 __calloc_crt 58 API calls 99409->99413 99410 a25066 99411 a12f95 _free 58 API calls 99410->99411 99411->99408 99413->99406 99413->99408 99413->99409 99413->99410 99414 a2507d 99413->99414 99518 a24857 58 API calls __mbstowcs_s_l 99413->99518 99519 a19006 IsProcessorFeaturePresent 99414->99519 99416 a25089 99416->99337 99418 a1333b __IsNonwritableInCurrentImage 99417->99418 99542 a1a711 99418->99542 99420 a13359 __initterm_e 99422 a13378 __cinit __IsNonwritableInCurrentImage 99420->99422 99545 a12f80 99420->99545 99422->99341 99424 9f4948 99423->99424 99434 9f49e7 99423->99434 99425 9f4982 IsThemeActive 99424->99425 99580 a135ac 99425->99580 99429 9f49ae 99592 9f4a5b SystemParametersInfoW SystemParametersInfoW 99429->99592 99431 9f49ba 99593 9f3b4c 99431->99593 99433 9f49c2 SystemParametersInfoW 99433->99434 99434->99345 99435->99319 99436->99323 99437->99330 99441->99346 99442->99349 99443->99355 99444->99358 99445->99362 99446->99361 99449 a18a1c 99447->99449 99450 a18a57 99449->99450 99452 a18a3a 99449->99452 99456 a25446 99449->99456 99450->99366 99453 a1a026 TlsSetValue 99450->99453 99452->99449 99452->99450 99464 a1a372 Sleep 99452->99464 99453->99369 99454->99373 99455->99370 99457 a25451 99456->99457 99462 a2546c 99456->99462 99458 a2545d 99457->99458 99457->99462 99465 a18d68 58 API calls __getptd_noexit 99458->99465 99460 a2547c RtlAllocateHeap 99460->99462 99463 a25462 99460->99463 99462->99460 99462->99463 99466 a135e1 DecodePointer 99462->99466 99463->99449 99464->99452 99465->99463 99466->99462 99468 a19e5c 99467->99468 99469 a19e6f EnterCriticalSection 99467->99469 99477 a19ed3 99468->99477 99469->99377 99471 a19e62 99471->99469 99501 a132f5 58 API calls 3 library calls 99471->99501 99474->99389 99475->99388 99476->99381 99478 a19edf __initptd 99477->99478 99479 a19f00 99478->99479 99480 a19ee8 99478->99480 99489 a19f21 __initptd 99479->99489 99505 a18a5d 58 API calls 2 library calls 99479->99505 99502 a1a3ab 58 API calls __NMSG_WRITE 99480->99502 99482 a19eed 99503 a1a408 58 API calls 5 library calls 99482->99503 99485 a19f15 99487 a19f2b 99485->99487 99488 a19f1c 99485->99488 99486 a19ef4 99504 a132df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99486->99504 99492 a19e4b __lock 58 API calls 99487->99492 99506 a18d68 58 API calls __getptd_noexit 99488->99506 99489->99471 99494 a19f32 99492->99494 99495 a19f57 99494->99495 99496 a19f3f 99494->99496 99508 a12f95 99495->99508 99507 a1a06b InitializeCriticalSectionAndSpinCount 99496->99507 99499 a19f4b 99514 a19f73 LeaveCriticalSection _doexit 99499->99514 99502->99482 99503->99486 99505->99485 99506->99489 99507->99499 99509 a12f9e RtlFreeHeap 99508->99509 99513 a12fc7 __dosmaperr 99508->99513 99510 a12fb3 99509->99510 99509->99513 99515 a18d68 58 API calls __getptd_noexit 99510->99515 99512 a12fb9 GetLastError 99512->99513 99513->99499 99514->99489 99515->99512 99516->99397 99517->99402 99518->99413 99520 a19011 99519->99520 99525 a18e99 99520->99525 99524 a1902c 99524->99416 99526 a18eb3 _memset ___raise_securityfailure 99525->99526 99527 a18ed3 IsDebuggerPresent 99526->99527 99533 a1a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 99527->99533 99530 a18f97 ___raise_securityfailure 99534 a1c836 99530->99534 99531 a18fba 99532 a1a380 GetCurrentProcess TerminateProcess 99531->99532 99532->99524 99533->99530 99535 a1c840 IsProcessorFeaturePresent 99534->99535 99536 a1c83e 99534->99536 99538 a25b5a 99535->99538 99536->99531 99541 a25b09 5 API calls 2 library calls 99538->99541 99540 a25c3d 99540->99531 99541->99540 99543 a1a714 EncodePointer 99542->99543 99543->99543 99544 a1a72e 99543->99544 99544->99420 99548 a12e84 99545->99548 99547 a12f8b 99547->99422 99549 a12e90 __initptd 99548->99549 99556 a13457 99549->99556 99555 a12eb7 __initptd 99555->99547 99557 a19e4b __lock 58 API calls 99556->99557 99558 a12e99 99557->99558 99559 a12ec8 DecodePointer DecodePointer 99558->99559 99560 a12ef5 99559->99560 99561 a12ea5 99559->99561 99560->99561 99573 a189e4 59 API calls __mbstowcs_s_l 99560->99573 99570 a12ec2 99561->99570 99563 a12f58 EncodePointer EncodePointer 99563->99561 99564 a12f07 99564->99563 99565 a12f2c 99564->99565 99574 a18aa4 61 API calls 2 library calls 99564->99574 99565->99561 99568 a12f46 EncodePointer 99565->99568 99575 a18aa4 61 API calls 2 library calls 99565->99575 99568->99563 99569 a12f40 99569->99561 99569->99568 99576 a13460 99570->99576 99573->99564 99574->99565 99575->99569 99579 a19fb5 LeaveCriticalSection 99576->99579 99578 a12ec7 99578->99555 99579->99578 99581 a19e4b __lock 58 API calls 99580->99581 99582 a135b7 DecodePointer EncodePointer 99581->99582 99645 a19fb5 LeaveCriticalSection 99582->99645 99584 9f49a7 99585 a13614 99584->99585 99586 a13638 99585->99586 99587 a1361e 99585->99587 99586->99429 99587->99586 99646 a18d68 58 API calls __getptd_noexit 99587->99646 99589 a13628 99647 a18ff6 9 API calls __mbstowcs_s_l 99589->99647 99591 a13633 99591->99429 99592->99431 99594 9f3b59 __write_nolock 99593->99594 99648 9f77c7 99594->99648 99598 9f3b8c IsDebuggerPresent 99599 9f3b9a 99598->99599 99600 a2d4ad MessageBoxA 99598->99600 99601 a2d4c7 99599->99601 99602 9f3bb7 99599->99602 99632 9f3c73 99599->99632 99600->99601 99872 9f7373 59 API calls Mailbox 99601->99872 99734 9f73e5 99602->99734 99603 9f3c7a SetCurrentDirectoryW 99606 9f3c87 Mailbox 99603->99606 99606->99433 99607 a2d4d7 99612 a2d4ed SetCurrentDirectoryW 99607->99612 99609 9f3bd5 GetFullPathNameW 99750 9f7d2c 99609->99750 99611 9f3c10 99759 a00a8d 99611->99759 99612->99606 99615 9f3c2e 99616 9f3c38 99615->99616 99873 a54c03 AllocateAndInitializeSid CheckTokenMembership FreeSid 99615->99873 99775 9f3a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 99616->99775 99619 a2d50a 99619->99616 99623 a2d51b 99619->99623 99622 9f3c42 99624 9f3c55 99622->99624 99783 9f43db 99622->99783 99874 9f4864 99623->99874 99794 a00b30 99624->99794 99632->99603 99645->99584 99646->99589 99647->99591 99901 a10ff6 99648->99901 99650 9f77e8 99651 a10ff6 Mailbox 59 API calls 99650->99651 99652 9f3b63 GetCurrentDirectoryW 99651->99652 99653 9f3778 99652->99653 99654 9f77c7 59 API calls 99653->99654 99655 9f378e 99654->99655 99939 9f3d43 99655->99939 99657 9f37ac 99658 9f4864 61 API calls 99657->99658 99659 9f37c0 99658->99659 99660 9f7f41 59 API calls 99659->99660 99661 9f37cd 99660->99661 99953 9f4f3d 99661->99953 99664 9f37ee Mailbox 99977 9f81a7 99664->99977 99665 a2d3ae 100024 a597e5 99665->100024 99668 a2d3cd 99671 a12f95 _free 58 API calls 99668->99671 99674 a2d3da 99671->99674 99675 9f4faa 84 API calls 99674->99675 99677 a2d3e3 99675->99677 99681 9f3ee2 59 API calls 99677->99681 99678 9f7f41 59 API calls 99679 9f381a 99678->99679 99984 9f8620 99679->99984 99683 a2d3fe 99681->99683 99682 9f382c Mailbox 99684 9f7f41 59 API calls 99682->99684 99685 9f3ee2 59 API calls 99683->99685 99686 9f3852 99684->99686 99687 a2d41a 99685->99687 99688 9f8620 69 API calls 99686->99688 99689 9f4864 61 API calls 99687->99689 99691 9f3861 Mailbox 99688->99691 99690 a2d43f 99689->99690 99692 9f3ee2 59 API calls 99690->99692 99693 9f77c7 59 API calls 99691->99693 99694 a2d44b 99692->99694 99696 9f387f 99693->99696 99695 9f81a7 59 API calls 99694->99695 99697 a2d459 99695->99697 99988 9f3ee2 99696->99988 99699 9f3ee2 59 API calls 99697->99699 99701 a2d468 99699->99701 99707 9f81a7 59 API calls 99701->99707 99703 9f3899 99703->99677 99704 9f38a3 99703->99704 99705 a1313d _W_store_winword 60 API calls 99704->99705 99706 9f38ae 99705->99706 99706->99683 99708 9f38b8 99706->99708 99709 a2d48a 99707->99709 99710 a1313d _W_store_winword 60 API calls 99708->99710 99711 9f3ee2 59 API calls 99709->99711 99712 9f38c3 99710->99712 99713 a2d497 99711->99713 99712->99687 99714 9f38cd 99712->99714 99713->99713 99715 a1313d _W_store_winword 60 API calls 99714->99715 99716 9f38d8 99715->99716 99716->99701 99717 9f3919 99716->99717 99719 9f3ee2 59 API calls 99716->99719 99717->99701 99718 9f3926 99717->99718 100004 9f942e 99718->100004 99720 9f38fc 99719->99720 99722 9f81a7 59 API calls 99720->99722 99724 9f390a 99722->99724 99726 9f3ee2 59 API calls 99724->99726 99726->99717 99729 9f93ea 59 API calls 99731 9f3961 99729->99731 99730 9f9040 60 API calls 99730->99731 99731->99729 99731->99730 99732 9f39a7 Mailbox 99731->99732 99733 9f3ee2 59 API calls 99731->99733 99732->99598 99733->99731 99735 9f73f2 __write_nolock 99734->99735 99736 9f740b 99735->99736 99737 a2ee4b _memset 99735->99737 100894 9f48ae 99736->100894 99740 a2ee67 GetOpenFileNameW 99737->99740 99742 a2eeb6 99740->99742 99743 9f7d2c 59 API calls 99742->99743 99745 a2eecb 99743->99745 99745->99745 99747 9f7429 100922 9f69ca 99747->100922 99751 9f7d38 __NMSG_WRITE 99750->99751 99752 9f7da5 99750->99752 99754 9f7d4e 99751->99754 99755 9f7d73 99751->99755 99753 9f7e8c 59 API calls 99752->99753 99758 9f7d56 _memmove 99753->99758 99756 9f8087 59 API calls 99754->99756 99757 9f8189 59 API calls 99755->99757 99756->99758 99757->99758 99758->99611 99760 a00a9a __write_nolock 99759->99760 101244 9f6ee0 99760->101244 99762 a00a9f 99763 9f3c26 99762->99763 101255 a012fe 89 API calls 99762->101255 99763->99607 99763->99615 99765 a00aac 99765->99763 101256 a04047 91 API calls Mailbox 99765->101256 99767 a00ab5 99767->99763 99768 a00ab9 GetFullPathNameW 99767->99768 99769 9f7d2c 59 API calls 99768->99769 99770 a00ae5 99769->99770 99771 9f7d2c 59 API calls 99770->99771 99772 a00af2 99771->99772 99773 a350d5 _wcscat 99772->99773 99774 9f7d2c 59 API calls 99772->99774 99774->99763 99776 9f3ac2 LoadImageW RegisterClassExW 99775->99776 99777 a2d49c 99775->99777 101298 9f3041 7 API calls 99776->101298 101299 9f48fe LoadImageW EnumResourceNamesW 99777->101299 99780 9f3b46 99782 9f39e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99780->99782 99781 a2d4a5 99782->99622 99784 9f4406 _memset 99783->99784 101300 9f4213 99784->101300 99795 a350ed 99794->99795 99809 a00b55 99794->99809 99869 a00b65 Mailbox 99809->99869 99872->99607 99873->99619 99875 a21b90 __write_nolock 99874->99875 99876 9f4871 GetModuleFileNameW 99875->99876 99877 9f7f41 59 API calls 99876->99877 99878 9f4897 99877->99878 99879 9f48ae 60 API calls 99878->99879 99880 9f48a1 Mailbox 99879->99880 99904 a10ffe 99901->99904 99903 a11018 99903->99650 99904->99903 99906 a1101c std::exception::exception 99904->99906 99911 a1594c 99904->99911 99928 a135e1 DecodePointer 99904->99928 99929 a187db RaiseException 99906->99929 99908 a11046 99930 a18711 58 API calls _free 99908->99930 99910 a11058 99910->99650 99912 a159c7 99911->99912 99925 a15958 99911->99925 99937 a135e1 DecodePointer 99912->99937 99914 a159cd 99938 a18d68 58 API calls __getptd_noexit 99914->99938 99917 a1598b RtlAllocateHeap 99919 a159bf 99917->99919 99917->99925 99919->99904 99920 a159b3 99935 a18d68 58 API calls __getptd_noexit 99920->99935 99924 a15963 99924->99925 99931 a1a3ab 58 API calls __NMSG_WRITE 99924->99931 99932 a1a408 58 API calls 5 library calls 99924->99932 99933 a132df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99924->99933 99925->99917 99925->99920 99925->99924 99926 a159b1 99925->99926 99934 a135e1 DecodePointer 99925->99934 99936 a18d68 58 API calls __getptd_noexit 99926->99936 99928->99904 99929->99908 99930->99910 99931->99924 99932->99924 99934->99925 99935->99926 99936->99919 99937->99914 99938->99919 99940 9f3d50 __write_nolock 99939->99940 99941 9f7d2c 59 API calls 99940->99941 99947 9f3eb6 Mailbox 99940->99947 99943 9f3d82 99941->99943 99952 9f3db8 Mailbox 99943->99952 100065 9f7b52 99943->100065 99944 9f7b52 59 API calls 99944->99952 99945 9f3e89 99946 9f7f41 59 API calls 99945->99946 99945->99947 99949 9f3eaa 99946->99949 99947->99657 99948 9f7f41 59 API calls 99948->99952 99950 9f3f84 59 API calls 99949->99950 99950->99947 99952->99944 99952->99945 99952->99947 99952->99948 100068 9f3f84 99952->100068 100078 9f4d13 99953->100078 99958 9f4f68 LoadLibraryExW 100088 9f4cc8 99958->100088 99959 a2dd0f 99961 9f4faa 84 API calls 99959->99961 99963 a2dd16 99961->99963 99965 9f4cc8 3 API calls 99963->99965 99967 a2dd1e 99965->99967 99966 9f4f8f 99966->99967 99968 9f4f9b 99966->99968 100114 9f506b 99967->100114 99969 9f4faa 84 API calls 99968->99969 99971 9f37e6 99969->99971 99971->99664 99971->99665 99974 a2dd45 100122 9f5027 99974->100122 99976 a2dd52 99978 9f3801 99977->99978 99979 9f81b2 99977->99979 99981 9f93ea 99978->99981 100552 9f80d7 59 API calls 2 library calls 99979->100552 99982 a10ff6 Mailbox 59 API calls 99981->99982 99983 9f380d 99982->99983 99983->99678 99985 9f862b 99984->99985 99986 9f8652 99985->99986 100553 9f8b13 69 API calls Mailbox 99985->100553 99986->99682 99989 9f3eec 99988->99989 99990 9f3f05 99988->99990 99992 9f81a7 59 API calls 99989->99992 99991 9f7d2c 59 API calls 99990->99991 99993 9f388b 99991->99993 99992->99993 99994 a1313d 99993->99994 99995 a13149 99994->99995 99996 a131be 99994->99996 100003 a1316e 99995->100003 100554 a18d68 58 API calls __getptd_noexit 99995->100554 100556 a131d0 60 API calls 3 library calls 99996->100556 99999 a131cb 99999->99703 100000 a13155 100555 a18ff6 9 API calls __mbstowcs_s_l 100000->100555 100002 a13160 100002->99703 100003->99703 100005 9f9436 100004->100005 100006 a10ff6 Mailbox 59 API calls 100005->100006 100007 9f9444 100006->100007 100008 9f3936 100007->100008 100557 9f935c 59 API calls Mailbox 100007->100557 100010 9f91b0 100008->100010 100558 9f92c0 100010->100558 100012 9f91bf 100013 a10ff6 Mailbox 59 API calls 100012->100013 100014 9f3944 100012->100014 100013->100014 100015 9f9040 100014->100015 100016 a2f5a5 100015->100016 100021 9f9057 100015->100021 100016->100021 100568 9f8d3b 59 API calls Mailbox 100016->100568 100018 9f915f 100018->99731 100019 9f9158 100022 a10ff6 Mailbox 59 API calls 100019->100022 100020 9f91a0 100567 9f9e9c 60 API calls Mailbox 100020->100567 100021->100018 100021->100019 100021->100020 100022->100018 100025 9f5045 85 API calls 100024->100025 100026 a59854 100025->100026 100569 a599be 100026->100569 100029 9f506b 74 API calls 100030 a59881 100029->100030 100031 9f506b 74 API calls 100030->100031 100032 a59891 100031->100032 100033 9f506b 74 API calls 100032->100033 100034 a598ac 100033->100034 100035 9f506b 74 API calls 100034->100035 100036 a598c7 100035->100036 100037 9f5045 85 API calls 100036->100037 100038 a598de 100037->100038 100039 a1594c _W_store_winword 58 API calls 100038->100039 100040 a598e5 100039->100040 100041 a1594c _W_store_winword 58 API calls 100040->100041 100042 a598ef 100041->100042 100043 9f506b 74 API calls 100042->100043 100044 a59903 100043->100044 100045 a59393 GetSystemTimeAsFileTime 100044->100045 100046 a59916 100045->100046 100047 a59940 100046->100047 100048 a5992b 100046->100048 100050 a599a5 100047->100050 100051 a59946 100047->100051 100049 a12f95 _free 58 API calls 100048->100049 100053 a59931 100049->100053 100052 a12f95 _free 58 API calls 100050->100052 100575 a58d90 100051->100575 100057 a2d3c1 100052->100057 100055 a12f95 _free 58 API calls 100053->100055 100055->100057 100057->99668 100059 9f4faa 100057->100059 100058 a12f95 _free 58 API calls 100058->100057 100060 9f4fbb 100059->100060 100061 9f4fb4 100059->100061 100063 9f4fdb FreeLibrary 100060->100063 100064 9f4fca 100060->100064 100062 a155d6 __fcloseall 83 API calls 100061->100062 100062->100060 100063->100064 100064->99668 100074 9f7faf 100065->100074 100067 9f7b5d 100067->99943 100069 9f3f92 100068->100069 100073 9f3fb4 _memmove 100068->100073 100071 a10ff6 Mailbox 59 API calls 100069->100071 100070 a10ff6 Mailbox 59 API calls 100072 9f3fc8 100070->100072 100071->100073 100072->99952 100073->100070 100075 9f7fc2 100074->100075 100077 9f7fbf _memmove 100074->100077 100076 a10ff6 Mailbox 59 API calls 100075->100076 100076->100077 100077->100067 100127 9f4d61 100078->100127 100081 9f4d61 2 API calls 100084 9f4d3a 100081->100084 100082 9f4d4a FreeLibrary 100083 9f4d53 100082->100083 100085 a1548b 100083->100085 100084->100082 100084->100083 100131 a154a0 100085->100131 100087 9f4f5c 100087->99958 100087->99959 100289 9f4d94 100088->100289 100091 9f4d94 2 API calls 100094 9f4ced 100091->100094 100092 9f4cff FreeLibrary 100093 9f4d08 100092->100093 100095 9f4dd0 100093->100095 100094->100092 100094->100093 100096 a10ff6 Mailbox 59 API calls 100095->100096 100097 9f4de5 100096->100097 100293 9f538e 100097->100293 100099 9f4df1 _memmove 100100 9f4e2c 100099->100100 100101 9f4ee9 100099->100101 100102 9f4f21 100099->100102 100103 9f5027 69 API calls 100100->100103 100296 9f4fe9 CreateStreamOnHGlobal 100101->100296 100307 a59ba5 95 API calls 100102->100307 100111 9f4e35 100103->100111 100106 9f506b 74 API calls 100106->100111 100107 9f4ec9 100107->99966 100109 a2dcd0 100110 9f5045 85 API calls 100109->100110 100112 a2dce4 100110->100112 100111->100106 100111->100107 100111->100109 100302 9f5045 100111->100302 100113 9f506b 74 API calls 100112->100113 100113->100107 100115 9f507d 100114->100115 100116 a2ddf6 100114->100116 100331 a15812 100115->100331 100119 a59393 100529 a591e9 100119->100529 100121 a593a9 100121->99974 100123 9f5036 100122->100123 100124 a2ddb9 100122->100124 100534 a15e90 100123->100534 100126 9f503e 100126->99976 100128 9f4d2e 100127->100128 100129 9f4d6a LoadLibraryA 100127->100129 100128->100081 100128->100084 100129->100128 100130 9f4d7b GetProcAddress 100129->100130 100130->100128 100134 a154ac __initptd 100131->100134 100132 a154bf 100180 a18d68 58 API calls __getptd_noexit 100132->100180 100134->100132 100136 a154f0 100134->100136 100135 a154c4 100181 a18ff6 9 API calls __mbstowcs_s_l 100135->100181 100150 a20738 100136->100150 100139 a154f5 100140 a1550b 100139->100140 100141 a154fe 100139->100141 100143 a15535 100140->100143 100144 a15515 100140->100144 100182 a18d68 58 API calls __getptd_noexit 100141->100182 100165 a20857 100143->100165 100183 a18d68 58 API calls __getptd_noexit 100144->100183 100147 a154cf __initptd @_EH4_CallFilterFunc@8 100147->100087 100151 a20744 __initptd 100150->100151 100152 a19e4b __lock 58 API calls 100151->100152 100159 a20752 100152->100159 100153 a207c6 100185 a2084e 100153->100185 100154 a207cd 100190 a18a5d 58 API calls 2 library calls 100154->100190 100157 a207d4 100157->100153 100191 a1a06b InitializeCriticalSectionAndSpinCount 100157->100191 100158 a20843 __initptd 100158->100139 100159->100153 100159->100154 100161 a19ed3 __mtinitlocknum 58 API calls 100159->100161 100188 a16e8d 59 API calls __lock 100159->100188 100189 a16ef7 LeaveCriticalSection LeaveCriticalSection _doexit 100159->100189 100161->100159 100163 a207fa EnterCriticalSection 100163->100153 100166 a20877 __wopenfile 100165->100166 100167 a20891 100166->100167 100179 a20a4c 100166->100179 100198 a13a0b 60 API calls 2 library calls 100166->100198 100196 a18d68 58 API calls __getptd_noexit 100167->100196 100169 a20896 100197 a18ff6 9 API calls __mbstowcs_s_l 100169->100197 100171 a15540 100184 a15562 LeaveCriticalSection LeaveCriticalSection _fprintf 100171->100184 100172 a20aaf 100193 a287f1 100172->100193 100175 a20a45 100175->100179 100199 a13a0b 60 API calls 2 library calls 100175->100199 100177 a20a64 100177->100179 100200 a13a0b 60 API calls 2 library calls 100177->100200 100179->100167 100179->100172 100180->100135 100181->100147 100182->100147 100183->100147 100184->100147 100192 a19fb5 LeaveCriticalSection 100185->100192 100187 a20855 100187->100158 100188->100159 100189->100159 100190->100157 100191->100163 100192->100187 100201 a27fd5 100193->100201 100195 a2880a 100195->100171 100196->100169 100197->100171 100198->100175 100199->100177 100200->100179 100204 a27fe1 __initptd 100201->100204 100202 a27ff7 100286 a18d68 58 API calls __getptd_noexit 100202->100286 100204->100202 100206 a2802d 100204->100206 100205 a27ffc 100287 a18ff6 9 API calls __mbstowcs_s_l 100205->100287 100212 a2809e 100206->100212 100209 a28049 100288 a28072 LeaveCriticalSection __unlock_fhandle 100209->100288 100210 a28006 __initptd 100210->100195 100213 a280be 100212->100213 100214 a1471a __wsopen_nolock 58 API calls 100213->100214 100217 a280da 100214->100217 100215 a19006 __invoke_watson 8 API calls 100216 a287f0 100215->100216 100219 a27fd5 __wsopen_helper 103 API calls 100216->100219 100218 a28137 100217->100218 100220 a28114 100217->100220 100235 a28211 100217->100235 100226 a281f5 100218->100226 100234 a281d3 100218->100234 100221 a2880a 100219->100221 100222 a18d34 __write 58 API calls 100220->100222 100221->100209 100223 a28119 100222->100223 100224 a18d68 __mbstowcs_s_l 58 API calls 100223->100224 100225 a28126 100224->100225 100227 a18ff6 __mbstowcs_s_l 9 API calls 100225->100227 100228 a18d34 __write 58 API calls 100226->100228 100229 a28130 100227->100229 100230 a281fa 100228->100230 100229->100209 100231 a18d68 __mbstowcs_s_l 58 API calls 100230->100231 100232 a28207 100231->100232 100233 a18ff6 __mbstowcs_s_l 9 API calls 100232->100233 100233->100235 100236 a1d4d4 __alloc_osfhnd 61 API calls 100234->100236 100235->100215 100237 a282a1 100236->100237 100238 a282ab 100237->100238 100239 a282ce 100237->100239 100241 a18d34 __write 58 API calls 100238->100241 100240 a27f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100239->100240 100251 a282f0 100240->100251 100242 a282b0 100241->100242 100244 a18d68 __mbstowcs_s_l 58 API calls 100242->100244 100243 a2836e GetFileType 100246 a283bb 100243->100246 100247 a28379 GetLastError 100243->100247 100245 a282ba 100244->100245 100249 a18d68 __mbstowcs_s_l 58 API calls 100245->100249 100258 a1d76a __set_osfhnd 59 API calls 100246->100258 100250 a18d47 __dosmaperr 58 API calls 100247->100250 100248 a2833c GetLastError 100252 a18d47 __dosmaperr 58 API calls 100248->100252 100249->100229 100253 a283a0 CloseHandle 100250->100253 100251->100243 100251->100248 100254 a27f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100251->100254 100255 a28361 100252->100255 100253->100255 100256 a283ae 100253->100256 100257 a28331 100254->100257 100259 a18d68 __mbstowcs_s_l 58 API calls 100255->100259 100260 a18d68 __mbstowcs_s_l 58 API calls 100256->100260 100257->100243 100257->100248 100263 a283d9 100258->100263 100259->100235 100261 a283b3 100260->100261 100261->100255 100262 a28594 100262->100235 100265 a28767 CloseHandle 100262->100265 100263->100262 100264 a21b11 __lseeki64_nolock 60 API calls 100263->100264 100280 a2845a 100263->100280 100266 a28443 100264->100266 100267 a27f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100265->100267 100269 a18d34 __write 58 API calls 100266->100269 100266->100280 100268 a2878e 100267->100268 100271 a28796 GetLastError 100268->100271 100272 a287c2 100268->100272 100269->100280 100270 a210ab 70 API calls __read_nolock 100270->100280 100273 a18d47 __dosmaperr 58 API calls 100271->100273 100272->100235 100275 a287a2 100273->100275 100274 a2848c 100277 a299f2 __chsize_nolock 82 API calls 100274->100277 100274->100280 100278 a1d67d __free_osfhnd 59 API calls 100275->100278 100276 a20d2d __close_nolock 61 API calls 100276->100280 100277->100274 100278->100272 100279 a1dac6 __write 78 API calls 100279->100280 100280->100262 100280->100270 100280->100274 100280->100276 100280->100279 100281 a28611 100280->100281 100283 a21b11 60 API calls __lseeki64_nolock 100280->100283 100282 a20d2d __close_nolock 61 API calls 100281->100282 100284 a28618 100282->100284 100283->100280 100285 a18d68 __mbstowcs_s_l 58 API calls 100284->100285 100285->100235 100286->100205 100287->100210 100288->100210 100290 9f4ce1 100289->100290 100291 9f4d9d LoadLibraryA 100289->100291 100290->100091 100290->100094 100291->100290 100292 9f4dae GetProcAddress 100291->100292 100292->100290 100294 a10ff6 Mailbox 59 API calls 100293->100294 100295 9f53a0 100294->100295 100295->100099 100297 9f5003 FindResourceExW 100296->100297 100298 9f5020 100296->100298 100297->100298 100299 a2dd5c LoadResource 100297->100299 100298->100100 100299->100298 100300 a2dd71 SizeofResource 100299->100300 100300->100298 100301 a2dd85 LockResource 100300->100301 100301->100298 100303 a2ddd4 100302->100303 100304 9f5054 100302->100304 100308 a15a7d 100304->100308 100306 9f5062 100306->100111 100307->100100 100311 a15a89 __initptd 100308->100311 100309 a15a9b 100321 a18d68 58 API calls __getptd_noexit 100309->100321 100310 a15ac1 100323 a16e4e 100310->100323 100311->100309 100311->100310 100314 a15aa0 100322 a18ff6 9 API calls __mbstowcs_s_l 100314->100322 100316 a15ac7 100329 a159ee 83 API calls 5 library calls 100316->100329 100318 a15ad6 100330 a15af8 LeaveCriticalSection LeaveCriticalSection _fprintf 100318->100330 100320 a15aab __initptd 100320->100306 100321->100314 100322->100320 100324 a16e80 EnterCriticalSection 100323->100324 100325 a16e5e 100323->100325 100326 a16e76 100324->100326 100325->100324 100327 a16e66 100325->100327 100326->100316 100328 a19e4b __lock 58 API calls 100327->100328 100328->100326 100329->100318 100330->100320 100334 a1582d 100331->100334 100333 9f508e 100333->100119 100335 a15839 __initptd 100334->100335 100336 a1587c 100335->100336 100337 a1584f _memset 100335->100337 100338 a15874 __initptd 100335->100338 100339 a16e4e __lock_file 59 API calls 100336->100339 100361 a18d68 58 API calls __getptd_noexit 100337->100361 100338->100333 100341 a15882 100339->100341 100347 a1564d 100341->100347 100342 a15869 100362 a18ff6 9 API calls __mbstowcs_s_l 100342->100362 100351 a15668 _memset 100347->100351 100354 a15683 100347->100354 100348 a15673 100459 a18d68 58 API calls __getptd_noexit 100348->100459 100350 a15678 100460 a18ff6 9 API calls __mbstowcs_s_l 100350->100460 100351->100348 100351->100354 100358 a156c3 100351->100358 100363 a158b6 LeaveCriticalSection LeaveCriticalSection _fprintf 100354->100363 100355 a157d4 _memset 100462 a18d68 58 API calls __getptd_noexit 100355->100462 100358->100354 100358->100355 100364 a14916 100358->100364 100371 a210ab 100358->100371 100439 a20df7 100358->100439 100461 a20f18 58 API calls 3 library calls 100358->100461 100361->100342 100362->100338 100363->100338 100365 a14920 100364->100365 100366 a14935 100364->100366 100463 a18d68 58 API calls __getptd_noexit 100365->100463 100366->100358 100368 a14925 100464 a18ff6 9 API calls __mbstowcs_s_l 100368->100464 100370 a14930 100370->100358 100372 a210e3 100371->100372 100373 a210cc 100371->100373 100375 a2181b 100372->100375 100380 a2111d 100372->100380 100474 a18d34 58 API calls __getptd_noexit 100373->100474 100490 a18d34 58 API calls __getptd_noexit 100375->100490 100377 a210d1 100475 a18d68 58 API calls __getptd_noexit 100377->100475 100378 a21820 100491 a18d68 58 API calls __getptd_noexit 100378->100491 100381 a21125 100380->100381 100389 a2113c 100380->100389 100476 a18d34 58 API calls __getptd_noexit 100381->100476 100384 a21131 100492 a18ff6 9 API calls __mbstowcs_s_l 100384->100492 100385 a210d8 100385->100358 100386 a2112a 100477 a18d68 58 API calls __getptd_noexit 100386->100477 100388 a21151 100478 a18d34 58 API calls __getptd_noexit 100388->100478 100389->100385 100389->100388 100392 a2116b 100389->100392 100393 a21189 100389->100393 100392->100388 100394 a21176 100392->100394 100479 a18a5d 58 API calls 2 library calls 100393->100479 100465 a25ebb 100394->100465 100396 a21199 100398 a211a1 100396->100398 100399 a211bc 100396->100399 100480 a18d68 58 API calls __getptd_noexit 100398->100480 100482 a21b11 60 API calls 3 library calls 100399->100482 100400 a2128a 100402 a21303 ReadFile 100400->100402 100407 a212a0 GetConsoleMode 100400->100407 100405 a217e3 GetLastError 100402->100405 100406 a21325 100402->100406 100404 a211a6 100481 a18d34 58 API calls __getptd_noexit 100404->100481 100409 a217f0 100405->100409 100410 a212e3 100405->100410 100406->100405 100414 a212f5 100406->100414 100411 a21300 100407->100411 100412 a212b4 100407->100412 100488 a18d68 58 API calls __getptd_noexit 100409->100488 100421 a212e9 100410->100421 100483 a18d47 58 API calls 3 library calls 100410->100483 100411->100402 100412->100411 100415 a212ba ReadConsoleW 100412->100415 100414->100421 100422 a2135a 100414->100422 100423 a215c7 100414->100423 100415->100414 100416 a212dd GetLastError 100415->100416 100416->100410 100418 a217f5 100489 a18d34 58 API calls __getptd_noexit 100418->100489 100420 a12f95 _free 58 API calls 100420->100385 100421->100385 100421->100420 100425 a213c6 ReadFile 100422->100425 100431 a21447 100422->100431 100423->100421 100429 a216cd ReadFile 100423->100429 100426 a213e7 GetLastError 100425->100426 100435 a213f1 100425->100435 100426->100435 100427 a21504 100433 a214b4 MultiByteToWideChar 100427->100433 100486 a21b11 60 API calls 3 library calls 100427->100486 100428 a214f4 100485 a18d68 58 API calls __getptd_noexit 100428->100485 100430 a216f0 GetLastError 100429->100430 100438 a216fe 100429->100438 100430->100438 100431->100421 100431->100427 100431->100428 100431->100433 100433->100416 100433->100421 100435->100422 100484 a21b11 60 API calls 3 library calls 100435->100484 100438->100423 100487 a21b11 60 API calls 3 library calls 100438->100487 100440 a20e02 100439->100440 100441 a20e17 100439->100441 100526 a18d68 58 API calls __getptd_noexit 100440->100526 100445 a20e4c 100441->100445 100453 a20e12 100441->100453 100528 a26234 58 API calls __malloc_crt 100441->100528 100443 a20e07 100527 a18ff6 9 API calls __mbstowcs_s_l 100443->100527 100447 a14916 __fflush_nolock 58 API calls 100445->100447 100448 a20e60 100447->100448 100493 a20f97 100448->100493 100450 a20e67 100451 a14916 __fflush_nolock 58 API calls 100450->100451 100450->100453 100452 a20e8a 100451->100452 100452->100453 100454 a14916 __fflush_nolock 58 API calls 100452->100454 100453->100358 100455 a20e96 100454->100455 100455->100453 100456 a14916 __fflush_nolock 58 API calls 100455->100456 100457 a20ea3 100456->100457 100458 a14916 __fflush_nolock 58 API calls 100457->100458 100458->100453 100459->100350 100460->100354 100461->100358 100462->100350 100463->100368 100464->100370 100466 a25ed3 100465->100466 100467 a25ec6 100465->100467 100470 a25edf 100466->100470 100471 a18d68 __mbstowcs_s_l 58 API calls 100466->100471 100468 a18d68 __mbstowcs_s_l 58 API calls 100467->100468 100469 a25ecb 100468->100469 100469->100400 100470->100400 100472 a25f00 100471->100472 100473 a18ff6 __mbstowcs_s_l 9 API calls 100472->100473 100473->100469 100474->100377 100475->100385 100476->100386 100477->100384 100478->100386 100479->100396 100480->100404 100481->100385 100482->100394 100483->100421 100484->100435 100485->100421 100486->100433 100487->100438 100488->100418 100489->100421 100490->100378 100491->100384 100492->100385 100494 a20fa3 __initptd 100493->100494 100495 a20fb0 100494->100495 100496 a20fc7 100494->100496 100498 a18d34 __write 58 API calls 100495->100498 100497 a2108b 100496->100497 100499 a20fdb 100496->100499 100500 a18d34 __write 58 API calls 100497->100500 100501 a20fb5 100498->100501 100502 a21006 100499->100502 100503 a20ff9 100499->100503 100504 a20ffe 100500->100504 100505 a18d68 __mbstowcs_s_l 58 API calls 100501->100505 100507 a21013 100502->100507 100508 a21028 100502->100508 100506 a18d34 __write 58 API calls 100503->100506 100511 a18d68 __mbstowcs_s_l 58 API calls 100504->100511 100515 a20fbc __initptd 100505->100515 100506->100504 100509 a18d34 __write 58 API calls 100507->100509 100510 a1d446 ___lock_fhandle 59 API calls 100508->100510 100512 a21018 100509->100512 100513 a2102e 100510->100513 100514 a21020 100511->100514 100516 a18d68 __mbstowcs_s_l 58 API calls 100512->100516 100517 a21041 100513->100517 100518 a21054 100513->100518 100519 a18ff6 __mbstowcs_s_l 9 API calls 100514->100519 100515->100450 100516->100514 100521 a210ab __read_nolock 70 API calls 100517->100521 100520 a18d68 __mbstowcs_s_l 58 API calls 100518->100520 100519->100515 100523 a21059 100520->100523 100522 a2104d 100521->100522 100525 a21083 __read LeaveCriticalSection 100522->100525 100524 a18d34 __write 58 API calls 100523->100524 100524->100522 100525->100515 100526->100443 100527->100453 100528->100445 100532 a1543a GetSystemTimeAsFileTime 100529->100532 100531 a591f8 100531->100121 100533 a15468 __aulldiv 100532->100533 100533->100531 100535 a15e9c __initptd 100534->100535 100536 a15ec3 100535->100536 100537 a15eae 100535->100537 100539 a16e4e __lock_file 59 API calls 100536->100539 100548 a18d68 58 API calls __getptd_noexit 100537->100548 100540 a15ec9 100539->100540 100550 a15b00 67 API calls 6 library calls 100540->100550 100541 a15eb3 100549 a18ff6 9 API calls __mbstowcs_s_l 100541->100549 100544 a15ed4 100551 a15ef4 LeaveCriticalSection LeaveCriticalSection _fprintf 100544->100551 100546 a15ee6 100547 a15ebe __initptd 100546->100547 100547->100126 100548->100541 100549->100547 100550->100544 100551->100546 100552->99978 100553->99986 100554->100000 100555->100002 100556->99999 100557->100008 100559 9f92c9 Mailbox 100558->100559 100560 a2f5c8 100559->100560 100565 9f92d3 100559->100565 100561 a10ff6 Mailbox 59 API calls 100560->100561 100563 a2f5d4 100561->100563 100562 9f92da 100562->100012 100565->100562 100566 9f9df0 59 API calls Mailbox 100565->100566 100566->100565 100567->100018 100568->100021 100570 a599d2 __tzset_nolock _wcscmp 100569->100570 100571 9f506b 74 API calls 100570->100571 100572 a59866 100570->100572 100573 a59393 GetSystemTimeAsFileTime 100570->100573 100574 9f5045 85 API calls 100570->100574 100571->100570 100572->100029 100572->100057 100573->100570 100574->100570 100576 a58d9b 100575->100576 100577 a58da9 100575->100577 100578 a1548b 115 API calls 100576->100578 100579 a58dee 100577->100579 100580 a1548b 115 API calls 100577->100580 100590 a58db2 100577->100590 100578->100577 100606 a5901b 100579->100606 100582 a58dd3 100580->100582 100582->100579 100584 a58ddc 100582->100584 100583 a58e32 100585 a58e57 100583->100585 100586 a58e36 100583->100586 100589 a155d6 __fcloseall 83 API calls 100584->100589 100584->100590 100610 a58c33 100585->100610 100588 a58e43 100586->100588 100592 a155d6 __fcloseall 83 API calls 100586->100592 100588->100590 100595 a155d6 __fcloseall 83 API calls 100588->100595 100589->100590 100590->100058 100592->100588 100593 a58e85 100619 a58eb5 100593->100619 100594 a58e65 100597 a155d6 __fcloseall 83 API calls 100594->100597 100598 a58e72 100594->100598 100595->100590 100597->100598 100598->100590 100600 a155d6 __fcloseall 83 API calls 100598->100600 100600->100590 100603 a58ea0 100603->100590 100605 a155d6 __fcloseall 83 API calls 100603->100605 100605->100590 100607 a59040 100606->100607 100609 a59029 __tzset_nolock _memmove 100606->100609 100608 a15812 __fread_nolock 74 API calls 100607->100608 100608->100609 100609->100583 100611 a1594c _W_store_winword 58 API calls 100610->100611 100612 a58c42 100611->100612 100613 a1594c _W_store_winword 58 API calls 100612->100613 100614 a58c56 100613->100614 100615 a1594c _W_store_winword 58 API calls 100614->100615 100616 a58c6a 100615->100616 100617 a58f97 58 API calls 100616->100617 100618 a58c7d 100616->100618 100617->100618 100618->100593 100618->100594 100626 a58eca 100619->100626 100620 a58f82 100652 a591bf 100620->100652 100622 a58e8c 100627 a58f97 100622->100627 100623 a58c8f 74 API calls 100623->100626 100626->100620 100626->100622 100626->100623 100648 a5909c 100626->100648 100656 a58d2b 74 API calls 100626->100656 100628 a58fa4 100627->100628 100629 a58faa 100627->100629 100630 a12f95 _free 58 API calls 100628->100630 100631 a58fbb 100629->100631 100632 a12f95 _free 58 API calls 100629->100632 100630->100629 100633 a58e93 100631->100633 100634 a12f95 _free 58 API calls 100631->100634 100632->100631 100633->100603 100635 a155d6 100633->100635 100634->100633 100636 a155e2 __initptd 100635->100636 100637 a155f6 100636->100637 100638 a1560e 100636->100638 100705 a18d68 58 API calls __getptd_noexit 100637->100705 100641 a16e4e __lock_file 59 API calls 100638->100641 100644 a15606 __initptd 100638->100644 100640 a155fb 100706 a18ff6 9 API calls __mbstowcs_s_l 100640->100706 100643 a15620 100641->100643 100689 a1556a 100643->100689 100644->100603 100649 a590eb 100648->100649 100650 a590ab 100648->100650 100649->100650 100657 a59172 100649->100657 100650->100626 100653 a591dd 100652->100653 100654 a591cc 100652->100654 100653->100622 100655 a14a93 80 API calls 100654->100655 100655->100653 100656->100626 100658 a5919e 100657->100658 100659 a591af 100657->100659 100661 a14a93 100658->100661 100659->100649 100662 a14a9f __initptd 100661->100662 100663 a14acd __initptd 100662->100663 100664 a14ad5 100662->100664 100665 a14abd 100662->100665 100663->100659 100667 a16e4e __lock_file 59 API calls 100664->100667 100686 a18d68 58 API calls __getptd_noexit 100665->100686 100669 a14adb 100667->100669 100668 a14ac2 100687 a18ff6 9 API calls __mbstowcs_s_l 100668->100687 100674 a1493a 100669->100674 100677 a14949 100674->100677 100680 a14967 100674->100680 100675 a14957 100676 a18d68 __mbstowcs_s_l 58 API calls 100675->100676 100678 a1495c 100676->100678 100677->100675 100677->100680 100684 a14981 _memmove 100677->100684 100679 a18ff6 __mbstowcs_s_l 9 API calls 100678->100679 100679->100680 100688 a14b0d LeaveCriticalSection LeaveCriticalSection _fprintf 100680->100688 100681 a1b05e __flsbuf 78 API calls 100681->100684 100682 a14c6d __flush 78 API calls 100682->100684 100683 a14916 __fflush_nolock 58 API calls 100683->100684 100684->100680 100684->100681 100684->100682 100684->100683 100685 a1dac6 __write 78 API calls 100684->100685 100685->100684 100686->100668 100687->100663 100688->100663 100690 a15579 100689->100690 100691 a1558d 100689->100691 100744 a18d68 58 API calls __getptd_noexit 100690->100744 100692 a15589 100691->100692 100708 a14c6d 100691->100708 100707 a15645 LeaveCriticalSection LeaveCriticalSection _fprintf 100692->100707 100695 a1557e 100745 a18ff6 9 API calls __mbstowcs_s_l 100695->100745 100700 a14916 __fflush_nolock 58 API calls 100701 a155a7 100700->100701 100718 a20c52 100701->100718 100703 a155ad 100703->100692 100704 a12f95 _free 58 API calls 100703->100704 100704->100692 100705->100640 100706->100644 100707->100644 100709 a14c80 100708->100709 100710 a14ca4 100708->100710 100709->100710 100711 a14916 __fflush_nolock 58 API calls 100709->100711 100714 a20dc7 100710->100714 100712 a14c9d 100711->100712 100746 a1dac6 100712->100746 100715 a155a1 100714->100715 100716 a20dd4 100714->100716 100715->100700 100716->100715 100717 a12f95 _free 58 API calls 100716->100717 100717->100715 100719 a20c5e __initptd 100718->100719 100720 a20c82 100719->100720 100721 a20c6b 100719->100721 100722 a20d0d 100720->100722 100724 a20c92 100720->100724 100871 a18d34 58 API calls __getptd_noexit 100721->100871 100876 a18d34 58 API calls __getptd_noexit 100722->100876 100727 a20cb0 100724->100727 100728 a20cba 100724->100728 100726 a20c70 100872 a18d68 58 API calls __getptd_noexit 100726->100872 100873 a18d34 58 API calls __getptd_noexit 100727->100873 100732 a1d446 ___lock_fhandle 59 API calls 100728->100732 100729 a20cb5 100877 a18d68 58 API calls __getptd_noexit 100729->100877 100734 a20cc0 100732->100734 100736 a20cd3 100734->100736 100737 a20cde 100734->100737 100735 a20d19 100878 a18ff6 9 API calls __mbstowcs_s_l 100735->100878 100856 a20d2d 100736->100856 100874 a18d68 58 API calls __getptd_noexit 100737->100874 100740 a20c77 __initptd 100740->100703 100742 a20cd9 100875 a20d05 LeaveCriticalSection __unlock_fhandle 100742->100875 100744->100695 100745->100692 100747 a1dad2 __initptd 100746->100747 100748 a1daf6 100747->100748 100749 a1dadf 100747->100749 100750 a1db95 100748->100750 100753 a1db0a 100748->100753 100847 a18d34 58 API calls __getptd_noexit 100749->100847 100853 a18d34 58 API calls __getptd_noexit 100750->100853 100752 a1dae4 100848 a18d68 58 API calls __getptd_noexit 100752->100848 100756 a1db32 100753->100756 100757 a1db28 100753->100757 100774 a1d446 100756->100774 100849 a18d34 58 API calls __getptd_noexit 100757->100849 100758 a1db2d 100854 a18d68 58 API calls __getptd_noexit 100758->100854 100761 a1db38 100763 a1db4b 100761->100763 100764 a1db5e 100761->100764 100783 a1dbb5 100763->100783 100850 a18d68 58 API calls __getptd_noexit 100764->100850 100765 a1dba1 100855 a18ff6 9 API calls __mbstowcs_s_l 100765->100855 100767 a1daeb __initptd 100767->100710 100770 a1db63 100851 a18d34 58 API calls __getptd_noexit 100770->100851 100771 a1db57 100852 a1db8d LeaveCriticalSection __unlock_fhandle 100771->100852 100775 a1d452 __initptd 100774->100775 100776 a1d4a1 EnterCriticalSection 100775->100776 100777 a19e4b __lock 58 API calls 100775->100777 100778 a1d4c7 __initptd 100776->100778 100779 a1d477 100777->100779 100778->100761 100780 a1a06b __mtinitlocks InitializeCriticalSectionAndSpinCount 100779->100780 100782 a1d48f 100779->100782 100780->100782 100781 a1d4cb ___lock_fhandle LeaveCriticalSection 100781->100776 100782->100781 100784 a1dbc2 __write_nolock 100783->100784 100785 a1dc01 100784->100785 100786 a1dc20 100784->100786 100814 a1dbf6 100784->100814 100788 a18d34 __write 58 API calls 100785->100788 100789 a1dc78 100786->100789 100790 a1dc5c 100786->100790 100787 a1c836 _W_store_winword 6 API calls 100791 a1e416 100787->100791 100792 a1dc06 100788->100792 100794 a1dc91 100789->100794 100796 a21b11 __lseeki64_nolock 60 API calls 100789->100796 100793 a18d34 __write 58 API calls 100790->100793 100791->100771 100795 a18d68 __mbstowcs_s_l 58 API calls 100792->100795 100799 a1dc61 100793->100799 100798 a25ebb __write_nolock 58 API calls 100794->100798 100797 a1dc0d 100795->100797 100796->100794 100800 a18ff6 __mbstowcs_s_l 9 API calls 100797->100800 100801 a1dc9f 100798->100801 100802 a18d68 __mbstowcs_s_l 58 API calls 100799->100802 100800->100814 100803 a1dff8 100801->100803 100808 a19bec _wcstok 58 API calls 100801->100808 100804 a1dc68 100802->100804 100805 a1e016 100803->100805 100806 a1e38b WriteFile 100803->100806 100807 a18ff6 __mbstowcs_s_l 9 API calls 100804->100807 100809 a1e13a 100805->100809 100818 a1e02c 100805->100818 100810 a1dfeb GetLastError 100806->100810 100816 a1dfb8 100806->100816 100807->100814 100811 a1dccb GetConsoleMode 100808->100811 100821 a1e145 100809->100821 100824 a1e22f 100809->100824 100810->100816 100811->100803 100813 a1dd0a 100811->100813 100812 a1e3c4 100812->100814 100815 a18d68 __mbstowcs_s_l 58 API calls 100812->100815 100813->100803 100817 a1dd1a GetConsoleCP 100813->100817 100814->100787 100822 a1e3f2 100815->100822 100816->100812 100816->100814 100823 a1e118 100816->100823 100817->100812 100843 a1dd49 100817->100843 100818->100812 100819 a1e09b WriteFile 100818->100819 100819->100810 100820 a1e0d8 100819->100820 100820->100818 100825 a1e0fc 100820->100825 100821->100812 100826 a1e1aa WriteFile 100821->100826 100827 a18d34 __write 58 API calls 100822->100827 100828 a1e123 100823->100828 100829 a1e3bb 100823->100829 100824->100812 100830 a1e2a4 WideCharToMultiByte 100824->100830 100825->100816 100826->100810 100831 a1e1f9 100826->100831 100827->100814 100832 a18d68 __mbstowcs_s_l 58 API calls 100828->100832 100833 a18d47 __dosmaperr 58 API calls 100829->100833 100830->100810 100839 a1e2eb 100830->100839 100831->100816 100831->100821 100831->100825 100835 a1e128 100832->100835 100833->100814 100834 a1e2f3 WriteFile 100837 a1e346 GetLastError 100834->100837 100834->100839 100838 a18d34 __write 58 API calls 100835->100838 100836 a13835 __write_nolock 58 API calls 100836->100843 100837->100839 100838->100814 100839->100816 100839->100824 100839->100825 100839->100834 100840 a2650a 60 API calls __write_nolock 100840->100843 100841 a1de32 WideCharToMultiByte 100841->100816 100842 a1de6d WriteFile 100841->100842 100842->100810 100845 a1de9f 100842->100845 100843->100816 100843->100836 100843->100840 100843->100841 100843->100845 100844 a27cae WriteConsoleW CreateFileW __putwch_nolock 100844->100845 100845->100810 100845->100816 100845->100843 100845->100844 100846 a1dec7 WriteFile 100845->100846 100846->100810 100846->100845 100847->100752 100848->100767 100849->100758 100850->100770 100851->100771 100852->100767 100853->100758 100854->100765 100855->100767 100879 a1d703 100856->100879 100858 a20d3b 100859 a20d91 100858->100859 100860 a20d6f 100858->100860 100862 a1d703 __commit 58 API calls 100858->100862 100892 a1d67d 59 API calls 2 library calls 100859->100892 100860->100859 100863 a1d703 __commit 58 API calls 100860->100863 100866 a20d66 100862->100866 100867 a20d7b FindCloseChangeNotification 100863->100867 100864 a20d99 100865 a20dbb 100864->100865 100893 a18d47 58 API calls 3 library calls 100864->100893 100865->100742 100869 a1d703 __commit 58 API calls 100866->100869 100867->100859 100870 a20d87 GetLastError 100867->100870 100869->100860 100870->100859 100871->100726 100872->100740 100873->100729 100874->100742 100875->100740 100876->100729 100877->100735 100878->100740 100880 a1d70e 100879->100880 100882 a1d723 100879->100882 100881 a18d34 __write 58 API calls 100880->100881 100883 a1d713 100881->100883 100884 a18d34 __write 58 API calls 100882->100884 100886 a1d748 100882->100886 100885 a18d68 __mbstowcs_s_l 58 API calls 100883->100885 100887 a1d752 100884->100887 100888 a1d71b 100885->100888 100886->100858 100889 a18d68 __mbstowcs_s_l 58 API calls 100887->100889 100888->100858 100890 a1d75a 100889->100890 100891 a18ff6 __mbstowcs_s_l 9 API calls 100890->100891 100891->100888 100892->100864 100893->100865 100956 a21b90 100894->100956 100897 9f48da 100899 9f7d2c 59 API calls 100897->100899 100898 9f48f7 100962 9f7eec 100898->100962 100901 9f48e6 100899->100901 100958 9f7886 100901->100958 100904 a109d5 100905 a21b90 __write_nolock 100904->100905 100906 a109e2 GetLongPathNameW 100905->100906 100907 9f7d2c 59 API calls 100906->100907 100908 9f741d 100907->100908 100909 9f716b 100908->100909 100910 9f77c7 59 API calls 100909->100910 100911 9f717d 100910->100911 100912 9f48ae 60 API calls 100911->100912 100913 9f7188 100912->100913 100914 a2ecae 100913->100914 100915 9f7193 100913->100915 100919 a2ecc8 100914->100919 100976 9f7a68 61 API calls 100914->100976 100917 9f3f84 59 API calls 100915->100917 100918 9f719f 100917->100918 100970 9f34c2 100918->100970 100921 9f71b2 Mailbox 100921->99747 100923 9f4f3d 136 API calls 100922->100923 100924 9f69ef 100923->100924 100925 a2e45a 100924->100925 100926 9f4f3d 136 API calls 100924->100926 100927 a597e5 122 API calls 100925->100927 100928 9f6a03 100926->100928 100929 a2e46f 100927->100929 100928->100925 100932 9f6a0b 100928->100932 100930 a2e473 100929->100930 100931 a2e490 100929->100931 100933 9f4faa 84 API calls 100930->100933 100934 a10ff6 Mailbox 59 API calls 100931->100934 100935 9f6a17 100932->100935 100936 a2e47b 100932->100936 100933->100936 100945 a2e4d5 Mailbox 100934->100945 100977 9f6bec 100935->100977 101070 a54534 90 API calls _wprintf 100936->101070 100939 a2e489 100939->100931 100941 a2e689 100942 a12f95 _free 58 API calls 100941->100942 100943 a2e691 100942->100943 100944 9f4faa 84 API calls 100943->100944 100950 a2e69a 100944->100950 100945->100941 100945->100950 100953 9f7f41 59 API calls 100945->100953 101071 a4fc4d 59 API calls 2 library calls 100945->101071 101072 a4fb6e 61 API calls 2 library calls 100945->101072 101073 a57621 59 API calls Mailbox 100945->101073 101074 9f766f 59 API calls 2 library calls 100945->101074 101075 9f74bd 59 API calls Mailbox 100945->101075 100949 a12f95 _free 58 API calls 100949->100950 100950->100949 100952 9f4faa 84 API calls 100950->100952 101076 a4fcb1 89 API calls 4 library calls 100950->101076 100952->100950 100953->100945 100957 9f48bb GetFullPathNameW 100956->100957 100957->100897 100957->100898 100959 9f7894 100958->100959 100966 9f7e8c 100959->100966 100961 9f48f2 100961->100904 100963 9f7ef9 100962->100963 100964 9f7f06 100962->100964 100963->100901 100965 a10ff6 Mailbox 59 API calls 100964->100965 100965->100963 100967 9f7e9a 100966->100967 100969 9f7ea3 _memmove 100966->100969 100968 9f7faf 59 API calls 100967->100968 100967->100969 100968->100969 100969->100961 100971 9f34d4 100970->100971 100975 9f34f3 _memmove 100970->100975 100973 a10ff6 Mailbox 59 API calls 100971->100973 100972 a10ff6 Mailbox 59 API calls 100974 9f350a 100972->100974 100973->100975 100974->100921 100975->100972 100976->100914 100978 a2e847 100977->100978 100979 9f6c15 100977->100979 101168 a4fcb1 89 API calls 4 library calls 100978->101168 101082 9f5906 60 API calls Mailbox 100979->101082 100982 9f6c37 101083 9f5956 100982->101083 100983 a2e85a 101169 a4fcb1 89 API calls 4 library calls 100983->101169 100986 9f6c54 100988 9f77c7 59 API calls 100986->100988 100990 9f6c60 100988->100990 100989 a2e876 100992 9f6cc1 100989->100992 101096 a10b9b 60 API calls __write_nolock 100990->101096 100994 9f6ccf 100992->100994 100995 a2e889 100992->100995 100993 9f6c6c 100997 9f77c7 59 API calls 100993->100997 100996 9f77c7 59 API calls 100994->100996 100998 9f5dcf CloseHandle 100995->100998 101000 9f6cd8 100996->101000 101001 9f6c78 100997->101001 100999 a2e895 100998->100999 101002 9f4f3d 136 API calls 100999->101002 101003 9f77c7 59 API calls 101000->101003 101004 9f48ae 60 API calls 101001->101004 101005 a2e8b1 101002->101005 101006 9f6ce1 101003->101006 101007 9f6c86 101004->101007 101008 a2e8da 101005->101008 101011 a597e5 122 API calls 101005->101011 101106 9f46f9 101006->101106 101097 9f59b0 ReadFile SetFilePointerEx 101007->101097 101170 a4fcb1 89 API calls 4 library calls 101008->101170 101015 a2e8cd 101011->101015 101012 9f6cf8 101016 9f7c8e 59 API calls 101012->101016 101014 9f6cb2 101098 9f5c4e 101014->101098 101019 a2e8f6 101015->101019 101020 a2e8d5 101015->101020 101021 9f6d09 SetCurrentDirectoryW 101016->101021 101017 a2e8f1 101049 9f6e6c Mailbox 101017->101049 101023 9f4faa 84 API calls 101019->101023 101022 9f4faa 84 API calls 101020->101022 101026 9f6d1c Mailbox 101021->101026 101022->101008 101024 a2e8fb 101023->101024 101025 a10ff6 Mailbox 59 API calls 101024->101025 101032 a2e92f 101025->101032 101028 a10ff6 Mailbox 59 API calls 101026->101028 101030 9f6d2f 101028->101030 101029 9f3bcd 101029->99609 101029->99632 101031 9f538e 59 API calls 101030->101031 101059 9f6d3a Mailbox __NMSG_WRITE 101031->101059 101171 9f766f 59 API calls 2 library calls 101032->101171 101034 9f6e47 101037 a2eb69 101177 a57581 59 API calls Mailbox 101037->101177 101041 a2eb8b 101178 a5f835 59 API calls 2 library calls 101041->101178 101044 a2eb98 101046 a12f95 _free 58 API calls 101044->101046 101045 a2ec02 101046->101049 101077 9f5934 101049->101077 101053 a2ebfa 101055 9f7f41 59 API calls 101055->101059 101059->101034 101059->101045 101059->101053 101059->101055 101157 9f59cd 67 API calls _wcscpy 101059->101157 101158 9f70bd GetStringTypeW 101059->101158 101159 9f702c 60 API calls __wcsnicmp 101059->101159 101160 9f710a GetStringTypeW __NMSG_WRITE 101059->101160 101161 a1387d GetStringTypeW _iswctype 101059->101161 101162 9f6a3c 165 API calls 3 library calls 101059->101162 101163 9f7373 59 API calls Mailbox 101059->101163 101060 9f7f41 59 API calls 101065 a2e978 Mailbox 101060->101065 101063 a2ebbb 101179 a4fcb1 89 API calls 4 library calls 101063->101179 101065->101037 101065->101060 101065->101063 101172 a4fc4d 59 API calls 2 library calls 101065->101172 101173 a4fb6e 61 API calls 2 library calls 101065->101173 101174 a57621 59 API calls Mailbox 101065->101174 101175 9f766f 59 API calls 2 library calls 101065->101175 101176 9f7373 59 API calls Mailbox 101065->101176 101067 a2ebd4 101068 a12f95 _free 58 API calls 101067->101068 101069 a2ebe7 101068->101069 101069->101049 101070->100939 101071->100945 101072->100945 101073->100945 101074->100945 101075->100945 101076->100950 101078 9f5dcf CloseHandle 101077->101078 101079 9f593c Mailbox 101078->101079 101080 9f5dcf CloseHandle 101079->101080 101081 9f594b 101080->101081 101081->101029 101082->100982 101084 9f5dcf CloseHandle 101083->101084 101085 9f5962 101084->101085 101182 9f5df9 101085->101182 101087 9f59a4 101087->100983 101087->100986 101088 9f5981 101088->101087 101190 9f5770 101088->101190 101090 9f5993 101207 9f53db SetFilePointerEx SetFilePointerEx 101090->101207 101092 a2e030 101208 a53696 SetFilePointerEx SetFilePointerEx WriteFile 101092->101208 101093 9f599a 101093->101087 101093->101092 101095 a2e060 101095->101087 101096->100993 101097->101014 101099 9f5c68 101098->101099 101100 9f5cef SetFilePointerEx 101099->101100 101101 a2e151 101099->101101 101105 9f5cc3 101099->101105 101221 9f5dae SetFilePointerEx 101100->101221 101222 9f5dae SetFilePointerEx 101101->101222 101104 a2e16b 101105->100992 101107 9f77c7 59 API calls 101106->101107 101108 9f470f 101107->101108 101109 9f77c7 59 API calls 101108->101109 101110 9f4717 101109->101110 101111 9f77c7 59 API calls 101110->101111 101112 9f471f 101111->101112 101113 9f77c7 59 API calls 101112->101113 101114 9f4727 101113->101114 101115 9f475b 101114->101115 101116 a2d8fb 101114->101116 101117 9f79ab 59 API calls 101115->101117 101118 9f81a7 59 API calls 101116->101118 101119 9f4769 101117->101119 101120 a2d904 101118->101120 101121 9f7e8c 59 API calls 101119->101121 101122 9f7eec 59 API calls 101120->101122 101123 9f4773 101121->101123 101126 9f479e 101122->101126 101125 9f79ab 59 API calls 101123->101125 101123->101126 101124 9f47de 101223 9f79ab 101124->101223 101128 9f4794 101125->101128 101126->101124 101129 9f47bd 101126->101129 101137 a2d924 101126->101137 101132 9f7e8c 59 API calls 101128->101132 101130 9f7b52 59 API calls 101129->101130 101135 9f47c7 101130->101135 101131 9f47ef 101136 9f4801 101131->101136 101138 9f81a7 59 API calls 101131->101138 101132->101126 101133 a2d9f4 101134 9f7d2c 59 API calls 101133->101134 101152 a2d9b1 101134->101152 101135->101124 101143 9f79ab 59 API calls 101135->101143 101139 9f4811 101136->101139 101140 9f81a7 59 API calls 101136->101140 101137->101133 101141 a2d9dd 101137->101141 101151 a2d95b 101137->101151 101138->101136 101142 9f4818 101139->101142 101144 9f81a7 59 API calls 101139->101144 101140->101139 101141->101133 101148 a2d9c8 101141->101148 101145 9f81a7 59 API calls 101142->101145 101154 9f481f Mailbox 101142->101154 101143->101124 101144->101142 101145->101154 101146 9f7b52 59 API calls 101146->101152 101147 a2d9b9 101149 9f7d2c 59 API calls 101147->101149 101150 9f7d2c 59 API calls 101148->101150 101149->101152 101150->101152 101151->101147 101155 a2d9a4 101151->101155 101152->101124 101152->101146 101236 9f7a84 59 API calls 2 library calls 101152->101236 101154->101012 101156 9f7d2c 59 API calls 101155->101156 101156->101152 101157->101059 101158->101059 101159->101059 101160->101059 101161->101059 101162->101059 101163->101059 101168->100983 101169->100989 101170->101017 101171->101065 101172->101065 101173->101065 101174->101065 101175->101065 101176->101065 101177->101041 101178->101044 101179->101067 101183 a2e181 101182->101183 101184 9f5e12 CreateFileW 101182->101184 101185 9f5e34 101183->101185 101186 a2e187 CreateFileW 101183->101186 101184->101185 101185->101088 101186->101185 101187 a2e1ad 101186->101187 101188 9f5c4e 2 API calls 101187->101188 101189 a2e1b8 101188->101189 101189->101185 101191 9f578b 101190->101191 101192 a2dfce 101190->101192 101193 9f5c4e 2 API calls 101191->101193 101206 9f581a 101191->101206 101192->101206 101215 9f5e3f 101192->101215 101194 9f57ad 101193->101194 101195 9f538e 59 API calls 101194->101195 101197 9f57b7 101195->101197 101197->101192 101198 9f57c4 101197->101198 101199 a10ff6 Mailbox 59 API calls 101198->101199 101200 9f57cf 101199->101200 101201 9f538e 59 API calls 101200->101201 101202 9f57da 101201->101202 101209 9f5d20 101202->101209 101205 9f5c4e 2 API calls 101205->101206 101206->101090 101207->101093 101208->101095 101210 9f5d93 101209->101210 101214 9f5d2e 101209->101214 101220 9f5dae SetFilePointerEx 101210->101220 101212 9f5807 101212->101205 101213 9f5d66 ReadFile 101213->101212 101213->101214 101214->101212 101214->101213 101216 9f5c4e 2 API calls 101215->101216 101217 9f5e60 101216->101217 101218 9f5c4e 2 API calls 101217->101218 101219 9f5e74 101218->101219 101219->101206 101220->101214 101221->101105 101222->101104 101224 9f79ba 101223->101224 101225 9f7a17 101223->101225 101224->101225 101226 9f79c5 101224->101226 101227 9f7e8c 59 API calls 101225->101227 101228 a2ef32 101226->101228 101229 9f79e0 101226->101229 101233 9f79e8 _memmove 101227->101233 101241 9f8189 101228->101241 101237 9f8087 101229->101237 101232 a2ef3c 101234 a10ff6 Mailbox 59 API calls 101232->101234 101233->101131 101235 a2ef5c 101234->101235 101236->101152 101238 9f809f 101237->101238 101240 9f8099 101237->101240 101239 a10ff6 Mailbox 59 API calls 101238->101239 101239->101240 101240->101233 101242 a10ff6 Mailbox 59 API calls 101241->101242 101243 9f8193 101242->101243 101243->101232 101245 9f6ef5 101244->101245 101249 9f7009 101244->101249 101246 a10ff6 Mailbox 59 API calls 101245->101246 101245->101249 101248 9f6f1c 101246->101248 101247 a10ff6 Mailbox 59 API calls 101254 9f6f91 101247->101254 101248->101247 101249->99762 101254->101249 101257 9f63a0 101254->101257 101282 9f74bd 59 API calls Mailbox 101254->101282 101283 a46ac9 59 API calls Mailbox 101254->101283 101284 9f766f 59 API calls 2 library calls 101254->101284 101255->99765 101256->99767 101285 9f7b76 101257->101285 101259 9f65ca 101292 9f766f 59 API calls 2 library calls 101259->101292 101264 9f63c5 101264->101259 101265 a2e41f 101264->101265 101266 9f68f9 _memmove 101264->101266 101267 9f766f 59 API calls 101264->101267 101272 9f7eec 59 API calls 101264->101272 101275 a2e3bb 101264->101275 101279 9f7faf 59 API calls 101264->101279 101290 9f60cc 60 API calls 101264->101290 101291 9f5ea1 59 API calls Mailbox 101264->101291 101293 9f5fd2 60 API calls 101264->101293 101294 9f7a84 59 API calls 2 library calls 101264->101294 101295 a4fdba 91 API calls 4 library calls 101265->101295 101297 a4fdba 91 API calls 4 library calls 101266->101297 101267->101264 101272->101264 101276 9f8189 59 API calls 101275->101276 101280 9f659b CharUpperBuffW 101279->101280 101280->101264 101282->101254 101283->101254 101284->101254 101286 a10ff6 Mailbox 59 API calls 101285->101286 101287 9f7b9b 101286->101287 101288 9f8189 59 API calls 101287->101288 101289 9f7baa 101288->101289 101289->101264 101290->101264 101291->101264 101293->101264 101294->101264 101298->99780 101299->99781 101830 9f107d 101835 9f71eb 101830->101835 101832 9f108c 101833 a12f80 __cinit 67 API calls 101832->101833 101834 9f1096 101833->101834 101836 9f71fb __write_nolock 101835->101836 101837 9f77c7 59 API calls 101836->101837 101838 9f72b1 101837->101838 101839 9f4864 61 API calls 101838->101839 101840 9f72ba 101839->101840 101866 a1074f 101840->101866 101843 9f7e0b 59 API calls 101844 9f72d3 101843->101844 101845 9f3f84 59 API calls 101844->101845 101846 9f72e2 101845->101846 101847 9f77c7 59 API calls 101846->101847 101848 9f72eb 101847->101848 101849 9f7eec 59 API calls 101848->101849 101850 9f72f4 RegOpenKeyExW 101849->101850 101851 a2ecda RegQueryValueExW 101850->101851 101855 9f7316 Mailbox 101850->101855 101852 a2ecf7 101851->101852 101853 a2ed6c RegCloseKey 101851->101853 101854 a10ff6 Mailbox 59 API calls 101852->101854 101853->101855 101865 a2ed7e _wcscat Mailbox __NMSG_WRITE 101853->101865 101856 a2ed10 101854->101856 101855->101832 101857 9f538e 59 API calls 101856->101857 101858 a2ed1b RegQueryValueExW 101857->101858 101860 a2ed38 101858->101860 101862 a2ed52 101858->101862 101859 9f7b52 59 API calls 101859->101865 101861 9f7d2c 59 API calls 101860->101861 101861->101862 101862->101853 101863 9f7f41 59 API calls 101863->101865 101864 9f3f84 59 API calls 101864->101865 101865->101855 101865->101859 101865->101863 101865->101864 101867 a21b90 __write_nolock 101866->101867 101868 a1075c GetFullPathNameW 101867->101868 101869 a1077e 101868->101869 101870 9f7d2c 59 API calls 101869->101870 101871 9f72c5 101870->101871 101871->101843 101872 9fe70b 101875 9fd260 101872->101875 101874 9fe719 101876 9fd27d 101875->101876 101892 9fd4dd 101875->101892 101877 a32abb 101876->101877 101878 a32b0a 101876->101878 101893 9fd2a4 101876->101893 101881 a32abe 101877->101881 101886 a32ad9 101877->101886 101919 a6a6fb 341 API calls __cinit 101878->101919 101882 a32aca 101881->101882 101881->101893 101917 a6ad0f 341 API calls 101882->101917 101883 a12f80 __cinit 67 API calls 101883->101893 101886->101892 101918 a6b1b7 341 API calls 3 library calls 101886->101918 101887 a32cdf 101887->101887 101888 9fd6ab 101888->101874 101890 9fd594 101911 9f8bb2 68 API calls 101890->101911 101892->101888 101924 a5a0b5 89 API calls 4 library calls 101892->101924 101893->101883 101893->101888 101893->101890 101893->101892 101896 a32c26 101893->101896 101899 9f8620 69 API calls 101893->101899 101906 9fa000 341 API calls 101893->101906 101907 9f81a7 59 API calls 101893->101907 101909 9f88a0 68 API calls __cinit 101893->101909 101910 9f86a2 68 API calls 101893->101910 101912 9f859a 68 API calls 101893->101912 101913 9fd0dc 341 API calls 101893->101913 101914 9f9f3a 59 API calls Mailbox 101893->101914 101915 9fd060 89 API calls 101893->101915 101916 9fcedd 341 API calls 101893->101916 101920 9f8bb2 68 API calls 101893->101920 101921 9f9e9c 60 API calls Mailbox 101893->101921 101922 a46d03 60 API calls 101893->101922 101895 9fd5a3 101895->101874 101923 a6aa66 89 API calls 101896->101923 101899->101893 101906->101893 101907->101893 101909->101893 101910->101893 101911->101895 101912->101893 101913->101893 101914->101893 101915->101893 101916->101893 101917->101888 101918->101892 101919->101893 101920->101893 101921->101893 101922->101893 101923->101892 101924->101887 101925 a2ff06 101926 a2ff10 101925->101926 101962 9fac90 Mailbox _memmove 101925->101962 102126 9f8e34 59 API calls Mailbox 101926->102126 101930 9fb685 102131 a5a0b5 89 API calls 4 library calls 101930->102131 101931 a10ff6 59 API calls Mailbox 101954 9fa097 Mailbox 101931->101954 101933 9fb5d5 101938 9f81a7 59 API calls 101933->101938 101936 9fb5da 102136 a5a0b5 89 API calls 4 library calls 101936->102136 101951 9fa1b7 101938->101951 101939 a3047f 102130 a5a0b5 89 API calls 4 library calls 101939->102130 101940 9f7f41 59 API calls 101940->101962 101942 9f77c7 59 API calls 101942->101954 101944 9f81a7 59 API calls 101944->101954 101945 a3048e 101946 a47405 59 API calls 101946->101954 101947 a12f80 67 API calls __cinit 101947->101954 101949 a466f4 Mailbox 59 API calls 101949->101951 101950 a30e00 102135 a5a0b5 89 API calls 4 library calls 101950->102135 101953 a6bf80 341 API calls 101953->101962 101954->101931 101954->101933 101954->101936 101954->101939 101954->101942 101954->101944 101954->101946 101954->101947 101954->101950 101954->101951 101955 9fa6ba 101954->101955 102120 9fca20 341 API calls 2 library calls 101954->102120 102121 9fba60 60 API calls Mailbox 101954->102121 102134 a5a0b5 89 API calls 4 library calls 101955->102134 101958 9fa000 341 API calls 101958->101962 101959 a30c94 102132 9f9df0 59 API calls Mailbox 101959->102132 101961 a30ca2 102133 a5a0b5 89 API calls 4 library calls 101961->102133 101962->101930 101962->101940 101962->101951 101962->101953 101962->101954 101962->101958 101962->101959 101962->101961 101965 9fb37c 101962->101965 101966 a10ff6 59 API calls Mailbox 101962->101966 101971 9fb416 101962->101971 101974 9fade2 Mailbox 101962->101974 102079 a6c5f4 101962->102079 102111 a57be0 101962->102111 102117 a466f4 101962->102117 102127 a47405 59 API calls 101962->102127 102128 a6c4a7 85 API calls 2 library calls 101962->102128 101964 a30c86 101964->101949 101964->101951 102123 9f9e9c 60 API calls Mailbox 101965->102123 101966->101962 101968 9fb38d 102124 9f9e9c 60 API calls Mailbox 101968->102124 102125 9ff803 341 API calls 101971->102125 101974->101930 101974->101951 101974->101964 101975 a300e0 VariantClear 101974->101975 101980 a02123 101974->101980 102020 a5d2e6 101974->102020 102067 a6e237 101974->102067 102070 a6474d 101974->102070 102122 9f9df0 59 API calls Mailbox 101974->102122 102129 a47405 59 API calls 101974->102129 101975->101974 102137 9f9bf8 101980->102137 101984 a10ff6 Mailbox 59 API calls 101985 a02154 101984->101985 101988 a02164 101985->101988 102165 9f5906 60 API calls Mailbox 101985->102165 101986 a02189 101995 a02196 101986->101995 102170 9f9c9c 59 API calls 101986->102170 101987 a369af 101987->101986 102169 a5f7df 59 API calls 101987->102169 101990 9f9997 84 API calls 101988->101990 101992 a02172 101990->101992 101994 9f5956 67 API calls 101992->101994 101993 a369f7 101993->101995 101996 a369ff 101993->101996 101997 a02181 101994->101997 101998 9f5e3f 2 API calls 101995->101998 102171 9f9c9c 59 API calls 101996->102171 101997->101986 101997->101987 102168 9f5a1a CloseHandle 101997->102168 102001 a0219d 101998->102001 102002 a36a11 102001->102002 102003 a021b7 102001->102003 102005 a10ff6 Mailbox 59 API calls 102002->102005 102004 9f77c7 59 API calls 102003->102004 102006 a021bf 102004->102006 102007 a36a17 102005->102007 102150 9f56d2 102006->102150 102009 a36a2b 102007->102009 102172 9f59b0 ReadFile SetFilePointerEx 102007->102172 102014 a36a2f _memmove 102009->102014 102173 a5794e 59 API calls 2 library calls 102009->102173 102012 a021ce 102012->102014 102166 9f9b9c 59 API calls Mailbox 102012->102166 102015 a021e2 Mailbox 102016 a0221c 102015->102016 102017 9f5dcf CloseHandle 102015->102017 102016->101974 102018 a02210 102017->102018 102018->102016 102167 9f5a1a CloseHandle 102018->102167 102021 a5d305 102020->102021 102022 a5d310 102020->102022 102197 9f9c9c 59 API calls 102021->102197 102026 9f77c7 59 API calls 102022->102026 102065 a5d3ea Mailbox 102022->102065 102024 a10ff6 Mailbox 59 API calls 102025 a5d433 102024->102025 102027 a5d43f 102025->102027 102200 9f5906 60 API calls Mailbox 102025->102200 102028 a5d334 102026->102028 102031 9f9997 84 API calls 102027->102031 102030 9f77c7 59 API calls 102028->102030 102032 a5d33d 102030->102032 102033 a5d457 102031->102033 102034 9f9997 84 API calls 102032->102034 102035 9f5956 67 API calls 102033->102035 102036 a5d349 102034->102036 102037 a5d466 102035->102037 102038 9f46f9 59 API calls 102036->102038 102039 a5d49e 102037->102039 102040 a5d46a GetLastError 102037->102040 102041 a5d35e 102038->102041 102045 a5d500 102039->102045 102046 a5d4c9 102039->102046 102042 a5d483 102040->102042 102043 9f7c8e 59 API calls 102041->102043 102064 a5d3f3 Mailbox 102042->102064 102201 9f5a1a CloseHandle 102042->102201 102044 a5d391 102043->102044 102047 a5d3e3 102044->102047 102052 a53e73 3 API calls 102044->102052 102048 a10ff6 Mailbox 59 API calls 102045->102048 102049 a10ff6 Mailbox 59 API calls 102046->102049 102199 9f9c9c 59 API calls 102047->102199 102054 a5d505 102048->102054 102055 a5d4ce 102049->102055 102053 a5d3a1 102052->102053 102053->102047 102057 a5d3a5 102053->102057 102058 9f77c7 59 API calls 102054->102058 102054->102064 102056 a5d4df 102055->102056 102059 9f77c7 59 API calls 102055->102059 102202 a5f835 59 API calls 2 library calls 102056->102202 102061 9f7f41 59 API calls 102057->102061 102058->102064 102059->102056 102062 a5d3b2 102061->102062 102198 a53c66 63 API calls Mailbox 102062->102198 102064->101974 102065->102024 102065->102064 102066 a5d3bb Mailbox 102066->102047 102068 a6cdf1 130 API calls 102067->102068 102069 a6e247 102068->102069 102069->101974 102071 9f9997 84 API calls 102070->102071 102072 a64787 102071->102072 102073 9f63a0 94 API calls 102072->102073 102074 a64797 102073->102074 102075 a647bc 102074->102075 102076 9fa000 341 API calls 102074->102076 102077 9f9bf8 59 API calls 102075->102077 102078 a647c0 102075->102078 102076->102075 102077->102078 102078->101974 102080 9f77c7 59 API calls 102079->102080 102081 a6c608 102080->102081 102082 9f77c7 59 API calls 102081->102082 102083 a6c610 102082->102083 102084 9f77c7 59 API calls 102083->102084 102085 a6c618 102084->102085 102086 9f9997 84 API calls 102085->102086 102094 a6c626 102086->102094 102087 9f7a84 59 API calls 102087->102094 102088 9f7d2c 59 API calls 102088->102094 102090 a6c7f6 102091 9f7e0b 59 API calls 102090->102091 102095 a6c803 102091->102095 102092 a6c83c Mailbox 102092->101962 102093 a6c811 102096 9f7e0b 59 API calls 102093->102096 102094->102087 102094->102088 102094->102090 102094->102092 102094->102093 102097 9f81a7 59 API calls 102094->102097 102098 9f7faf 59 API calls 102094->102098 102101 9f7faf 59 API calls 102094->102101 102103 a6c80f 102094->102103 102108 9f9997 84 API calls 102094->102108 102109 9f7e0b 59 API calls 102094->102109 102110 9f7c8e 59 API calls 102094->102110 102099 9f7c8e 59 API calls 102095->102099 102100 a6c820 102096->102100 102097->102094 102102 a6c6bd CharUpperBuffW 102098->102102 102099->102103 102104 9f7c8e 59 API calls 102100->102104 102105 a6c77d CharUpperBuffW 102101->102105 102203 9f859a 68 API calls 102102->102203 102103->102092 102205 9f9b9c 59 API calls Mailbox 102103->102205 102104->102103 102204 9fc707 69 API calls 2 library calls 102105->102204 102108->102094 102109->102094 102110->102094 102112 a57bec 102111->102112 102113 a10ff6 Mailbox 59 API calls 102112->102113 102114 a57bfa 102113->102114 102115 a57c08 102114->102115 102116 9f77c7 59 API calls 102114->102116 102115->101962 102116->102115 102206 a46636 102117->102206 102119 a46702 102119->101962 102120->101954 102121->101954 102122->101974 102123->101968 102124->101971 102125->101930 102126->101962 102127->101962 102128->101962 102129->101974 102130->101945 102131->101964 102132->101964 102133->101964 102134->101951 102135->101936 102136->101951 102138 9f9c08 102137->102138 102139 a2fbff 102137->102139 102144 a10ff6 Mailbox 59 API calls 102138->102144 102140 a2fc10 102139->102140 102142 9f7d2c 59 API calls 102139->102142 102141 9f7eec 59 API calls 102140->102141 102143 a2fc1a 102141->102143 102142->102140 102147 9f77c7 59 API calls 102143->102147 102149 9f9c34 102143->102149 102145 9f9c1b 102144->102145 102145->102143 102146 9f9c26 102145->102146 102148 9f7f41 59 API calls 102146->102148 102146->102149 102147->102149 102148->102149 102149->101984 102149->101987 102151 9f56dd 102150->102151 102152 9f5702 102150->102152 102151->102152 102154 9f56ec 102151->102154 102153 9f7eec 59 API calls 102152->102153 102157 a5349a 102153->102157 102176 9f5c18 102154->102176 102156 a534c9 102156->102012 102157->102156 102174 a53436 ReadFile SetFilePointerEx 102157->102174 102175 9f7a84 59 API calls 2 library calls 102157->102175 102164 a535d8 Mailbox 102164->102012 102165->101988 102166->102015 102167->102016 102168->101987 102169->101987 102170->101993 102171->102001 102172->102009 102173->102014 102174->102157 102175->102157 102177 a10ff6 Mailbox 59 API calls 102176->102177 102178 9f5c2b 102177->102178 102179 a10ff6 Mailbox 59 API calls 102178->102179 102180 9f5c37 102179->102180 102181 9f5632 102180->102181 102188 9f5a2f 102181->102188 102183 9f5674 102183->102164 102187 9f793a 61 API calls Mailbox 102183->102187 102184 9f5d20 2 API calls 102185 9f5643 102184->102185 102185->102183 102185->102184 102195 9f5bda 59 API calls 2 library calls 102185->102195 102187->102164 102189 a2e065 102188->102189 102190 9f5a40 102188->102190 102196 a46443 59 API calls Mailbox 102189->102196 102190->102185 102192 a2e06f 102193 a10ff6 Mailbox 59 API calls 102192->102193 102194 a2e07b 102193->102194 102195->102185 102196->102192 102197->102022 102198->102066 102199->102065 102200->102027 102201->102064 102202->102064 102203->102094 102204->102094 102205->102092 102207 a46641 102206->102207 102208 a4665e 102206->102208 102207->102208 102210 a46621 59 API calls Mailbox 102207->102210 102208->102119 102210->102207 102211 9f568a 102212 9f5c18 59 API calls 102211->102212 102213 9f569c 102212->102213 102214 9f5632 61 API calls 102213->102214 102215 9f56aa 102214->102215 102217 9f56ba Mailbox 102215->102217 102218 9f81c1 MultiByteToWideChar 102215->102218 102219 9f822e 102218->102219 102220 9f81e7 102218->102220 102221 9f7eec 59 API calls 102219->102221 102222 a10ff6 Mailbox 59 API calls 102220->102222 102225 9f8220 102221->102225 102223 9f81fc MultiByteToWideChar 102222->102223 102226 9f78ad 102223->102226 102225->102217 102227 9f792f 102226->102227 102228 9f78bc 102226->102228 102229 9f7e8c 59 API calls 102227->102229 102228->102227 102231 9f78c8 102228->102231 102230 9f78da _memmove 102229->102230 102230->102225 102232 9f78d2 102231->102232 102233 9f7900 102231->102233 102234 9f8087 59 API calls 102232->102234 102235 9f8189 59 API calls 102233->102235 102234->102230 102236 9f790a 102235->102236 102237 a10ff6 Mailbox 59 API calls 102236->102237 102237->102230 102238 a30226 102244 9fade2 Mailbox 102238->102244 102240 a30c86 102241 a466f4 Mailbox 59 API calls 102240->102241 102242 a30c8f 102241->102242 102244->102240 102244->102242 102245 a300e0 VariantClear 102244->102245 102246 9fb6c1 102244->102246 102248 a6e237 130 API calls 102244->102248 102249 a5d2e6 101 API calls 102244->102249 102250 a02123 95 API calls 102244->102250 102251 a6474d 341 API calls 102244->102251 102252 9f9df0 59 API calls Mailbox 102244->102252 102253 a47405 59 API calls 102244->102253 102245->102244 102254 a5a0b5 89 API calls 4 library calls 102246->102254 102248->102244 102249->102244 102250->102244 102251->102244 102252->102244 102253->102244 102254->102240 102255 9f1016 102260 9f4ad2 102255->102260 102258 a12f80 __cinit 67 API calls 102259 9f1025 102258->102259 102261 a10ff6 Mailbox 59 API calls 102260->102261 102262 9f4ada 102261->102262 102263 9f101b 102262->102263 102267 9f4a94 102262->102267 102263->102258 102268 9f4a9d 102267->102268 102269 9f4aaf 102267->102269 102270 a12f80 __cinit 67 API calls 102268->102270 102271 9f4afe 102269->102271 102270->102269 102272 9f77c7 59 API calls 102271->102272 102273 9f4b16 GetVersionExW 102272->102273 102274 9f7d2c 59 API calls 102273->102274 102275 9f4b59 102274->102275 102276 9f7e8c 59 API calls 102275->102276 102286 9f4b86 102275->102286 102277 9f4b7a 102276->102277 102278 9f7886 59 API calls 102277->102278 102278->102286 102279 9f4bf1 GetCurrentProcess IsWow64Process 102281 9f4c0a 102279->102281 102280 a2dc8d 102282 9f4c89 GetSystemInfo 102281->102282 102283 9f4c20 102281->102283 102284 9f4c56 102282->102284 102295 9f4c95 102283->102295 102284->102263 102286->102279 102286->102280 102288 9f4c7d GetSystemInfo 102291 9f4c47 102288->102291 102289 9f4c32 102290 9f4c95 2 API calls 102289->102290 102292 9f4c3a GetNativeSystemInfo 102290->102292 102291->102284 102293 9f4c4d FreeLibrary 102291->102293 102292->102291 102293->102284 102296 9f4c2e 102295->102296 102297 9f4c9e LoadLibraryA 102295->102297 102296->102288 102296->102289 102297->102296 102298 9f4caf GetProcAddress 102297->102298 102298->102296 102299 b92410 102313 b90000 102299->102313 102301 b924cb 102316 b92300 102301->102316 102319 b934f0 GetPEB 102313->102319 102315 b9068b 102315->102301 102317 b92309 Sleep 102316->102317 102318 b92317 102317->102318 102320 b9351a 102319->102320 102320->102315 102321 9f1066 102326 9ff8cf 102321->102326 102323 9f106c 102324 a12f80 __cinit 67 API calls 102323->102324 102325 9f1076 102324->102325 102327 9ff8f0 102326->102327 102359 a10143 102327->102359 102331 9ff937 102332 9f77c7 59 API calls 102331->102332 102333 9ff941 102332->102333 102334 9f77c7 59 API calls 102333->102334 102335 9ff94b 102334->102335 102336 9f77c7 59 API calls 102335->102336 102337 9ff955 102336->102337 102338 9f77c7 59 API calls 102337->102338 102339 9ff993 102338->102339 102340 9f77c7 59 API calls 102339->102340 102341 9ffa5e 102340->102341 102369 a060e7 102341->102369 102345 9ffa90 102346 9f77c7 59 API calls 102345->102346 102347 9ffa9a 102346->102347 102397 a0ffde 102347->102397 102349 9ffae1 102350 9ffaf1 GetStdHandle 102349->102350 102351 9ffb3d 102350->102351 102352 a349d5 102350->102352 102353 9ffb45 OleInitialize 102351->102353 102352->102351 102354 a349de 102352->102354 102353->102323 102404 a56dda 64 API calls Mailbox 102354->102404 102356 a349e5 102405 a574a9 CreateThread 102356->102405 102358 a349f1 CloseHandle 102358->102353 102406 a1021c 102359->102406 102362 a1021c 59 API calls 102363 a10185 102362->102363 102364 9f77c7 59 API calls 102363->102364 102365 a10191 102364->102365 102366 9f7d2c 59 API calls 102365->102366 102367 9ff8f6 102366->102367 102368 a103a2 6 API calls 102367->102368 102368->102331 102370 9f77c7 59 API calls 102369->102370 102371 a060f7 102370->102371 102372 9f77c7 59 API calls 102371->102372 102373 a060ff 102372->102373 102413 a05bfd 102373->102413 102376 a05bfd 59 API calls 102377 a0610f 102376->102377 102378 9f77c7 59 API calls 102377->102378 102379 a0611a 102378->102379 102380 a10ff6 Mailbox 59 API calls 102379->102380 102381 9ffa68 102380->102381 102382 a06259 102381->102382 102383 a06267 102382->102383 102384 9f77c7 59 API calls 102383->102384 102385 a06272 102384->102385 102386 9f77c7 59 API calls 102385->102386 102387 a0627d 102386->102387 102388 9f77c7 59 API calls 102387->102388 102389 a06288 102388->102389 102390 9f77c7 59 API calls 102389->102390 102391 a06293 102390->102391 102392 a05bfd 59 API calls 102391->102392 102393 a0629e 102392->102393 102394 a10ff6 Mailbox 59 API calls 102393->102394 102395 a062a5 RegisterWindowMessageW 102394->102395 102395->102345 102398 a45cc3 102397->102398 102399 a0ffee 102397->102399 102416 a59d71 60 API calls 102398->102416 102400 a10ff6 Mailbox 59 API calls 102399->102400 102403 a0fff6 102400->102403 102402 a45cce 102403->102349 102404->102356 102405->102358 102417 a5748f 65 API calls 102405->102417 102407 9f77c7 59 API calls 102406->102407 102408 a10227 102407->102408 102409 9f77c7 59 API calls 102408->102409 102410 a1022f 102409->102410 102411 9f77c7 59 API calls 102410->102411 102412 a1017b 102411->102412 102412->102362 102414 9f77c7 59 API calls 102413->102414 102415 a05c05 102414->102415 102415->102376 102416->102402 102418 9f1055 102423 9f2649 102418->102423 102421 a12f80 __cinit 67 API calls 102422 9f1064 102421->102422 102424 9f77c7 59 API calls 102423->102424 102425 9f26b7 102424->102425 102430 9f3582 102425->102430 102428 9f2754 102429 9f105a 102428->102429 102433 9f3416 59 API calls 2 library calls 102428->102433 102429->102421 102434 9f35b0 102430->102434 102433->102428 102435 9f35a1 102434->102435 102436 9f35bd 102434->102436 102435->102428 102436->102435 102437 9f35c4 RegOpenKeyExW 102436->102437 102437->102435 102438 9f35de RegQueryValueExW 102437->102438 102439 9f35ff 102438->102439 102440 9f3614 RegCloseKey 102438->102440 102439->102440 102440->102435 102441 9f3633 102442 9f366a 102441->102442 102443 9f36e5 102442->102443 102444 9f3688 102442->102444 102445 9f36e7 102442->102445 102446 9f36ca DefWindowProcW 102443->102446 102449 9f375d PostQuitMessage 102444->102449 102450 9f3695 102444->102450 102447 9f36ed 102445->102447 102448 a2d31c 102445->102448 102451 9f36d8 102446->102451 102452 9f3715 SetTimer RegisterWindowMessageW 102447->102452 102453 9f36f2 102447->102453 102491 a011d0 10 API calls Mailbox 102448->102491 102449->102451 102454 a2d38f 102450->102454 102455 9f36a0 102450->102455 102452->102451 102460 9f373e CreatePopupMenu 102452->102460 102458 9f36f9 KillTimer 102453->102458 102459 a2d2bf 102453->102459 102495 a52a16 71 API calls _memset 102454->102495 102461 9f36a8 102455->102461 102462 9f3767 102455->102462 102457 a2d343 102492 a011f3 341 API calls Mailbox 102457->102492 102486 9f44cb Shell_NotifyIconW _memset 102458->102486 102467 a2d2c4 102459->102467 102468 a2d2f8 MoveWindow 102459->102468 102460->102451 102470 a2d374 102461->102470 102471 9f36b3 102461->102471 102489 9f4531 64 API calls _memset 102462->102489 102464 a2d3a1 102464->102446 102464->102451 102475 a2d2e7 SetFocus 102467->102475 102476 a2d2c8 102467->102476 102468->102451 102470->102446 102494 a4817e 59 API calls Mailbox 102470->102494 102472 9f36be 102471->102472 102473 9f374b 102471->102473 102472->102446 102493 9f44cb Shell_NotifyIconW _memset 102472->102493 102488 9f45df 81 API calls _memset 102473->102488 102474 9f375b 102474->102451 102475->102451 102476->102472 102479 a2d2d1 102476->102479 102477 9f370c 102487 9f3114 DeleteObject DestroyWindow Mailbox 102477->102487 102490 a011d0 10 API calls Mailbox 102479->102490 102484 a2d368 102485 9f43db 68 API calls 102484->102485 102485->102443 102486->102477 102487->102451 102488->102474 102489->102474 102490->102451 102491->102457 102492->102472 102493->102484 102494->102443 102495->102464

                          Control-flow Graph

                          APIs
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 009F3B7A
                          • IsDebuggerPresent.KERNEL32 ref: 009F3B8C
                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00AB62F8,00AB62E0,?,?), ref: 009F3BFD
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                            • Part of subcall function 00A00A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,009F3C26,00AB62F8,?,?,?), ref: 00A00ACE
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 009F3C81
                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00AA93F0,00000010), ref: 00A2D4BC
                          • SetCurrentDirectoryW.KERNEL32(?,00AB62F8,?,?,?), ref: 00A2D4F4
                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00AA5D40,00AB62F8,?,?,?), ref: 00A2D57A
                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 00A2D581
                            • Part of subcall function 009F3A58: GetSysColorBrush.USER32(0000000F), ref: 009F3A62
                            • Part of subcall function 009F3A58: LoadCursorW.USER32(00000000,00007F00), ref: 009F3A71
                            • Part of subcall function 009F3A58: LoadIconW.USER32(00000063), ref: 009F3A88
                            • Part of subcall function 009F3A58: LoadIconW.USER32(000000A4), ref: 009F3A9A
                            • Part of subcall function 009F3A58: LoadIconW.USER32(000000A2), ref: 009F3AAC
                            • Part of subcall function 009F3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009F3AD2
                            • Part of subcall function 009F3A58: RegisterClassExW.USER32(?), ref: 009F3B28
                            • Part of subcall function 009F39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009F3A15
                            • Part of subcall function 009F39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009F3A36
                            • Part of subcall function 009F39E7: ShowWindow.USER32(00000000,?,?), ref: 009F3A4A
                            • Part of subcall function 009F39E7: ShowWindow.USER32(00000000,?,?), ref: 009F3A53
                            • Part of subcall function 009F43DB: _memset.LIBCMT ref: 009F4401
                            • Part of subcall function 009F43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 009F44A6
                          Strings
                          • This is a third-party compiled AutoIt script., xrefs: 00A2D4B4
                          • runas, xrefs: 00A2D575
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                          • String ID: This is a third-party compiled AutoIt script.$runas
                          • API String ID: 529118366-3287110873
                          • Opcode ID: 35eda7c9ed4cb05b2f15f3664110989b89922e77473ea9c250b17b6722e81f11
                          • Instruction ID: 85049948402442aeff06816a70794703d8fb15b937424274b49d794ea8faa14b
                          • Opcode Fuzzy Hash: 35eda7c9ed4cb05b2f15f3664110989b89922e77473ea9c250b17b6722e81f11
                          • Instruction Fuzzy Hash: 6151B231D0824CBEDF11EBF4EC05AFE7B79AB85300F048175FA55A61A3DA784A46CB21

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 996 9f4afe-9f4b5e call 9f77c7 GetVersionExW call 9f7d2c 1001 9f4c69-9f4c6b 996->1001 1002 9f4b64 996->1002 1003 a2db90-a2db9c 1001->1003 1004 9f4b67-9f4b6c 1002->1004 1005 a2db9d-a2dba1 1003->1005 1006 9f4b72 1004->1006 1007 9f4c70-9f4c71 1004->1007 1009 a2dba3 1005->1009 1010 a2dba4-a2dbb0 1005->1010 1008 9f4b73-9f4baa call 9f7e8c call 9f7886 1006->1008 1007->1008 1018 a2dc8d-a2dc90 1008->1018 1019 9f4bb0-9f4bb1 1008->1019 1009->1010 1010->1005 1012 a2dbb2-a2dbb7 1010->1012 1012->1004 1014 a2dbbd-a2dbc4 1012->1014 1014->1003 1016 a2dbc6 1014->1016 1020 a2dbcb-a2dbce 1016->1020 1021 a2dc92 1018->1021 1022 a2dca9-a2dcad 1018->1022 1019->1020 1023 9f4bb7-9f4bc2 1019->1023 1024 a2dbd4-a2dbf2 1020->1024 1025 9f4bf1-9f4c08 GetCurrentProcess IsWow64Process 1020->1025 1026 a2dc95 1021->1026 1030 a2dc98-a2dca1 1022->1030 1031 a2dcaf-a2dcb8 1022->1031 1027 a2dc13-a2dc19 1023->1027 1028 9f4bc8-9f4bca 1023->1028 1024->1025 1029 a2dbf8-a2dbfe 1024->1029 1032 9f4c0d-9f4c1e 1025->1032 1033 9f4c0a 1025->1033 1026->1030 1038 a2dc23-a2dc29 1027->1038 1039 a2dc1b-a2dc1e 1027->1039 1034 a2dc2e-a2dc3a 1028->1034 1035 9f4bd0-9f4bd3 1028->1035 1036 a2dc00-a2dc03 1029->1036 1037 a2dc08-a2dc0e 1029->1037 1030->1022 1031->1026 1040 a2dcba-a2dcbd 1031->1040 1041 9f4c89-9f4c93 GetSystemInfo 1032->1041 1042 9f4c20-9f4c30 call 9f4c95 1032->1042 1033->1032 1046 a2dc44-a2dc4a 1034->1046 1047 a2dc3c-a2dc3f 1034->1047 1043 9f4bd9-9f4be8 1035->1043 1044 a2dc5a-a2dc5d 1035->1044 1036->1025 1037->1025 1038->1025 1039->1025 1040->1030 1045 9f4c56-9f4c66 1041->1045 1055 9f4c7d-9f4c87 GetSystemInfo 1042->1055 1056 9f4c32-9f4c3f call 9f4c95 1042->1056 1050 9f4bee 1043->1050 1051 a2dc4f-a2dc55 1043->1051 1044->1025 1049 a2dc63-a2dc78 1044->1049 1046->1025 1047->1025 1053 a2dc82-a2dc88 1049->1053 1054 a2dc7a-a2dc7d 1049->1054 1050->1025 1051->1025 1053->1025 1054->1025 1058 9f4c47-9f4c4b 1055->1058 1061 9f4c76-9f4c7b 1056->1061 1062 9f4c41-9f4c45 GetNativeSystemInfo 1056->1062 1058->1045 1060 9f4c4d-9f4c50 FreeLibrary 1058->1060 1060->1045 1061->1062 1062->1058
                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 009F4B2B
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          • GetCurrentProcess.KERNEL32(?,00A7FAEC,00000000,00000000,?), ref: 009F4BF8
                          • IsWow64Process.KERNEL32(00000000), ref: 009F4BFF
                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 009F4C45
                          • FreeLibrary.KERNEL32(00000000), ref: 009F4C50
                          • GetSystemInfo.KERNEL32(00000000), ref: 009F4C81
                          • GetSystemInfo.KERNEL32(00000000), ref: 009F4C8D
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                          • String ID:
                          • API String ID: 1986165174-0
                          • Opcode ID: 52238ff37e5614b057ce589668b56ae0e1b69312aa12b8fc3b617ed3ac144bba
                          • Instruction ID: a18bd42f68edae416c39656e7118a40cf0e547198c7070e74dd518a97c8de001
                          • Opcode Fuzzy Hash: 52238ff37e5614b057ce589668b56ae0e1b69312aa12b8fc3b617ed3ac144bba
                          • Instruction Fuzzy Hash: 6391D63194A7C4DEC731CBB895511BBFFE4AF26301B444EADD1CB93A42D224E948C759

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1063 9f4fe9-9f5001 CreateStreamOnHGlobal 1064 9f5003-9f501a FindResourceExW 1063->1064 1065 9f5021-9f5026 1063->1065 1066 a2dd5c-a2dd6b LoadResource 1064->1066 1067 9f5020 1064->1067 1066->1067 1068 a2dd71-a2dd7f SizeofResource 1066->1068 1067->1065 1068->1067 1069 a2dd85-a2dd90 LockResource 1068->1069 1069->1067 1070 a2dd96-a2dd9e 1069->1070 1071 a2dda2-a2ddb4 1070->1071 1071->1067
                          APIs
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,009F4EEE,?,?,00000000,00000000), ref: 009F4FF9
                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,009F4EEE,?,?,00000000,00000000), ref: 009F5010
                          • LoadResource.KERNEL32(?,00000000,?,?,009F4EEE,?,?,00000000,00000000,?,?,?,?,?,?,009F4F8F), ref: 00A2DD60
                          • SizeofResource.KERNEL32(?,00000000,?,?,009F4EEE,?,?,00000000,00000000,?,?,?,?,?,?,009F4F8F), ref: 00A2DD75
                          • LockResource.KERNEL32(009F4EEE,?,?,009F4EEE,?,?,00000000,00000000,?,?,?,?,?,?,009F4F8F,00000000), ref: 00A2DD88
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                          • String ID: SCRIPT
                          • API String ID: 3051347437-3967369404
                          • Opcode ID: 725f89b82db8457bcf985d15aff599a62fcf94d20257ba5bbaff11388859f013
                          • Instruction ID: b768be75ca667d6c6c1eade871223b610df27948413db49e6ab57493efc31d5b
                          • Opcode Fuzzy Hash: 725f89b82db8457bcf985d15aff599a62fcf94d20257ba5bbaff11388859f013
                          • Instruction Fuzzy Hash: D6119A70200B04BFD7208B65DC48F677BBDEBC9B11F248568F60AC6260DB71EC41C6A0
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,00A2E7C1), ref: 00A546A6
                          • FindFirstFileW.KERNELBASE(?,?), ref: 00A546B7
                          • FindClose.KERNEL32(00000000), ref: 00A546C7
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FileFind$AttributesCloseFirst
                          • String ID:
                          • API String ID: 48322524-0
                          • Opcode ID: 41e18f03d34f82c308b63323160064ea82c4d99cd7f34b8be83b268e34bf75c7
                          • Instruction ID: 2c84f41c17403d892dbbd543e946a869bdd0c245c77d0db8689fce33e3d76bb3
                          • Opcode Fuzzy Hash: 41e18f03d34f82c308b63323160064ea82c4d99cd7f34b8be83b268e34bf75c7
                          • Instruction Fuzzy Hash: 0BE0D8314148005F4210A778EC4D4EA775CAE0A33AF104715FC39C24E0E7B05AD486D5
                          Strings
                          • Variable must be of type 'Object'., xrefs: 00A3428C
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID: Variable must be of type 'Object'.
                          • API String ID: 0-109567571
                          • Opcode ID: c3a9d6ddd9fe4b95a1963831c8a6cea5c12cf9493ad7189a36d78b3cc1007fd5
                          • Instruction ID: d29165d0770a3a068fbf7d91ff55713aac9bb4f705f0f3c46eb92e62a57931d3
                          • Opcode Fuzzy Hash: c3a9d6ddd9fe4b95a1963831c8a6cea5c12cf9493ad7189a36d78b3cc1007fd5
                          • Instruction Fuzzy Hash: BBA2B175A04209CFCB24CF98C490ABEB7B5FF58300F248569EA16AB361D775ED42CB91
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A00BBB
                          • timeGetTime.WINMM ref: 00A00E76
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A00FB3
                          • TranslateMessage.USER32(?), ref: 00A00FC7
                          • DispatchMessageW.USER32(?), ref: 00A00FD5
                          • Sleep.KERNEL32(0000000A), ref: 00A00FDF
                          • LockWindowUpdate.USER32(00000000,?,?), ref: 00A0105A
                          • DestroyWindow.USER32 ref: 00A01066
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A01080
                          • Sleep.KERNEL32(0000000A,?,?), ref: 00A352AD
                          • TranslateMessage.USER32(?), ref: 00A3608A
                          • DispatchMessageW.USER32(?), ref: 00A36098
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00A360AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                          • API String ID: 4003667617-3242690629
                          • Opcode ID: cd3e57bc89c0fd2d6abe383ddd73ee949de8268cb43f8160f867cdbacff31195
                          • Instruction ID: e5a200dcda8dc35db4b801f30df7bafb07cb0cd4fc5a2915440bad24ff147955
                          • Opcode Fuzzy Hash: cd3e57bc89c0fd2d6abe383ddd73ee949de8268cb43f8160f867cdbacff31195
                          • Instruction Fuzzy Hash: 8BB2D370A08745DFD728DF28D885FAAB7E5BF84304F14491DF58A972A1DB70E885CB82

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00A591E9: __time64.LIBCMT ref: 00A591F3
                            • Part of subcall function 009F5045: _fseek.LIBCMT ref: 009F505D
                          • __wsplitpath.LIBCMT ref: 00A594BE
                            • Part of subcall function 00A1432E: __wsplitpath_helper.LIBCMT ref: 00A1436E
                          • _wcscpy.LIBCMT ref: 00A594D1
                          • _wcscat.LIBCMT ref: 00A594E4
                          • __wsplitpath.LIBCMT ref: 00A59509
                          • _wcscat.LIBCMT ref: 00A5951F
                          • _wcscat.LIBCMT ref: 00A59532
                            • Part of subcall function 00A5922F: _memmove.LIBCMT ref: 00A59268
                            • Part of subcall function 00A5922F: _memmove.LIBCMT ref: 00A59277
                          • _wcscmp.LIBCMT ref: 00A59479
                            • Part of subcall function 00A599BE: _wcscmp.LIBCMT ref: 00A59AAE
                            • Part of subcall function 00A599BE: _wcscmp.LIBCMT ref: 00A59AC1
                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A596DC
                          • _wcsncpy.LIBCMT ref: 00A5974F
                          • DeleteFileW.KERNEL32(?,?), ref: 00A59785
                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00A5979B
                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A597AC
                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00A597BE
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                          • String ID:
                          • API String ID: 1500180987-0
                          • Opcode ID: 0b8d53e11f5bab89aeb31d9f8bd560d5abda0373cdbda4bd4d8b8fc2dce3edbf
                          • Instruction ID: 81476f1bd2b9db900b862778e71ae20bf57af069ef5ea1ed795ecb68ad9d09fd
                          • Opcode Fuzzy Hash: 0b8d53e11f5bab89aeb31d9f8bd560d5abda0373cdbda4bd4d8b8fc2dce3edbf
                          • Instruction Fuzzy Hash: 6BC12CB1D00219AEDF11DF94CD85EEFB7BDAF49310F0040AAF609E6151EB709A898F65

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 009F3074
                          • RegisterClassExW.USER32(00000030), ref: 009F309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F30AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 009F30CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F30DC
                          • LoadIconW.USER32(000000A9), ref: 009F30F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F3101
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: bd5db447df7a546cbd1b095249f74b7276750455e0b2d14ee32725973d58f851
                          • Instruction ID: 8f0ea9bb34adf2121ce550c37deaae93275e5a70f99fe8cb9adc7e9f45171cd3
                          • Opcode Fuzzy Hash: bd5db447df7a546cbd1b095249f74b7276750455e0b2d14ee32725973d58f851
                          • Instruction Fuzzy Hash: C0311A71944349AFDB10CFE4DC85AC9BBF0FB09310F14862AE594E62A1D3B90686CF51

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 009F3074
                          • RegisterClassExW.USER32(00000030), ref: 009F309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F30AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 009F30CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F30DC
                          • LoadIconW.USER32(000000A9), ref: 009F30F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F3101
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: aa8349ca39f59f38421f1830f8effac390a8c7b70b15868c5cab80250f52d6cd
                          • Instruction ID: c1e583ce967bb89962949ffcfd0d5adae8a16312a66890a8fd72bf9685a352c0
                          • Opcode Fuzzy Hash: aa8349ca39f59f38421f1830f8effac390a8c7b70b15868c5cab80250f52d6cd
                          • Instruction Fuzzy Hash: CD21C5B1D40218AFDB00DFE4EC49BDDBBF4FB08710F00822AF914A62A1D7B546868F95

                          Control-flow Graph

                          APIs
                            • Part of subcall function 009F4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00AB62F8,?,009F37C0,?), ref: 009F4882
                            • Part of subcall function 00A1074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,009F72C5), ref: 00A10771
                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 009F7308
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00A2ECF1
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00A2ED32
                          • RegCloseKey.ADVAPI32(?), ref: 00A2ED70
                          • _wcscat.LIBCMT ref: 00A2EDC9
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                          • API String ID: 2673923337-2727554177
                          • Opcode ID: c8c75829bee40544ec6b417324543ea7a7e9f462d958b201796c4924a8d08928
                          • Instruction ID: db893c794f1a13c78ec1e14c110abf83f21cb5c167421518837bffa3f9f3027d
                          • Opcode Fuzzy Hash: c8c75829bee40544ec6b417324543ea7a7e9f462d958b201796c4924a8d08928
                          • Instruction Fuzzy Hash: 53715E714083059EC714EFA9EC819AFBBE8FF98340F44452EF545972B1EBB0998ACB51

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 009F3A62
                          • LoadCursorW.USER32(00000000,00007F00), ref: 009F3A71
                          • LoadIconW.USER32(00000063), ref: 009F3A88
                          • LoadIconW.USER32(000000A4), ref: 009F3A9A
                          • LoadIconW.USER32(000000A2), ref: 009F3AAC
                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 009F3AD2
                          • RegisterClassExW.USER32(?), ref: 009F3B28
                            • Part of subcall function 009F3041: GetSysColorBrush.USER32(0000000F), ref: 009F3074
                            • Part of subcall function 009F3041: RegisterClassExW.USER32(00000030), ref: 009F309E
                            • Part of subcall function 009F3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F30AF
                            • Part of subcall function 009F3041: InitCommonControlsEx.COMCTL32(?), ref: 009F30CC
                            • Part of subcall function 009F3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 009F30DC
                            • Part of subcall function 009F3041: LoadIconW.USER32(000000A9), ref: 009F30F2
                            • Part of subcall function 009F3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 009F3101
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                          • String ID: #$0$AutoIt v3
                          • API String ID: 423443420-4155596026
                          • Opcode ID: a8b31b9cabed11fc688fef7767285bd3d306df0e7eb93eadd291a2cc746990d9
                          • Instruction ID: b551750db58631b42d6cfa564b769bd8d4f6fb7d07e217765cb379a7cc09d452
                          • Opcode Fuzzy Hash: a8b31b9cabed11fc688fef7767285bd3d306df0e7eb93eadd291a2cc746990d9
                          • Instruction Fuzzy Hash: D5212F71D00308AFEB15DFE4EC05BED7BB4FB08711F104229E604A62B2D7B95A558F54

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 767 9f3633-9f3681 769 9f3683-9f3686 767->769 770 9f36e1-9f36e3 767->770 772 9f3688-9f368f 769->772 773 9f36e7 769->773 770->769 771 9f36e5 770->771 774 9f36ca-9f36d2 DefWindowProcW 771->774 777 9f375d-9f3765 PostQuitMessage 772->777 778 9f3695-9f369a 772->778 775 9f36ed-9f36f0 773->775 776 a2d31c-a2d34a call a011d0 call a011f3 773->776 779 9f36d8-9f36de 774->779 781 9f3715-9f373c SetTimer RegisterWindowMessageW 775->781 782 9f36f2-9f36f3 775->782 811 a2d34f-a2d356 776->811 780 9f3711-9f3713 777->780 783 a2d38f-a2d3a3 call a52a16 778->783 784 9f36a0-9f36a2 778->784 780->779 781->780 789 9f373e-9f3749 CreatePopupMenu 781->789 787 9f36f9-9f370c KillTimer call 9f44cb call 9f3114 782->787 788 a2d2bf-a2d2c2 782->788 783->780 803 a2d3a9 783->803 790 9f36a8-9f36ad 784->790 791 9f3767-9f3776 call 9f4531 784->791 787->780 796 a2d2c4-a2d2c6 788->796 797 a2d2f8-a2d317 MoveWindow 788->797 789->780 799 a2d374-a2d37b 790->799 800 9f36b3-9f36b8 790->800 791->780 806 a2d2e7-a2d2f3 SetFocus 796->806 807 a2d2c8-a2d2cb 796->807 797->780 799->774 809 a2d381-a2d38a call a4817e 799->809 801 9f36be-9f36c4 800->801 802 9f374b-9f375b call 9f45df 800->802 801->774 801->811 802->780 803->774 806->780 807->801 812 a2d2d1-a2d2e2 call a011d0 807->812 809->774 811->774 816 a2d35c-a2d36f call 9f44cb call 9f43db 811->816 812->780 816->774
                          APIs
                          • DefWindowProcW.USER32(?,?,?,?), ref: 009F36D2
                          • KillTimer.USER32(?,00000001), ref: 009F36FC
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009F371F
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 009F372A
                          • CreatePopupMenu.USER32 ref: 009F373E
                          • PostQuitMessage.USER32(00000000), ref: 009F375F
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                          • String ID: TaskbarCreated
                          • API String ID: 129472671-2362178303
                          • Opcode ID: 636c5317e334b0972a95ed7cd734b85e5256d823ddd487dc7cf166c4f1c9c956
                          • Instruction ID: 699b5d30a44e48b9b4a05a8fccf8a3b13e3979a9506c8b1b208798f8f591d8c9
                          • Opcode Fuzzy Hash: 636c5317e334b0972a95ed7cd734b85e5256d823ddd487dc7cf166c4f1c9c956
                          • Instruction Fuzzy Hash: D74118B120410DBBDB14BFA8EC0ABBA3759EB40301F148629F702D62F3DA6D9E519761

                          Control-flow Graph

                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                          • API String ID: 1825951767-3513169116
                          • Opcode ID: 3398ce688c0d1fb4b5a5d2c0fd55cb28b8bb1969f205d63f8f4aac417cf158e5
                          • Instruction ID: 3e95d8c4d6a0ad2ec1fe7743c9802a0c0dc411b0adae643b020a00cf93bbf17f
                          • Opcode Fuzzy Hash: 3398ce688c0d1fb4b5a5d2c0fd55cb28b8bb1969f205d63f8f4aac417cf158e5
                          • Instruction Fuzzy Hash: A4A15A72D1022DAADF04EFA4CC91BFEB778BF54300F144529E616A7192DF789A49CB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 942 b92640-b926ee call b90000 945 b926f5-b9271b call b93550 CreateFileW 942->945 948 b9271d 945->948 949 b92722-b92732 945->949 950 b9286d-b92871 948->950 954 b92739-b92753 VirtualAlloc 949->954 955 b92734 949->955 952 b928b3-b928b6 950->952 953 b92873-b92877 950->953 956 b928b9-b928c0 952->956 957 b92879-b9287c 953->957 958 b92883-b92887 953->958 959 b9275a-b92771 ReadFile 954->959 960 b92755 954->960 955->950 961 b928c2-b928cd 956->961 962 b92915-b9292a 956->962 957->958 963 b92889-b92893 958->963 964 b92897-b9289b 958->964 969 b92778-b927b8 VirtualAlloc 959->969 970 b92773 959->970 960->950 971 b928cf 961->971 972 b928d1-b928dd 961->972 965 b9293a-b92942 962->965 966 b9292c-b92937 VirtualFree 962->966 963->964 967 b928ab 964->967 968 b9289d-b928a7 964->968 966->965 967->952 968->967 973 b927ba 969->973 974 b927bf-b927da call b937a0 969->974 970->950 971->962 975 b928df-b928ef 972->975 976 b928f1-b928fd 972->976 973->950 982 b927e5-b927ef 974->982 978 b92913 975->978 979 b9290a-b92910 976->979 980 b928ff-b92908 976->980 978->956 979->978 980->978 983 b927f1-b92820 call b937a0 982->983 984 b92822-b92836 call b935b0 982->984 983->982 990 b92838 984->990 991 b9283a-b9283e 984->991 990->950 992 b9284a-b9284e 991->992 993 b92840-b92844 FindCloseChangeNotification 991->993 994 b9285e-b92867 992->994 995 b92850-b9285b VirtualFree 992->995 993->992 994->945 994->950 995->994
                          APIs
                          • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00B92711
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B92937
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateFileFreeVirtual
                          • String ID:
                          • API String ID: 204039940-0
                          • Opcode ID: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                          • Instruction ID: 7d20eec68c9c761080e132be144bce1e8e0dd9acbc742f3c4e638006ac4fbb9a
                          • Opcode Fuzzy Hash: 7a8af28d10d872e8c42d0e09e8738e4af41cabd85448581b7ead53f150642b41
                          • Instruction Fuzzy Hash: 27A1F574E00209EBDF14CFA4C994BAEBBB5FF48704F2081A9E505BB280D7799E41DB94

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1073 9f39e7-9f3a57 CreateWindowExW * 2 ShowWindow * 2
                          APIs
                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 009F3A15
                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 009F3A36
                          • ShowWindow.USER32(00000000,?,?), ref: 009F3A4A
                          • ShowWindow.USER32(00000000,?,?), ref: 009F3A53
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$CreateShow
                          • String ID: AutoIt v3$edit
                          • API String ID: 1584632944-3779509399
                          • Opcode ID: c45d318fab0ccceb42bf86af459b09a31fbee5d8f5b4ec2298531c13823f8cc1
                          • Instruction ID: ed88e197009e37635338a7f73fc2eac15d5cf2177837b6c12ee0fdff021f667a
                          • Opcode Fuzzy Hash: c45d318fab0ccceb42bf86af459b09a31fbee5d8f5b4ec2298531c13823f8cc1
                          • Instruction Fuzzy Hash: 0CF0F471A412907EFE3197976C4DEB73E7DD7C6F50F00822DB904A2271C5B91852DA70

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1074 b92410-b92541 call b90000 call b92300 CreateFileW 1081 b92548-b92558 1074->1081 1082 b92543 1074->1082 1085 b9255a 1081->1085 1086 b9255f-b92579 VirtualAlloc 1081->1086 1083 b925f8-b925fd 1082->1083 1085->1083 1087 b9257b 1086->1087 1088 b9257d-b92594 ReadFile 1086->1088 1087->1083 1089 b92598-b925d2 call b92340 call b91300 1088->1089 1090 b92596 1088->1090 1095 b925ee-b925f6 ExitProcess 1089->1095 1096 b925d4-b925e9 call b92390 1089->1096 1090->1083 1095->1083 1096->1095
                          APIs
                            • Part of subcall function 00B92300: Sleep.KERNELBASE(000001F4), ref: 00B92311
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00B92537
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateFileSleep
                          • String ID: VSDD24K1QRMHB7HGFAV6WC
                          • API String ID: 2694422964-1298060577
                          • Opcode ID: 5f4e93607546a90195a735922bb6a1a2d268a3570e2e1820a1a019fcb8789277
                          • Instruction ID: 8c9fbec23655120aa334b10aacf52f8403b46a3b91a153379e527b93fd20cb44
                          • Opcode Fuzzy Hash: 5f4e93607546a90195a735922bb6a1a2d268a3570e2e1820a1a019fcb8789277
                          • Instruction Fuzzy Hash: 0651A470D04289EBEF11D7A4C959BEEBBB8AF15304F1041D9E608BB2C1D7B91B44CBA5

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1098 9f410d-9f4123 1099 9f4129-9f413e call 9f7b76 1098->1099 1100 9f4200-9f4204 1098->1100 1103 9f4144-9f4164 call 9f7d2c 1099->1103 1104 a2d5dd-a2d5ec LoadStringW 1099->1104 1107 a2d5f7-a2d60f call 9f7c8e call 9f7143 1103->1107 1108 9f416a-9f416e 1103->1108 1104->1107 1117 9f417e-9f41fb call a13020 call 9f463e call a12ffc Shell_NotifyIconW call 9f5a64 1107->1117 1120 a2d615-a2d633 call 9f7e0b call 9f7143 call 9f7e0b 1107->1120 1110 9f4205-9f420e call 9f81a7 1108->1110 1111 9f4174-9f4179 call 9f7c8e 1108->1111 1110->1117 1111->1117 1117->1100 1120->1117
                          APIs
                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00A2D5EC
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          • _memset.LIBCMT ref: 009F418D
                          • _wcscpy.LIBCMT ref: 009F41E1
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009F41F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                          • String ID: Line:
                          • API String ID: 3942752672-1585850449
                          • Opcode ID: 203a53f501eb78426d45c8210ed0173455b18ca2100d3aea8921e409587f56ef
                          • Instruction ID: bf7e27afa75510f8c4f5b5614a868e9d83cf49e38d637846ec5e799768f5aa82
                          • Opcode Fuzzy Hash: 203a53f501eb78426d45c8210ed0173455b18ca2100d3aea8921e409587f56ef
                          • Instruction Fuzzy Hash: 5D31F87150C3086EE721EBA0DC45FFBB7ECAF95300F104A1EF295920A2DB789659C792

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1133 a1564d-a15666 1134 a15683 1133->1134 1135 a15668-a1566d 1133->1135 1137 a15685-a1568b 1134->1137 1135->1134 1136 a1566f-a15671 1135->1136 1138 a15673-a15678 call a18d68 1136->1138 1139 a1568c-a15691 1136->1139 1150 a1567e call a18ff6 1138->1150 1141 a15693-a1569d 1139->1141 1142 a1569f-a156a3 1139->1142 1141->1142 1144 a156c3-a156d2 1141->1144 1145 a156b3-a156b5 1142->1145 1146 a156a5-a156b0 call a13020 1142->1146 1148 a156d4-a156d7 1144->1148 1149 a156d9 1144->1149 1145->1138 1147 a156b7-a156c1 1145->1147 1146->1145 1147->1138 1147->1144 1152 a156de-a156e3 1148->1152 1149->1152 1150->1134 1155 a156e9-a156f0 1152->1155 1156 a157cc-a157cf 1152->1156 1157 a15731-a15733 1155->1157 1158 a156f2-a156fa 1155->1158 1156->1137 1160 a15735-a15737 1157->1160 1161 a1579d-a1579e call a20df7 1157->1161 1158->1157 1159 a156fc 1158->1159 1165 a15702-a15704 1159->1165 1166 a157fa 1159->1166 1162 a15739-a15741 1160->1162 1163 a1575b-a15766 1160->1163 1169 a157a3-a157a7 1161->1169 1167 a15751-a15755 1162->1167 1168 a15743-a1574f 1162->1168 1170 a15768 1163->1170 1171 a1576a-a1576d 1163->1171 1172 a15706-a15708 1165->1172 1173 a1570b-a15710 1165->1173 1174 a157fe-a15807 1166->1174 1175 a15757-a15759 1167->1175 1168->1175 1169->1174 1176 a157a9-a157ae 1169->1176 1170->1171 1177 a157d4-a157d8 1171->1177 1178 a1576f-a1577b call a14916 call a210ab 1171->1178 1172->1173 1173->1177 1179 a15716-a1572f call a20f18 1173->1179 1174->1137 1175->1171 1176->1177 1180 a157b0-a157c1 1176->1180 1181 a157ea-a157f5 call a18d68 1177->1181 1182 a157da-a157e7 call a13020 1177->1182 1194 a15780-a15785 1178->1194 1193 a15792-a1579b 1179->1193 1185 a157c4-a157c6 1180->1185 1181->1150 1182->1181 1185->1155 1185->1156 1193->1185 1195 a1578b-a1578e 1194->1195 1196 a1580c-a15810 1194->1196 1195->1166 1197 a15790 1195->1197 1196->1174 1197->1193
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                          • String ID:
                          • API String ID: 1559183368-0
                          • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                          • Instruction ID: eb9c524efa8d1a600470a1ef2302ab0e066913e45f93cab52d46c07bb898b4ee
                          • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                          • Instruction Fuzzy Hash: 79518630E00B05DFDB249FB9D9856EE77B6AF80320F648B29F835962D0D7709D918B90
                          APIs
                            • Part of subcall function 009F4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00AB62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009F4F6F
                          • _free.LIBCMT ref: 00A2E68C
                          • _free.LIBCMT ref: 00A2E6D3
                            • Part of subcall function 009F6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 009F6D0D
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _free$CurrentDirectoryLibraryLoad
                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                          • API String ID: 2861923089-1757145024
                          • Opcode ID: 75a17ff70a582d8e2bc112e282794e98665a6d1d877d8e8dd8fdd039597c6b76
                          • Instruction ID: 62fe094bb06628d2285cf3c43a90891ef75dd17782099f1cdfb4fcbb09b9e3bd
                          • Opcode Fuzzy Hash: 75a17ff70a582d8e2bc112e282794e98665a6d1d877d8e8dd8fdd039597c6b76
                          • Instruction Fuzzy Hash: CD919E71910229EFCF04EFA8DC91AEDB7B4FF18310F14446AF915AB291EB309945CB60
                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,009F35A1,SwapMouseButtons,00000004,?), ref: 009F35D4
                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,009F35A1,SwapMouseButtons,00000004,?,?,?,?,009F2754), ref: 009F35F5
                          • RegCloseKey.KERNELBASE(00000000,?,?,009F35A1,SwapMouseButtons,00000004,?,?,?,?,009F2754), ref: 009F3617
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Control Panel\Mouse
                          • API String ID: 3677997916-824357125
                          • Opcode ID: 9d8a53a478b600fa71df772a2468e1f0c4338aebe4c8426e25c84a72d620c182
                          • Instruction ID: 7b086f42655c453a9586a316bc5badf1807d24dafd4b6df932da00accd9065dc
                          • Opcode Fuzzy Hash: 9d8a53a478b600fa71df772a2468e1f0c4338aebe4c8426e25c84a72d620c182
                          • Instruction Fuzzy Hash: 96113371610208BEDF20CFA5DC81ABEBBACEF04740F008469A909D7210E2759F419BA0
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00B91B2D
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00B91B51
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00B91B73
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                          • Instruction ID: 16df3bd77ebeb6884082be61ce811daae9f621e626de60efb40c718e4936ce04
                          • Opcode Fuzzy Hash: cc658a0e6010fd3573e63fe9dffc1f366d2843c5c23e1a249a06af30add5367b
                          • Instruction Fuzzy Hash: F1622D30A14659DBEB24CFA4C840BEEB3B2EF58300F1095A9D10DEB394E7759E81DB59
                          APIs
                            • Part of subcall function 009F5045: _fseek.LIBCMT ref: 009F505D
                            • Part of subcall function 00A599BE: _wcscmp.LIBCMT ref: 00A59AAE
                            • Part of subcall function 00A599BE: _wcscmp.LIBCMT ref: 00A59AC1
                          • _free.LIBCMT ref: 00A5992C
                          • _free.LIBCMT ref: 00A59933
                          • _free.LIBCMT ref: 00A5999E
                            • Part of subcall function 00A12F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19C64), ref: 00A12FA9
                            • Part of subcall function 00A12F95: GetLastError.KERNEL32(00000000,?,00A19C64), ref: 00A12FBB
                          • _free.LIBCMT ref: 00A599A6
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                          • String ID:
                          • API String ID: 1552873950-0
                          • Opcode ID: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                          • Instruction ID: 971ed5a72038eb4ba6f819b6ca9aae550e2225065e322acb6f165b0c686c7f79
                          • Opcode Fuzzy Hash: c040f5d591410a8d3afab51092a26b6f5939c84b98243336257d617f1f09bfd3
                          • Instruction Fuzzy Hash: 37515CB1904218EFDF249F64DC85BAEBBB9FF48310F1404AEB609A7241DB315A94CF59
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                          • String ID:
                          • API String ID: 2782032738-0
                          • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                          • Instruction ID: 685327958abdb550717127e28695ed38192fb92fc96643dd2ef56658adc858a1
                          • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                          • Instruction Fuzzy Hash: 9B419375A407069BDF28CFADC8809EF77A6EF883A0B24817DE855C7640E7719DC18B44
                          APIs
                          • _memset.LIBCMT ref: 00A2EE62
                          • GetOpenFileNameW.COMDLG32(?), ref: 00A2EEAC
                            • Part of subcall function 009F48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F48A1,?,?,009F37C0,?), ref: 009F48CE
                            • Part of subcall function 00A109D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A109F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Name$Path$FileFullLongOpen_memset
                          • String ID: X
                          • API String ID: 3777226403-3081909835
                          • Opcode ID: ad0e9ec160209888f6797673cc7852518eec01f0c3154abb2d2c20b039941671
                          • Instruction ID: 56ee766b08f3459d3d7941a958ca983906a80d61371de444e78695bf4cbf6a97
                          • Opcode Fuzzy Hash: ad0e9ec160209888f6797673cc7852518eec01f0c3154abb2d2c20b039941671
                          • Instruction Fuzzy Hash: 7D21A431A0025C9BCB11DF94DC45BEEBBF99F49310F004019E508A7281DBB8598A8BA1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __fread_nolock_memmove
                          • String ID: EA06
                          • API String ID: 1988441806-3962188686
                          • Opcode ID: 1ab8dc23b7b9271c04ecf218e38308a839d4e59d57c06e45932cce3fc34caa35
                          • Instruction ID: b9ef3ee5fbf321b041eada133034a264174ef1c311b29921502b8b87630dd3d8
                          • Opcode Fuzzy Hash: 1ab8dc23b7b9271c04ecf218e38308a839d4e59d57c06e45932cce3fc34caa35
                          • Instruction Fuzzy Hash: 6001F572C04218BEDB28CBA8C856EEEBBF8DB15301F00459AF552D61C1E5B5A608DBA0
                          APIs
                          • GetTempPathW.KERNEL32(00000104,?), ref: 00A59B82
                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00A59B99
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Temp$FileNamePath
                          • String ID: aut
                          • API String ID: 3285503233-3010740371
                          • Opcode ID: 03813def8dac343b0badf02a03ede0f9a96e6af6decf304b64ecc0c8839d8747
                          • Instruction ID: 95ae295a12691824faa076f76375ae70a0f242a2bfa96929cf520bb54916a5e3
                          • Opcode Fuzzy Hash: 03813def8dac343b0badf02a03ede0f9a96e6af6decf304b64ecc0c8839d8747
                          • Instruction Fuzzy Hash: 5DD0177954030DABDA10DA90DC0EFEA776CA704700F0086A1BA58920A2EAB05A998A91
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 08d10930967583fcf1ddc2ef75fd8cc8493f9e344b96810b351ceeb788781871
                          • Instruction ID: 151cedc531201f9772f2ac4dc58893910b963f9aae51538d990fed3fb61f1b4a
                          • Opcode Fuzzy Hash: 08d10930967583fcf1ddc2ef75fd8cc8493f9e344b96810b351ceeb788781871
                          • Instruction Fuzzy Hash: 27F14570A083059FCB14DF28C580A6ABBF5FF88354F14892EF99A9B251D771E945CF82
                          APIs
                            • Part of subcall function 00A103A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A103D3
                            • Part of subcall function 00A103A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00A103DB
                            • Part of subcall function 00A103A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A103E6
                            • Part of subcall function 00A103A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A103F1
                            • Part of subcall function 00A103A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00A103F9
                            • Part of subcall function 00A103A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00A10401
                            • Part of subcall function 00A06259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,009FFA90), ref: 00A062B4
                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 009FFB2D
                          • OleInitialize.OLE32(00000000), ref: 009FFBAA
                          • CloseHandle.KERNEL32(00000000), ref: 00A349F2
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                          • String ID:
                          • API String ID: 1986988660-0
                          • Opcode ID: f184d26a73ae1f44811f7d1b62fa3904691425010713fb092e36ac5bf70dc1fd
                          • Instruction ID: f6ab2e6445d4e8f9d573293b30e4bc68d9041ed96c85ee766f16c0038845771d
                          • Opcode Fuzzy Hash: f184d26a73ae1f44811f7d1b62fa3904691425010713fb092e36ac5bf70dc1fd
                          • Instruction Fuzzy Hash: E38199B1911A408FC394EFA9EE556A57BE8FB88308714873AD019CB273EB3D4486CF50
                          APIs
                          • _memset.LIBCMT ref: 009F4401
                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 009F44A6
                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 009F44C3
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: IconNotifyShell_$_memset
                          • String ID:
                          • API String ID: 1505330794-0
                          • Opcode ID: e71466161845498a69ba6e8d8a1a27e4739c1d3269f3394b09ed77c6d32679eb
                          • Instruction ID: 28970675eac53463c951e7b59c870d52c9afff1a298ffe888e95900a921554b8
                          • Opcode Fuzzy Hash: e71466161845498a69ba6e8d8a1a27e4739c1d3269f3394b09ed77c6d32679eb
                          • Instruction Fuzzy Hash: 273171B19047059FD721DF64D8847EBBBF8FB48304F000A2EF69A93261D775A948CB92
                          APIs
                          • __FF_MSGBANNER.LIBCMT ref: 00A15963
                            • Part of subcall function 00A1A3AB: __NMSG_WRITE.LIBCMT ref: 00A1A3D2
                            • Part of subcall function 00A1A3AB: __NMSG_WRITE.LIBCMT ref: 00A1A3DC
                          • __NMSG_WRITE.LIBCMT ref: 00A1596A
                            • Part of subcall function 00A1A408: GetModuleFileNameW.KERNEL32(00000000,00AB43BA,00000104,?,00000001,00000000), ref: 00A1A49A
                            • Part of subcall function 00A1A408: ___crtMessageBoxW.LIBCMT ref: 00A1A548
                            • Part of subcall function 00A132DF: ___crtCorExitProcess.LIBCMT ref: 00A132E5
                            • Part of subcall function 00A132DF: ExitProcess.KERNEL32 ref: 00A132EE
                            • Part of subcall function 00A18D68: __getptd_noexit.LIBCMT ref: 00A18D68
                          • RtlAllocateHeap.NTDLL(01390000,00000000,00000001,00000000,?,?,?,00A11013,?), ref: 00A1598F
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                          • String ID:
                          • API String ID: 1372826849-0
                          • Opcode ID: f723f5c55f0d1ba92465584a5b582239be67b900ab39a7fbb51b8bb64fb8b253
                          • Instruction ID: c52c362eedce94a55f08777e423333329341172ee9a297a2a44c2ff84904b50a
                          • Opcode Fuzzy Hash: f723f5c55f0d1ba92465584a5b582239be67b900ab39a7fbb51b8bb64fb8b253
                          • Instruction Fuzzy Hash: A701F536701B25DEEA157B74ED42BEE73588F92B70F10012AF4009A2D2DE749DC18662
                          APIs
                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00A597D2,?,?,?,?,?,00000004), ref: 00A59B45
                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00A597D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00A59B5B
                          • CloseHandle.KERNEL32(00000000,?,00A597D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00A59B62
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleTime
                          • String ID:
                          • API String ID: 3397143404-0
                          • Opcode ID: b234e186267b696510f992df338a4e0f5522af452031aa814615e7238ce09bca
                          • Instruction ID: f8600620e1151d147724c0f67971bd5fb6edc2d32f751ba0bf5f6a7a292a65ec
                          • Opcode Fuzzy Hash: b234e186267b696510f992df338a4e0f5522af452031aa814615e7238ce09bca
                          • Instruction Fuzzy Hash: 63E08632581214FBE7216BA4EC09FCA7B58AB05761F108220FB28690E087B126529798
                          APIs
                          • _free.LIBCMT ref: 00A58FA5
                            • Part of subcall function 00A12F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00A19C64), ref: 00A12FA9
                            • Part of subcall function 00A12F95: GetLastError.KERNEL32(00000000,?,00A19C64), ref: 00A12FBB
                          • _free.LIBCMT ref: 00A58FB6
                          • _free.LIBCMT ref: 00A58FC8
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                          • Instruction ID: 65325d19fe5d3df3a9ecdf454239cfbc6244d30b30b878c39bba4a98ea34d82a
                          • Opcode Fuzzy Hash: 358057a8cee776a4634d1da6a11f7167cf7af4a4bc472a0de26b354d0d310ced
                          • Instruction Fuzzy Hash: B9E01D6164D70146DD246678BE44BD357EF5F4C351B18041D7846E7142DE34E8A58124
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID: CALL
                          • API String ID: 0-4196123274
                          • Opcode ID: f6c56eb81593579e7e026b90ad780460e88c2d3b49a9974e37e5b8574313460a
                          • Instruction ID: 58c51b72b33a41a35060abe64ace48859853a2fa1498339c81c51db2671cb5de
                          • Opcode Fuzzy Hash: f6c56eb81593579e7e026b90ad780460e88c2d3b49a9974e37e5b8574313460a
                          • Instruction Fuzzy Hash: FB2248B4608245CFC724DF14C590B6ABBF5BF85304F15896DFA9A8B262D735EC81CB82
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: EA06
                          • API String ID: 4104443479-3962188686
                          • Opcode ID: 4c58ac4f8a76f97b585498230113c4f216e2c2175e39520cc8f3979d9d7623a9
                          • Instruction ID: 38fe316bf6f4afb4d3baab6dd4a8f0c04ff868f0c1f466dfd170f49a4beed249
                          • Opcode Fuzzy Hash: 4c58ac4f8a76f97b585498230113c4f216e2c2175e39520cc8f3979d9d7623a9
                          • Instruction Fuzzy Hash: 3A418B32A0415CABDF219B6898517BF7FA6AB45300F684474EB869B282C6359D84C3E2
                          APIs
                          • IsThemeActive.UXTHEME ref: 009F4992
                            • Part of subcall function 00A135AC: __lock.LIBCMT ref: 00A135B2
                            • Part of subcall function 00A135AC: DecodePointer.KERNEL32(00000001,?,009F49A7,00A481BC), ref: 00A135BE
                            • Part of subcall function 00A135AC: EncodePointer.KERNEL32(?,?,009F49A7,00A481BC), ref: 00A135C9
                            • Part of subcall function 009F4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 009F4A73
                            • Part of subcall function 009F4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 009F4A88
                            • Part of subcall function 009F3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 009F3B7A
                            • Part of subcall function 009F3B4C: IsDebuggerPresent.KERNEL32 ref: 009F3B8C
                            • Part of subcall function 009F3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00AB62F8,00AB62E0,?,?), ref: 009F3BFD
                            • Part of subcall function 009F3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 009F3C81
                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 009F49D2
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                          • String ID:
                          • API String ID: 1438897964-0
                          • Opcode ID: 2a58875812d4f5986a680d6858dc71fbab0253e625b8d3032358e4fee9ba054b
                          • Instruction ID: d25f0578f9280c8bff71c3fc12a2fe13e580f37733685b1b633461807b4bd131
                          • Opcode Fuzzy Hash: 2a58875812d4f5986a680d6858dc71fbab0253e625b8d3032358e4fee9ba054b
                          • Instruction Fuzzy Hash: 9911AE719183059FC700DF68DC05A6ABBE8EBC4710F00861EF144832B2DBB48A56CB91
                          APIs
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,009F5981,?,?,?,?), ref: 009F5E27
                          • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,009F5981,?,?,?,?), ref: 00A2E19C
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: 139ec80a961c64c4e43a5a3c53f03395b40dd655f2f73f4ad86cc803d31085ef
                          • Instruction ID: 7925c8c3ac62d43137c287205bec53d63088a5e2d88a1ad1959980af51b68b4a
                          • Opcode Fuzzy Hash: 139ec80a961c64c4e43a5a3c53f03395b40dd655f2f73f4ad86cc803d31085ef
                          • Instruction Fuzzy Hash: 39019270244708BEF3244E28DC8AF763A9CAB01768F108328BBE95A1E0C6B41E958B50
                          APIs
                            • Part of subcall function 00A1594C: __FF_MSGBANNER.LIBCMT ref: 00A15963
                            • Part of subcall function 00A1594C: __NMSG_WRITE.LIBCMT ref: 00A1596A
                            • Part of subcall function 00A1594C: RtlAllocateHeap.NTDLL(01390000,00000000,00000001,00000000,?,?,?,00A11013,?), ref: 00A1598F
                          • std::exception::exception.LIBCMT ref: 00A1102C
                          • __CxxThrowException@8.LIBCMT ref: 00A11041
                            • Part of subcall function 00A187DB: RaiseException.KERNEL32(?,?,?,00AABAF8,00000000,?,?,?,?,00A11046,?,00AABAF8,?,00000001), ref: 00A18830
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                          • String ID:
                          • API String ID: 3902256705-0
                          • Opcode ID: 8b5555e75716d79dcfa708b1e04e58a8fc52c22f1b2d6f1408c576ec3cfd922f
                          • Instruction ID: f432e8d206ec52740a64261001499e5e944bfce936bd183d32ec334d57c061ca
                          • Opcode Fuzzy Hash: 8b5555e75716d79dcfa708b1e04e58a8fc52c22f1b2d6f1408c576ec3cfd922f
                          • Instruction Fuzzy Hash: 8BF0A435940259A6CB20BB68EE05AEF7BE89F05750F100425F90496591EFB18AC083E1
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __lock_file_memset
                          • String ID:
                          • API String ID: 26237723-0
                          • Opcode ID: d6fc5d9d08b08b7f5d50c628f4a9d2f1fe37c33c49428696a6e07f4ba2731ea8
                          • Instruction ID: 88d564cbe49f60249c55ca3733a653e2218ec21edb1214cde27ee41865349d40
                          • Opcode Fuzzy Hash: d6fc5d9d08b08b7f5d50c628f4a9d2f1fe37c33c49428696a6e07f4ba2731ea8
                          • Instruction Fuzzy Hash: C8016271C00609EBCF22AF79CE069DF7B71AFC5760F148215F8245B1A1DB358AA1EB91
                          APIs
                            • Part of subcall function 00A18D68: __getptd_noexit.LIBCMT ref: 00A18D68
                          • __lock_file.LIBCMT ref: 00A1561B
                            • Part of subcall function 00A16E4E: __lock.LIBCMT ref: 00A16E71
                          • __fclose_nolock.LIBCMT ref: 00A15626
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                          • String ID:
                          • API String ID: 2800547568-0
                          • Opcode ID: 1af0713a59ee7ba94aff5aacf75c142491cfa3c0acab5f84b4782e0c472c925b
                          • Instruction ID: fbf21890a8d59a47c5a6780eb6abd9567fbc2cace0539df84bebb9e55a4949f3
                          • Opcode Fuzzy Hash: 1af0713a59ee7ba94aff5aacf75c142491cfa3c0acab5f84b4782e0c472c925b
                          • Instruction Fuzzy Hash: B1F0B471C04B04DEDB20AF7589027EE77E16F81734F698209A425AB1C1CFBC8EC19B95
                          APIs
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,009F558F,?,?,?,?,?), ref: 009F81DA
                          • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,009F558F,?,?,?,?,?), ref: 009F820D
                            • Part of subcall function 009F78AD: _memmove.LIBCMT ref: 009F78E9
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$_memmove
                          • String ID:
                          • API String ID: 3033907384-0
                          • Opcode ID: 057690a6a5761add8e5ed50b95cc39e02fcd93f036e5fecbf07f44cef24a25d4
                          • Instruction ID: c1338e618600ddfb5682247791ba23e20ac945f37fc80cbaff4ca575b4b1145f
                          • Opcode Fuzzy Hash: 057690a6a5761add8e5ed50b95cc39e02fcd93f036e5fecbf07f44cef24a25d4
                          • Instruction Fuzzy Hash: FD01AD31205108BFEB24AA65DD4AFBB7B6CEB89760F10813AFE05CD190DE20A841C671
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 00B91B2D
                          • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00B91B51
                          • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00B91B73
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$ContextCreateMemoryReadThreadWow64
                          • String ID:
                          • API String ID: 2438371351-0
                          • Opcode ID: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                          • Instruction ID: 1f2139231ab234fad58b74fc35236bba22c40f889f83430607bb88fcb57d7a0d
                          • Opcode Fuzzy Hash: d88754d343c0358fec48bb39518f6d050a5efe1528146ba10a354079ac39ca1d
                          • Instruction Fuzzy Hash: 2212FE20E24658C6EB24DF64D8507DEB272EF68300F1094E9910DEB7A4E77A4F81CF5A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: eb540df2696ad4516d8f8a344dcd6b2402323c2eeeeeb813f6f18ee83d0800fa
                          • Instruction ID: 8d3a1599d00e3acf1de801df1cf2d4060ba388fe1c9fd3d69e7c67b3d802eec7
                          • Opcode Fuzzy Hash: eb540df2696ad4516d8f8a344dcd6b2402323c2eeeeeb813f6f18ee83d0800fa
                          • Instruction Fuzzy Hash: 8F517335600608AFCF14EB68C995FBD77B5AF89310F158168FA16AB392DB30ED04CB51
                          APIs
                          • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 009F5CF6
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 383bf2844544f1b885c606a99233867d0a673ecaf89e35bbd5cf03eb223cb932
                          • Instruction ID: dece62fb89857e122a354b0a0abe8ea2d6d992bd0f8a7279f5c62d5851cb0ce2
                          • Opcode Fuzzy Hash: 383bf2844544f1b885c606a99233867d0a673ecaf89e35bbd5cf03eb223cb932
                          • Instruction Fuzzy Hash: 76317031A00B19AFCB18DF2DC484A6DB7B5FF88320F158629DA1993750D731BDA0DB90
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: 22ac893e98ba898096fbe8148dba06b4bd31686f0621ae99fecc11bd73c837e9
                          • Instruction ID: 98f428b9ce5542470b5631a6d3b2634b306184f184d2036963e55179e2df6cb2
                          • Opcode Fuzzy Hash: 22ac893e98ba898096fbe8148dba06b4bd31686f0621ae99fecc11bd73c837e9
                          • Instruction Fuzzy Hash: 9A411AB4508345CFDB24DF14C494B2ABBE0BF45318F1989ACE9898B362C336EC85CB52
                          APIs
                            • Part of subcall function 009F4D13: FreeLibrary.KERNEL32(00000000,?), ref: 009F4D4D
                            • Part of subcall function 00A1548B: __wfsopen.LIBCMT ref: 00A15496
                          • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00AB62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009F4F6F
                            • Part of subcall function 009F4CC8: FreeLibrary.KERNEL32(00000000), ref: 009F4D02
                            • Part of subcall function 009F4DD0: _memmove.LIBCMT ref: 009F4E1A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Library$Free$Load__wfsopen_memmove
                          • String ID:
                          • API String ID: 1396898556-0
                          • Opcode ID: 64a304aec41ec0d1373df4f49b2b3f5e916a2b794b70d1031b1aaba6366c5628
                          • Instruction ID: e0bd9cb7ebe449ac89c80b422f03f168ff48540cceab3129a1cca96333d867e2
                          • Opcode Fuzzy Hash: 64a304aec41ec0d1373df4f49b2b3f5e916a2b794b70d1031b1aaba6366c5628
                          • Instruction Fuzzy Hash: AD11E33160060DAACB14EF74DC02BBF77A99F84711F108829FB45AA1C2DE759A059BA0
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: c0ea620653460cd4933d3105723e4d24753cf8456a1f8a24e336148c4cad5a8b
                          • Instruction ID: eee12f5205b2ead004ad87f056393c93d132a8ffe5c03a8b22c158761d3f0a34
                          • Opcode Fuzzy Hash: c0ea620653460cd4933d3105723e4d24753cf8456a1f8a24e336148c4cad5a8b
                          • Instruction Fuzzy Hash: A121F4B4908345DFCB24DF54C444B6BBBE4BF88314F058968FA8A57761D731E849CB62
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: e0b0f1feff7007f9a685850875a5a6e1ea6a23f504afe070e1a0459631d1335c
                          • Instruction ID: efd31f51161a2bca0b2ba772323d05456c473ed19fc3625d50d27ee600b532d1
                          • Opcode Fuzzy Hash: e0b0f1feff7007f9a685850875a5a6e1ea6a23f504afe070e1a0459631d1335c
                          • Instruction Fuzzy Hash: 8811E5322092196BC714AB6CD882E7AF39DEF89360714462AFE15C7294DF719C51C790
                          APIs
                          • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,009F5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 009F5D76
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 5a7088cfb09b60156cb6ce0f4dc93068321a149bdc3e97143d80426bd833618c
                          • Instruction ID: dc0f5f0ce545d64de502319b07db7f81a9c6c8b6b94bacc6ba9b2e28926a3d68
                          • Opcode Fuzzy Hash: 5a7088cfb09b60156cb6ce0f4dc93068321a149bdc3e97143d80426bd833618c
                          • Instruction Fuzzy Hash: FE113671201B099FD330CF15C888B62B7E9EF45760F11C92EE6AA86A90D7B0E945CF60
                          APIs
                          • __lock_file.LIBCMT ref: 00A14AD6
                            • Part of subcall function 00A18D68: __getptd_noexit.LIBCMT ref: 00A18D68
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __getptd_noexit__lock_file
                          • String ID:
                          • API String ID: 2597487223-0
                          • Opcode ID: cd308494b9cc20310fdfbbd058dba3425e8ddc7ce93b5944fe861304dc0bbafa
                          • Instruction ID: 85f1a45545910d855ce04e358205a6001e0eb8191b27e13da008eebfd204c786
                          • Opcode Fuzzy Hash: cd308494b9cc20310fdfbbd058dba3425e8ddc7ce93b5944fe861304dc0bbafa
                          • Instruction Fuzzy Hash: E6F0AF31948209ABDF61AF788D063DE36A1AF043A5F158514B424AA1D1CB7C8AD1DF95
                          APIs
                          • FreeLibrary.KERNEL32(?,?,00AB62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009F4FDE
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: d74db6cce5bcfa842c5b20977e7b5b58866f841a60c1882f50525e896b2169b0
                          • Instruction ID: 70832b9bcec5371a18a0180b458040f4b7594f3c3918d7950d994c2f3bf02095
                          • Opcode Fuzzy Hash: d74db6cce5bcfa842c5b20977e7b5b58866f841a60c1882f50525e896b2169b0
                          • Instruction Fuzzy Hash: 3DF01571505716CFCB349F64E894823BBF5BF043293208A3EE2DA82A10C731A980DF50
                          APIs
                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00A109F4
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: LongNamePath_memmove
                          • String ID:
                          • API String ID: 2514874351-0
                          • Opcode ID: 384223e4ad81b3a43679f2fbbf896ad5d51a4849fa506724591dd601342192b8
                          • Instruction ID: ab240c83de090ba793b4911d35ca4bf26ccd42d97a32f4bf511d6d89d94ccadc
                          • Opcode Fuzzy Hash: 384223e4ad81b3a43679f2fbbf896ad5d51a4849fa506724591dd601342192b8
                          • Instruction Fuzzy Hash: 9FE086369042285BC720D6989C05FFAB7ADDF88690F0441B5FD0CD7255E9609D818690
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __fread_nolock
                          • String ID:
                          • API String ID: 2638373210-0
                          • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                          • Instruction ID: f26026cd4e4824c0bab923e62c94447d5c003626e4cbdb0c4ee2022654ad964b
                          • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                          • Instruction Fuzzy Hash: 47E092B0504B009FD7748B24D8507E373E0BB16315F00091CF69A87341EB6278458B59
                          APIs
                          • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00A2E16B,?,?,00000000), ref: 009F5DBF
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 5b70982b499c45cc1b99513117b044bb36ed24fc787fb5ebcab0700c5381b125
                          • Instruction ID: 94b5740564adb401e0ec60b1ef97fff71fb15873663707ac2dc8cf139f617c74
                          • Opcode Fuzzy Hash: 5b70982b499c45cc1b99513117b044bb36ed24fc787fb5ebcab0700c5381b125
                          • Instruction Fuzzy Hash: 62D0C77464020CBFE710DB80DC46FA9777CE705710F500294FE0456690D6B27E508795
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __wfsopen
                          • String ID:
                          • API String ID: 197181222-0
                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction ID: 8e07181ef5b60739a05dfcd3945123713c60b200a66ddf4b61d3d8f6134e335d
                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction Fuzzy Hash: 1AB0927684020CB7DE012E92EC02A993B1A9B80678F848020FB0C18162A673E6E09689
                          APIs
                          • GetLastError.KERNEL32(00000002,00000000), ref: 00A5D46A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorLast
                          • String ID:
                          • API String ID: 1452528299-0
                          • Opcode ID: b5aed93ada4075799074a41f344ce46a6ac0a0e91889b37a1a62f0631186bf82
                          • Instruction ID: 6b378fce10abbe4a65fed899c4c93e9de07782125aed3ec974ebf02cacc8429e
                          • Opcode Fuzzy Hash: b5aed93ada4075799074a41f344ce46a6ac0a0e91889b37a1a62f0631186bf82
                          • Instruction Fuzzy Hash: 6B7162302047058FC724EF68C591B6AB7F0BF88315F04496DFA969B2A2DB70ED49CB52
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction ID: bc52e548792350eaaf965d01ebbf265121ebaad7f984764831ecbaa584c4ca58
                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction Fuzzy Hash: B131A075A00105DFC718DF5AD4809A9F7B6FF59300B688AA5E40ACB695DBB1EDC1CBC0
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 00B92311
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction ID: 1b13f6f7072036d8ae8fdda8cbd8952ec9a238ec8f2d226ba8e58f93b09979f1
                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction Fuzzy Hash: 3FE0E67494410DEFDB00EFB4D54969E7FF4EF04301F1005A1FD01D2280D6309D508A62
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00A7CE50
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A7CE91
                          • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00A7CED6
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A7CF00
                          • SendMessageW.USER32 ref: 00A7CF29
                          • _wcsncpy.LIBCMT ref: 00A7CFA1
                          • GetKeyState.USER32(00000011), ref: 00A7CFC2
                          • GetKeyState.USER32(00000009), ref: 00A7CFCF
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00A7CFE5
                          • GetKeyState.USER32(00000010), ref: 00A7CFEF
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A7D018
                          • SendMessageW.USER32 ref: 00A7D03F
                          • SendMessageW.USER32(?,00001030,?,00A7B602), ref: 00A7D145
                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00A7D15B
                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00A7D16E
                          • SetCapture.USER32(?), ref: 00A7D177
                          • ClientToScreen.USER32(?,?), ref: 00A7D1DC
                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00A7D1E9
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A7D203
                          • ReleaseCapture.USER32 ref: 00A7D20E
                          • GetCursorPos.USER32(?), ref: 00A7D248
                          • ScreenToClient.USER32(?,?), ref: 00A7D255
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A7D2B1
                          • SendMessageW.USER32 ref: 00A7D2DF
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A7D31C
                          • SendMessageW.USER32 ref: 00A7D34B
                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A7D36C
                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00A7D37B
                          • GetCursorPos.USER32(?), ref: 00A7D39B
                          • ScreenToClient.USER32(?,?), ref: 00A7D3A8
                          • GetParent.USER32(?), ref: 00A7D3C8
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 00A7D431
                          • SendMessageW.USER32 ref: 00A7D462
                          • ClientToScreen.USER32(?,?), ref: 00A7D4C0
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00A7D4F0
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00A7D51A
                          • SendMessageW.USER32 ref: 00A7D53D
                          • ClientToScreen.USER32(?,?), ref: 00A7D58F
                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00A7D5C3
                            • Part of subcall function 009F25DB: GetWindowLongW.USER32(?,000000EB), ref: 009F25EC
                          • GetWindowLongW.USER32(?,000000F0), ref: 00A7D65F
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                          • String ID: @GUI_DRAGID$@U=u$F
                          • API String ID: 3977979337-1007936534
                          • Opcode ID: 4fc564863348b1d16ee06529e072031307d7133f6f4ff08b95cfa31afe059921
                          • Instruction ID: 21e9459538921c6bf18abf84da1fbc9162920d4cfe91fc7a278a43346933a180
                          • Opcode Fuzzy Hash: 4fc564863348b1d16ee06529e072031307d7133f6f4ff08b95cfa31afe059921
                          • Instruction Fuzzy Hash: 7A429A70204241AFD725CF68CC44BAABBF5FF48724F14C62DF699972A1C7319A91CB92
                          APIs
                          • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00A7873F
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: %d/%02d/%02d$@U=u
                          • API String ID: 3850602802-2764005415
                          • Opcode ID: db36d9fd995b8d2455ec3731d7eb3211d8389904cff04921fd237aa1c0d7f2ed
                          • Instruction ID: 0f7760c7bef6b62c5d1d17feab2823a9a0b6ac4405e15a8b42d6c560addbd81d
                          • Opcode Fuzzy Hash: db36d9fd995b8d2455ec3731d7eb3211d8389904cff04921fd237aa1c0d7f2ed
                          • Instruction Fuzzy Hash: D112A371640244AFEB258F64CC4DFAA7BB8EF45710F24C169F91EDA2A1DF788981CB50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove$_memset
                          • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                          • API String ID: 1357608183-1798697756
                          • Opcode ID: f1842323f3713e6a939e92067cf8f4767712381db0f656f915d355815a6d7ad2
                          • Instruction ID: 6cd915b4eba25bce9f823475106d7df77d99609d6da2455c18c41e9e78ae43f4
                          • Opcode Fuzzy Hash: f1842323f3713e6a939e92067cf8f4767712381db0f656f915d355815a6d7ad2
                          • Instruction Fuzzy Hash: 17939275E00219DFDF24CF58D881BADB7B1FF88310F65816AE955AB281E774AE81CB40
                          APIs
                          • GetForegroundWindow.USER32(00000000,?), ref: 009F4A3D
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00A2DA8E
                          • IsIconic.USER32(?), ref: 00A2DA97
                          • ShowWindow.USER32(?,00000009), ref: 00A2DAA4
                          • SetForegroundWindow.USER32(?), ref: 00A2DAAE
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A2DAC4
                          • GetCurrentThreadId.KERNEL32 ref: 00A2DACB
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A2DAD7
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A2DAE8
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 00A2DAF0
                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 00A2DAF8
                          • SetForegroundWindow.USER32(?), ref: 00A2DAFB
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2DB10
                          • keybd_event.USER32(00000012,00000000), ref: 00A2DB1B
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2DB25
                          • keybd_event.USER32(00000012,00000000), ref: 00A2DB2A
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2DB33
                          • keybd_event.USER32(00000012,00000000), ref: 00A2DB38
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A2DB42
                          • keybd_event.USER32(00000012,00000000), ref: 00A2DB47
                          • SetForegroundWindow.USER32(?), ref: 00A2DB4A
                          • AttachThreadInput.USER32(?,?,00000000), ref: 00A2DB71
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                          • String ID: Shell_TrayWnd
                          • API String ID: 4125248594-2988720461
                          • Opcode ID: 79342bff24ea22cae77c6fcf6a49f31bbcac6f96d45acb35409c120ef738ed08
                          • Instruction ID: 291194a5dfbb578e886efd67f4713306b0c138ed8c5592b59c55829cca99f996
                          • Opcode Fuzzy Hash: 79342bff24ea22cae77c6fcf6a49f31bbcac6f96d45acb35409c120ef738ed08
                          • Instruction Fuzzy Hash: 1B314371A40318BFEB21AFA59C49F7F7E6CEB44B50F118035FA05EA1D1D6B05E41ABA0
                          APIs
                            • Part of subcall function 00A48CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A48D0D
                            • Part of subcall function 00A48CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A48D3A
                            • Part of subcall function 00A48CC3: GetLastError.KERNEL32 ref: 00A48D47
                          • _memset.LIBCMT ref: 00A4889B
                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00A488ED
                          • CloseHandle.KERNEL32(?), ref: 00A488FE
                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00A48915
                          • GetProcessWindowStation.USER32 ref: 00A4892E
                          • SetProcessWindowStation.USER32(00000000), ref: 00A48938
                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00A48952
                            • Part of subcall function 00A48713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A48851), ref: 00A48728
                            • Part of subcall function 00A48713: CloseHandle.KERNEL32(?,?,00A48851), ref: 00A4873A
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                          • String ID: $default$winsta0
                          • API String ID: 2063423040-1027155976
                          • Opcode ID: ad94965abfe7a141493ae18d5205a02e6cea2105fc1f1793f77073e2a46f92e1
                          • Instruction ID: e74e7a86bb32b0d5c59fe9a29e685e3b1f8f96dcd1bad834378078206764fd83
                          • Opcode Fuzzy Hash: ad94965abfe7a141493ae18d5205a02e6cea2105fc1f1793f77073e2a46f92e1
                          • Instruction Fuzzy Hash: 2581BF75800209BFDF11DFA4ED45AEE7BB8FF44384F08812AF914A6160DB798E55DB60
                          APIs
                          • OpenClipboard.USER32(00A7F910), ref: 00A64284
                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00A64292
                          • GetClipboardData.USER32(0000000D), ref: 00A6429A
                          • CloseClipboard.USER32 ref: 00A642A6
                          • GlobalLock.KERNEL32(00000000), ref: 00A642C2
                          • CloseClipboard.USER32 ref: 00A642CC
                          • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00A642E1
                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00A642EE
                          • GetClipboardData.USER32(00000001), ref: 00A642F6
                          • GlobalLock.KERNEL32(00000000), ref: 00A64303
                          • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00A64337
                          • CloseClipboard.USER32 ref: 00A64447
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                          • String ID:
                          • API String ID: 3222323430-0
                          • Opcode ID: 91ca55acfce3326928c5b02c3fba5a0de449ef20fe814375ea67468b872d3f9d
                          • Instruction ID: d2b0a0f3b46a1e81ecfe06b9f4a71226f2278387c0227a744363bfc07ede4f1e
                          • Opcode Fuzzy Hash: 91ca55acfce3326928c5b02c3fba5a0de449ef20fe814375ea67468b872d3f9d
                          • Instruction Fuzzy Hash: 7B519F35204305AFD701EFA4DC9AFBE77B8AB88B00F108529F55AD61A1DF70DA458B62
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00A5C9F8
                          • FindClose.KERNEL32(00000000), ref: 00A5CA4C
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A5CA71
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00A5CA88
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00A5CAAF
                          • __swprintf.LIBCMT ref: 00A5CAFB
                          • __swprintf.LIBCMT ref: 00A5CB3E
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                          • __swprintf.LIBCMT ref: 00A5CB92
                            • Part of subcall function 00A138D8: __woutput_l.LIBCMT ref: 00A13931
                          • __swprintf.LIBCMT ref: 00A5CBE0
                            • Part of subcall function 00A138D8: __flsbuf.LIBCMT ref: 00A13953
                            • Part of subcall function 00A138D8: __flsbuf.LIBCMT ref: 00A1396B
                          • __swprintf.LIBCMT ref: 00A5CC2F
                          • __swprintf.LIBCMT ref: 00A5CC7E
                          • __swprintf.LIBCMT ref: 00A5CCCD
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                          • API String ID: 3953360268-2428617273
                          • Opcode ID: 145f1259ef0bc4b8be895b8351458270100f22a8c377a5b0f75fd6fd81e9ff30
                          • Instruction ID: e702026c8a0fffc24ffc5be40e489becb2c33af750470b8e480f08c61032ed0e
                          • Opcode Fuzzy Hash: 145f1259ef0bc4b8be895b8351458270100f22a8c377a5b0f75fd6fd81e9ff30
                          • Instruction Fuzzy Hash: 23A11DB2508308AFC700EFA4C985EBFB7ECBF94705F404919B685C7191EA74DA49CB62
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00A5F221
                          • _wcscmp.LIBCMT ref: 00A5F236
                          • _wcscmp.LIBCMT ref: 00A5F24D
                          • GetFileAttributesW.KERNEL32(?), ref: 00A5F25F
                          • SetFileAttributesW.KERNEL32(?,?), ref: 00A5F279
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00A5F291
                          • FindClose.KERNEL32(00000000), ref: 00A5F29C
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00A5F2B8
                          • _wcscmp.LIBCMT ref: 00A5F2DF
                          • _wcscmp.LIBCMT ref: 00A5F2F6
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A5F308
                          • SetCurrentDirectoryW.KERNEL32(00AAA5A0), ref: 00A5F326
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A5F330
                          • FindClose.KERNEL32(00000000), ref: 00A5F33D
                          • FindClose.KERNEL32(00000000), ref: 00A5F34F
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                          • String ID: *.*
                          • API String ID: 1803514871-438819550
                          • Opcode ID: 0a5e699e946eac34d70ebbcc7e6df599cb3ee0d709212e36513dbb828741b9e8
                          • Instruction ID: 7e20e8512de91ac2cb2e0dd401296128d7ebf9ffce16b8160540fa735cb11ca7
                          • Opcode Fuzzy Hash: 0a5e699e946eac34d70ebbcc7e6df599cb3ee0d709212e36513dbb828741b9e8
                          • Instruction Fuzzy Hash: CE3191766002196EDF10DBB4DC49ADE73ACBF49361F108575E828D70A0EB70DA89CA54
                          APIs
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A70BDE
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00A7F910,00000000,?,00000000,?,?), ref: 00A70C4C
                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00A70C94
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00A70D1D
                          • RegCloseKey.ADVAPI32(?), ref: 00A7103D
                          • RegCloseKey.ADVAPI32(00000000), ref: 00A7104A
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Close$ConnectCreateRegistryValue
                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                          • API String ID: 536824911-966354055
                          • Opcode ID: 2ba7575e0c13ce01df8f366e2369d3fcedb93b4347cd00a223f168699653dd8a
                          • Instruction ID: 1b36dda93a1b1d3081e69c0462ae7bf48ce5577642e78535f43f36da977dd412
                          • Opcode Fuzzy Hash: 2ba7575e0c13ce01df8f366e2369d3fcedb93b4347cd00a223f168699653dd8a
                          • Instruction Fuzzy Hash: E40236752006019FCB14EF28C981E2AB7E5FF89714F05895DF98A9B3A2DB70ED41CB81
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,76F88FB0,?,00000000), ref: 00A5F37E
                          • _wcscmp.LIBCMT ref: 00A5F393
                          • _wcscmp.LIBCMT ref: 00A5F3AA
                            • Part of subcall function 00A545C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00A545DC
                          • FindNextFileW.KERNEL32(00000000,?), ref: 00A5F3D9
                          • FindClose.KERNEL32(00000000), ref: 00A5F3E4
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00A5F400
                          • _wcscmp.LIBCMT ref: 00A5F427
                          • _wcscmp.LIBCMT ref: 00A5F43E
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00A5F450
                          • SetCurrentDirectoryW.KERNEL32(00AAA5A0), ref: 00A5F46E
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A5F478
                          • FindClose.KERNEL32(00000000), ref: 00A5F485
                          • FindClose.KERNEL32(00000000), ref: 00A5F497
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                          • String ID: *.*
                          • API String ID: 1824444939-438819550
                          • Opcode ID: 4d1dc3bcacfbd0a0cef0b6be4a5f3bd35b6183a25a85ab2c7a6e1f397ce63bc2
                          • Instruction ID: d6f2ca1bb7c740ecc0b032e362bf449529cd0227337b6ae91302077ade595b93
                          • Opcode Fuzzy Hash: 4d1dc3bcacfbd0a0cef0b6be4a5f3bd35b6183a25a85ab2c7a6e1f397ce63bc2
                          • Instruction Fuzzy Hash: 3031B1725012197EDF10DBA4EC88AEE77ACBF49361F1041B5EC54A30A1EB70DA89CA64
                          APIs
                            • Part of subcall function 00A4874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A48766
                            • Part of subcall function 00A4874A: GetLastError.KERNEL32(?,00A4822A,?,?,?), ref: 00A48770
                            • Part of subcall function 00A4874A: GetProcessHeap.KERNEL32(00000008,?,?,00A4822A,?,?,?), ref: 00A4877F
                            • Part of subcall function 00A4874A: HeapAlloc.KERNEL32(00000000,?,00A4822A,?,?,?), ref: 00A48786
                            • Part of subcall function 00A4874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A4879D
                            • Part of subcall function 00A487E7: GetProcessHeap.KERNEL32(00000008,00A48240,00000000,00000000,?,00A48240,?), ref: 00A487F3
                            • Part of subcall function 00A487E7: HeapAlloc.KERNEL32(00000000,?,00A48240,?), ref: 00A487FA
                            • Part of subcall function 00A487E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A48240,?), ref: 00A4880B
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A4825B
                          • _memset.LIBCMT ref: 00A48270
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A4828F
                          • GetLengthSid.ADVAPI32(?), ref: 00A482A0
                          • GetAce.ADVAPI32(?,00000000,?), ref: 00A482DD
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A482F9
                          • GetLengthSid.ADVAPI32(?), ref: 00A48316
                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A48325
                          • HeapAlloc.KERNEL32(00000000), ref: 00A4832C
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A4834D
                          • CopySid.ADVAPI32(00000000), ref: 00A48354
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A48385
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A483AB
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A483BF
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                          • String ID:
                          • API String ID: 3996160137-0
                          • Opcode ID: 1ce29ce578a05545fe9d84c8849e69a2cdbbc2720d2efabaa0f8c650a239b501
                          • Instruction ID: ea926efd12c51afde860acfdf7bef9c3f7a1a83fd5ded4067ac7fefbfd0f6a7b
                          • Opcode Fuzzy Hash: 1ce29ce578a05545fe9d84c8849e69a2cdbbc2720d2efabaa0f8c650a239b501
                          • Instruction Fuzzy Hash: C8616C75900209EFDF00DFA4ED44AEEBBB9FF44700F148169F815AB291DB359A46DB60
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                          • API String ID: 0-4052911093
                          • Opcode ID: f6ab78ed3b48a483f16f8c14cfe6a73b6e977b153dc5db985121e3b69ef87e2b
                          • Instruction ID: 4c84ce41d9f009430ae28e05ca7dc1848e147c72fc818d78a195e3f59c35fbe4
                          • Opcode Fuzzy Hash: f6ab78ed3b48a483f16f8c14cfe6a73b6e977b153dc5db985121e3b69ef87e2b
                          • Instruction Fuzzy Hash: 00727075E002199BDF24CF58D8807AEB7F5FF88314F14816AE849EB291EB749D81CB90
                          APIs
                            • Part of subcall function 00A710A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A70038,?,?), ref: 00A710BC
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A70737
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00A707D6
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00A7086E
                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00A70AAD
                          • RegCloseKey.ADVAPI32(00000000), ref: 00A70ABA
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                          • String ID:
                          • API String ID: 1240663315-0
                          • Opcode ID: 91e6ac2607982a4a322c103b2c39a3832af615ad934e3c3b569e506d0fbda9e9
                          • Instruction ID: eeb79f01c8b009988274b7d8be001ecd0554ea53b1ea64469d15b309be25b818
                          • Opcode Fuzzy Hash: 91e6ac2607982a4a322c103b2c39a3832af615ad934e3c3b569e506d0fbda9e9
                          • Instruction Fuzzy Hash: 02E14A71204214EFCB14DF28CD91E6ABBE4EF89754F04C96DF94ADB2A2DA30E941CB51
                          APIs
                          • GetKeyboardState.USER32(?), ref: 00A50241
                          • GetAsyncKeyState.USER32(000000A0), ref: 00A502C2
                          • GetKeyState.USER32(000000A0), ref: 00A502DD
                          • GetAsyncKeyState.USER32(000000A1), ref: 00A502F7
                          • GetKeyState.USER32(000000A1), ref: 00A5030C
                          • GetAsyncKeyState.USER32(00000011), ref: 00A50324
                          • GetKeyState.USER32(00000011), ref: 00A50336
                          • GetAsyncKeyState.USER32(00000012), ref: 00A5034E
                          • GetKeyState.USER32(00000012), ref: 00A50360
                          • GetAsyncKeyState.USER32(0000005B), ref: 00A50378
                          • GetKeyState.USER32(0000005B), ref: 00A5038A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: 683d4d1fb3f37430497646ee5d4e251a4a9436e50ffbf7038504909a388ab447
                          • Instruction ID: b3425699c69991370c264f24b269eccb67aefb0dea29a6be3522cf698118940d
                          • Opcode Fuzzy Hash: 683d4d1fb3f37430497646ee5d4e251a4a9436e50ffbf7038504909a388ab447
                          • Instruction Fuzzy Hash: F64179245047C96EFF319BA4C808BF9BEA07F11355F48809DDEC55A1C2DBB459CC8792
                          APIs
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          • CoInitialize.OLE32 ref: 00A68718
                          • CoUninitialize.OLE32 ref: 00A68723
                          • CoCreateInstance.OLE32(?,00000000,00000017,00A82BEC,?), ref: 00A68783
                          • IIDFromString.OLE32(?,?), ref: 00A687F6
                          • VariantInit.OLEAUT32(?), ref: 00A68890
                          • VariantClear.OLEAUT32(?), ref: 00A688F1
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                          • API String ID: 834269672-1287834457
                          • Opcode ID: b51d957ab47b26bce6da3c3a3f76f5c8011c5647996dd5dcafc4bbc2b857b20c
                          • Instruction ID: 71b6fa934dfa4541d8a84d6c5d3c57e7d06c69c8ce8172e3c5f7db13e1bb5c1c
                          • Opcode Fuzzy Hash: b51d957ab47b26bce6da3c3a3f76f5c8011c5647996dd5dcafc4bbc2b857b20c
                          • Instruction Fuzzy Hash: 6961A070608301AFD710DF64C949B6BBBF8AF89754F104A1DF9859B291CB74ED48CB92
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                          • String ID:
                          • API String ID: 1737998785-0
                          • Opcode ID: 23003f8285d4e897d8d5d12ebc51a304b9354073b5ee5ccff35eb4d4df9f8982
                          • Instruction ID: 444bf0469ad31fa017bc9d3db4f296bc3e2750850c0de9438f45cba10367d643
                          • Opcode Fuzzy Hash: 23003f8285d4e897d8d5d12ebc51a304b9354073b5ee5ccff35eb4d4df9f8982
                          • Instruction Fuzzy Hash: BE2171352012109FDB11EFA4EC09B6977B8EF48711F10C026F94ADB272DB74AD42CB55
                          APIs
                            • Part of subcall function 009F48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F48A1,?,?,009F37C0,?), ref: 009F48CE
                            • Part of subcall function 00A54CD3: GetFileAttributesW.KERNEL32(?,00A53947), ref: 00A54CD4
                          • FindFirstFileW.KERNEL32(?,?), ref: 00A53ADF
                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00A53B87
                          • MoveFileW.KERNEL32(?,?), ref: 00A53B9A
                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00A53BB7
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00A53BD9
                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00A53BF5
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                          • String ID: \*.*
                          • API String ID: 4002782344-1173974218
                          • Opcode ID: 98ba42b3e4da1d4254e42000b1b1dc7860c52a5881ba686d7d776707335f5e42
                          • Instruction ID: f5d0163f825e9aa170a89121dc060ef9d1145aef98a72c0eca21be670ede2118
                          • Opcode Fuzzy Hash: 98ba42b3e4da1d4254e42000b1b1dc7860c52a5881ba686d7d776707335f5e42
                          • Instruction Fuzzy Hash: A2515C3280514D9ACF05EBA0CE92AFDB778AF94341F644169E94677092EF316F0DCBA0
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00A5F6AB
                          • Sleep.KERNEL32(0000000A), ref: 00A5F6DB
                          • _wcscmp.LIBCMT ref: 00A5F6EF
                          • _wcscmp.LIBCMT ref: 00A5F70A
                          • FindNextFileW.KERNEL32(?,?), ref: 00A5F7A8
                          • FindClose.KERNEL32(00000000), ref: 00A5F7BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                          • String ID: *.*
                          • API String ID: 713712311-438819550
                          • Opcode ID: 53255986654491b4896201f9a541e002fd41e53b6fc852eee83af2f111dd1f98
                          • Instruction ID: d836ddcb79de94af7a12b9c1328e82c37484b714def5fe41c3482e77f970498c
                          • Opcode Fuzzy Hash: 53255986654491b4896201f9a541e002fd41e53b6fc852eee83af2f111dd1f98
                          • Instruction Fuzzy Hash: C741847190021EAFCF15DFA4CC45AEEBBB4FF09311F144566E919A31A1EB309E88CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                          • API String ID: 0-1546025612
                          • Opcode ID: 035560590d21fd57ec74ddc07e22790974fc0ad800f2ef322f79ed1c2497b045
                          • Instruction ID: eb90e01b92e5ef17a6d9a15f51e1409e9f43156da8e5e113c9c2a89f28f6e5d4
                          • Opcode Fuzzy Hash: 035560590d21fd57ec74ddc07e22790974fc0ad800f2ef322f79ed1c2497b045
                          • Instruction Fuzzy Hash: 21A27EB0E0421ECBDF34CF58D9907ADB7B1BB58314F2485AAE956A7280E7349E85CF50
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: b7d19c7a9ab3fd0e708e4e6e13c99ccff444609ca5f6a56ea4e4041512446a84
                          • Instruction ID: 6da5d6b3ab3b92c6d196f15ed1d55e0618137143177a19d100a961cddba358ea
                          • Opcode Fuzzy Hash: b7d19c7a9ab3fd0e708e4e6e13c99ccff444609ca5f6a56ea4e4041512446a84
                          • Instruction Fuzzy Hash: D8128870E00609DFDF14DFA5E985AAEB7B5FF88300F204629E506E7291EB35AD51CB60
                          APIs
                            • Part of subcall function 00A48CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A48D0D
                            • Part of subcall function 00A48CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A48D3A
                            • Part of subcall function 00A48CC3: GetLastError.KERNEL32 ref: 00A48D47
                          • ExitWindowsEx.USER32(?,00000000), ref: 00A5549B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                          • String ID: $@$SeShutdownPrivilege
                          • API String ID: 2234035333-194228
                          • Opcode ID: 1d564f8598ce5c593ea6b9a410f20d326985204a0e44fed0122e6a321053402e
                          • Instruction ID: c6f9b734b4c58544050fd620bb6d6d9d31645e9d87fa5ce297fad2a649d4cfea
                          • Opcode Fuzzy Hash: 1d564f8598ce5c593ea6b9a410f20d326985204a0e44fed0122e6a321053402e
                          • Instruction Fuzzy Hash: 9D014731E54B016EEB289378EC6ABBA7279FB05353F200030FC0AD60D3DA744CC885A0
                          APIs
                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00A665EF
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A665FE
                          • bind.WSOCK32(00000000,?,00000010), ref: 00A6661A
                          • listen.WSOCK32(00000000,00000005), ref: 00A66629
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A66643
                          • closesocket.WSOCK32(00000000,00000000), ref: 00A66657
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketlistensocket
                          • String ID:
                          • API String ID: 1279440585-0
                          • Opcode ID: d19793ee4e623ef7861d83a981bad0272d68de10c6d3328f2dd578699691bbb6
                          • Instruction ID: 9054bbe1704703e26fbb0ff78f97b19f39a77ec24e4368e0410ff7a5c0215558
                          • Opcode Fuzzy Hash: d19793ee4e623ef7861d83a981bad0272d68de10c6d3328f2dd578699691bbb6
                          • Instruction Fuzzy Hash: D3219C352002049FCB14EF68DD85B7EB7B9EF89320F148169EA5AA73D1CB70AD42CB51
                          APIs
                            • Part of subcall function 00A10FF6: std::exception::exception.LIBCMT ref: 00A1102C
                            • Part of subcall function 00A10FF6: __CxxThrowException@8.LIBCMT ref: 00A11041
                          • _memmove.LIBCMT ref: 00A4062F
                          • _memmove.LIBCMT ref: 00A40744
                          • _memmove.LIBCMT ref: 00A407EB
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                          • String ID:
                          • API String ID: 1300846289-0
                          • Opcode ID: 0541f5c7f2bd4ea85617b9b2515aaa42312c8b068f7c1864aca325253766d156
                          • Instruction ID: 91d39f24d477cb3374fad086a5eb50d8fd6492365be5444f34a50f5793822b54
                          • Opcode Fuzzy Hash: 0541f5c7f2bd4ea85617b9b2515aaa42312c8b068f7c1864aca325253766d156
                          • Instruction Fuzzy Hash: 12029EB0E00209DFDF04DF64D981AAEBBB5EF88300F158069E906DB295EB31DA55DF91
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 009F19FA
                          • GetSysColor.USER32(0000000F), ref: 009F1A4E
                          • SetBkColor.GDI32(?,00000000), ref: 009F1A61
                            • Part of subcall function 009F1290: DefDlgProcW.USER32(?,00000020,?), ref: 009F12D8
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ColorProc$LongWindow
                          • String ID:
                          • API String ID: 3744519093-0
                          • Opcode ID: 4fac9259330491d30bbe8c378bd451126528e8cb1d1438a01704dd1b7d6b864d
                          • Instruction ID: 424b1da8f45036fad65a1ade40d72669a5e978c0fc83d851304bc8c0ceab09a5
                          • Opcode Fuzzy Hash: 4fac9259330491d30bbe8c378bd451126528e8cb1d1438a01704dd1b7d6b864d
                          • Instruction Fuzzy Hash: 3AA1997012145CFFD728AB2CAC54EBF369CDB86351F14862AF216D61A6CE29CD4193F2
                          APIs
                            • Part of subcall function 00A680A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A680CB
                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00A66AB1
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A66ADA
                          • bind.WSOCK32(00000000,?,00000010), ref: 00A66B13
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A66B20
                          • closesocket.WSOCK32(00000000,00000000), ref: 00A66B34
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                          • String ID:
                          • API String ID: 99427753-0
                          • Opcode ID: 6e46d8b4d0612548a8d3b0cee7d50b26f74f553ee4052353b34b9978ab4b873f
                          • Instruction ID: 4fd186db5acc48219d2ef571db5b7d68affa953929c48bb3047947b8fb679893
                          • Opcode Fuzzy Hash: 6e46d8b4d0612548a8d3b0cee7d50b26f74f553ee4052353b34b9978ab4b873f
                          • Instruction Fuzzy Hash: 06419575740214AFEB10BF64DD86F7E77B9DB84720F048058FA5AAB3D2DA709D018B91
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                          • String ID:
                          • API String ID: 292994002-0
                          • Opcode ID: 1bbb8ee39c643673deebd832640fb70fcb1c55c86d60be9ae3ebbe510af79438
                          • Instruction ID: 5f5eaec36be5bb6d9d79f2519f3330d4ec8972c94c24edb98a74a13b2c585f2e
                          • Opcode Fuzzy Hash: 1bbb8ee39c643673deebd832640fb70fcb1c55c86d60be9ae3ebbe510af79438
                          • Instruction Fuzzy Hash: F711B231B009146FE7216F76DC44B2BB799EF84761B48C439E90ED7241DBB0DA428AA5
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00A31D88,?), ref: 00A6C312
                          • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00A6C324
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetSystemWow64DirectoryW$kernel32.dll
                          • API String ID: 2574300362-1816364905
                          • Opcode ID: 461c1193e94a2376c225128c3d2c6c9f39931afd8447d419b42e2ead1986a6c3
                          • Instruction ID: ce07db3738c4f9c6eb2ac5f287f0b05ef2ef15de1ee1dfe5e60eca9d60dfdb63
                          • Opcode Fuzzy Hash: 461c1193e94a2376c225128c3d2c6c9f39931afd8447d419b42e2ead1986a6c3
                          • Instruction Fuzzy Hash: 51E0EC74610713DFDB208B69DC04A56B6E4EF09765F80C839E999D6260E774D881CA60
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __itow__swprintf
                          • String ID:
                          • API String ID: 674341424-0
                          • Opcode ID: c0d4b1288e3d26dc5351e7c5cdbe261ab930c5b0a3f5433fc67f163f17227b25
                          • Instruction ID: 2bff6751cea9009f0ceadefce6e8a96b6fa711025ec34f9b3d3531887c94535b
                          • Opcode Fuzzy Hash: c0d4b1288e3d26dc5351e7c5cdbe261ab930c5b0a3f5433fc67f163f17227b25
                          • Instruction Fuzzy Hash: DD22AEB26083059FCB24DF24D991BAFB7E8BF84300F14491DF5969B291DB71EA44CB92
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00A6F151
                          • Process32FirstW.KERNEL32(00000000,?), ref: 00A6F15F
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                          • Process32NextW.KERNEL32(00000000,?), ref: 00A6F21F
                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00A6F22E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                          • String ID:
                          • API String ID: 2576544623-0
                          • Opcode ID: a51ba5a724176a798310e6270cd12e7451808de35af29e1d7d6dafd77751b87b
                          • Instruction ID: 3def67f5a9da0d6f3f053ad6a374260aaf2f84cf47cd6ea1bf10f7219b034973
                          • Opcode Fuzzy Hash: a51ba5a724176a798310e6270cd12e7451808de35af29e1d7d6dafd77751b87b
                          • Instruction Fuzzy Hash: 6F517D71504305AFD310EF24DC85B6BBBE8BF94710F10492DF69697291EB70DA04CB92
                          APIs
                          • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00A540D1
                          • _memset.LIBCMT ref: 00A540F2
                          • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00A54144
                          • CloseHandle.KERNEL32(00000000), ref: 00A5414D
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CloseControlCreateDeviceFileHandle_memset
                          • String ID:
                          • API String ID: 1157408455-0
                          • Opcode ID: 663b7728eeb9cefe8d693685cc5030482c9411dbe2bd193c4d9b8d00ad8d6bec
                          • Instruction ID: a515f8c5410ec32f5809485f7722221846185c8302dfe144c29f82dd7537a6ea
                          • Opcode Fuzzy Hash: 663b7728eeb9cefe8d693685cc5030482c9411dbe2bd193c4d9b8d00ad8d6bec
                          • Instruction Fuzzy Hash: 2711AB759012287AD7309BA5AC4DFEBBB7CEF44764F1042A6F908D7180D6744FC48BA4
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00A4EB19
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: ($|
                          • API String ID: 1659193697-1631851259
                          • Opcode ID: 0ea0f607da393e04c7e74fd3d1a369677279b3a7073f4893a90003548b3e5d1f
                          • Instruction ID: d5b1d971151872f1bd683532966fe2a991fc4c61e848181af5bf8a5c0b53c1d2
                          • Opcode Fuzzy Hash: 0ea0f607da393e04c7e74fd3d1a369677279b3a7073f4893a90003548b3e5d1f
                          • Instruction Fuzzy Hash: 5D321679A046059FD728CF29C48196AB7F1FF88310B15C56EE89ADB3A1E770E981CB44
                          APIs
                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00A626D5
                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00A6270C
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Internet$AvailableDataFileQueryRead
                          • String ID:
                          • API String ID: 599397726-0
                          • Opcode ID: 622bb440b6d5078445fb688aec40dc7ec889c4543310f2eb26e6a1d6f0e760d4
                          • Instruction ID: da998a8d5a9171ef4aa2c8bdffa945791446fa2ec7c32b0d7963bd09d9df613c
                          • Opcode Fuzzy Hash: 622bb440b6d5078445fb688aec40dc7ec889c4543310f2eb26e6a1d6f0e760d4
                          • Instruction Fuzzy Hash: 7B41E475904B09BFEB20DF94DD85FBBB7BCEB40724F10406AF605A6140EA719E81DB60
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00A5B5AE
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00A5B608
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00A5B655
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID:
                          • API String ID: 1682464887-0
                          • Opcode ID: 7de34eb013bb260c2bf68aac9a6fc6daf72a1b1868caaadeb37baf9f7c16c54d
                          • Instruction ID: 1076fa09e1aca07229401cc1aba4f90c21361e6c756ac4af4b138da0eaca7926
                          • Opcode Fuzzy Hash: 7de34eb013bb260c2bf68aac9a6fc6daf72a1b1868caaadeb37baf9f7c16c54d
                          • Instruction Fuzzy Hash: 8B216035A10518EFCB00EFA5DC80AEEBBB8FF89315F1480A9E905AB351DB319956CF51
                          APIs
                            • Part of subcall function 00A10FF6: std::exception::exception.LIBCMT ref: 00A1102C
                            • Part of subcall function 00A10FF6: __CxxThrowException@8.LIBCMT ref: 00A11041
                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00A48D0D
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00A48D3A
                          • GetLastError.KERNEL32 ref: 00A48D47
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                          • String ID:
                          • API String ID: 1922334811-0
                          • Opcode ID: 2489a8c45642075e5925656036e62f9874a91b7a07bae085ea73fde60bdb7433
                          • Instruction ID: 938d2014e8ae165d2ffcdeb81ad0ff9ace3a0df938ff4e976f5e37327cb73e84
                          • Opcode Fuzzy Hash: 2489a8c45642075e5925656036e62f9874a91b7a07bae085ea73fde60bdb7433
                          • Instruction Fuzzy Hash: 6F1194B1814205AFD728DF64ED85D6BB7BCFF44710B10852EF85597241EB70AD818A60
                          APIs
                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00A54C2C
                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00A54C43
                          • FreeSid.ADVAPI32(?), ref: 00A54C53
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AllocateCheckFreeInitializeMembershipToken
                          • String ID:
                          • API String ID: 3429775523-0
                          • Opcode ID: 8bb7166cbd882bb23ff47b7840b076ebf7b216a6c90aa32c7bec4f4a03641f26
                          • Instruction ID: 96f5d5cf143a6baa4eb671e009944f5b122b6441441d18fc83e99dfd072291df
                          • Opcode Fuzzy Hash: 8bb7166cbd882bb23ff47b7840b076ebf7b216a6c90aa32c7bec4f4a03641f26
                          • Instruction Fuzzy Hash: A9F03775A11208BFDB04DFE09C89AAEBBB8EB08201F0084A9A905E2281E6706A458B50
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c831505071b8daeebbc54fba97cb22b78cb41ae048c5b9c683fea10eb97159bf
                          • Instruction ID: f6b6e8b1b1ce76300a854522801f0f64ccebbfeb10b04c65a5ff89d2b0f5c7e8
                          • Opcode Fuzzy Hash: c831505071b8daeebbc54fba97cb22b78cb41ae048c5b9c683fea10eb97159bf
                          • Instruction Fuzzy Hash: 3822CE71A0421ACFCB24DF54C484ABEB7F5FF08300F148569EA56AB361E774AD85CB91
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 00A5C966
                          • FindClose.KERNEL32(00000000), ref: 00A5C996
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: a9583c93773ffd68d7213976ab1ea690d67bd9d5899bfd4525312e41a688aa4b
                          • Instruction ID: 93ddcf54bd070749016d99775e2f529522de86dd35d1e9b21e44ebc312122fe5
                          • Opcode Fuzzy Hash: a9583c93773ffd68d7213976ab1ea690d67bd9d5899bfd4525312e41a688aa4b
                          • Instruction Fuzzy Hash: 4411A1726006049FD710EF29C845A2AF7E9FF84324F00891EF9A9DB291DB70AD05CB81
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00A6977D,?,00A7FB84,?), ref: 00A5A302
                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00A6977D,?,00A7FB84,?), ref: 00A5A314
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorFormatLastMessage
                          • String ID:
                          • API String ID: 3479602957-0
                          • Opcode ID: 21f2294ae2c621bd98d43279b2f7ca78780aa8877f9f665e48c9cf078b2741b6
                          • Instruction ID: 31b35d68ff77f57b10cbb8a67aecf7f8c801856965c27b7a600d0487afe2bc76
                          • Opcode Fuzzy Hash: 21f2294ae2c621bd98d43279b2f7ca78780aa8877f9f665e48c9cf078b2741b6
                          • Instruction Fuzzy Hash: 1CF0823564422DABDB109FA4DC48FFA776DBF08761F008265B918DA191D6309A44CBE1
                          APIs
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00A48851), ref: 00A48728
                          • CloseHandle.KERNEL32(?,?,00A48851), ref: 00A4873A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AdjustCloseHandlePrivilegesToken
                          • String ID:
                          • API String ID: 81990902-0
                          • Opcode ID: 04afec3104d72b25e189c95a82cac4b4b070af72275dc52d148201465d8909b9
                          • Instruction ID: 10efa90cde1c41f3ef259c6977c3f297329566c5bfdfde2b7b39517244e055e0
                          • Opcode Fuzzy Hash: 04afec3104d72b25e189c95a82cac4b4b070af72275dc52d148201465d8909b9
                          • Instruction Fuzzy Hash: 48E0B676410610EEE7252B60ED09DB77BA9EF04350724883DB99A80470DB62ACD1DB10
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00A18F97,?,?,?,00000001), ref: 00A1A39A
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00A1A3A3
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: f4ed3e247f827819aef794a101c34f5d13deec9e43b878e67f0613947308f4f1
                          • Instruction ID: ae3d2564d235933d6ee2370250c2843ae4c4ed6e36db3ed1403014ff6983e1ef
                          • Opcode Fuzzy Hash: f4ed3e247f827819aef794a101c34f5d13deec9e43b878e67f0613947308f4f1
                          • Instruction Fuzzy Hash: 44B09231054208AFCA00ABD1EC09B883F68EB44AABF408020F61D88060CB6256928A91
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4c0398339b69efe2143a40b3ecb934a9a5e2a0727e78544fec2e9907f9913557
                          • Instruction ID: 7201b78f5d20e6183513b31e7b7f495228b0e47c1e115cf5532ef1512b61f0b3
                          • Opcode Fuzzy Hash: 4c0398339b69efe2143a40b3ecb934a9a5e2a0727e78544fec2e9907f9913557
                          • Instruction Fuzzy Hash: 23321432D69F414DD7239634D836339A249AFB73D4F25D737E82AB59A6EB28C4C34200
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9bd77bd5c37b4be45492a49b9ebf260ae358726dcfdee280d9db854f7bbcfd3e
                          • Instruction ID: a9b42a874495be6c4f5b539a064aefd75fb7cc494ccaca4d87d55c7083d88608
                          • Opcode Fuzzy Hash: 9bd77bd5c37b4be45492a49b9ebf260ae358726dcfdee280d9db854f7bbcfd3e
                          • Instruction Fuzzy Hash: 2EB1F030E2AF514DE72396798831336BA5CAFBB2C5F91D71BFC2674D22EB2585834241
                          APIs
                          • __time64.LIBCMT ref: 00A58B25
                            • Part of subcall function 00A1543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00A591F8,00000000,?,?,?,?,00A593A9,00000000,?), ref: 00A15443
                            • Part of subcall function 00A1543A: __aulldiv.LIBCMT ref: 00A15463
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Time$FileSystem__aulldiv__time64
                          • String ID:
                          • API String ID: 2893107130-0
                          • Opcode ID: 1bb48368dc4a0726abc96f2999af180752c7df66c4f03e4e51c9375f1f1d783b
                          • Instruction ID: 0fc98eee88ed04e94c713ea09e207325664b75c6fa1a1025ad8070bebd97bad0
                          • Opcode Fuzzy Hash: 1bb48368dc4a0726abc96f2999af180752c7df66c4f03e4e51c9375f1f1d783b
                          • Instruction Fuzzy Hash: 082102726355108BC329CF29D841A56B3E5EBA4311B298F2CD4E6CB2E0CA74B905CB94
                          APIs
                          • BlockInput.USER32(00000001), ref: 00A64218
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BlockInput
                          • String ID:
                          • API String ID: 3456056419-0
                          • Opcode ID: 04d7b63f5da7120eaa72791633e116df21033a24dc0a07748086ce77ead931b1
                          • Instruction ID: 2bb033a3fd2d2089faa864ea9434a5d4d5911f48befd4e6d137c60507b2111be
                          • Opcode Fuzzy Hash: 04d7b63f5da7120eaa72791633e116df21033a24dc0a07748086ce77ead931b1
                          • Instruction Fuzzy Hash: DEE04F312402189FC710EF69D844B9AFBF8AF98760F108026FE49C7352DA70E8418BA0
                          APIs
                          • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00A54F18
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: mouse_event
                          • String ID:
                          • API String ID: 2434400541-0
                          • Opcode ID: 64556a35c64ed549d76181991df1321e4dce154119ac339fc140aa905d4d437f
                          • Instruction ID: c4226b528b4689be36e9942f5acaaf57fc39e480bf723e745aadb95b0e35c055
                          • Opcode Fuzzy Hash: 64556a35c64ed549d76181991df1321e4dce154119ac339fc140aa905d4d437f
                          • Instruction Fuzzy Hash: 5CD05EB01642053CFC188B28EC0FF760508F348F8BF8469893A0A854C198F56CCCA034
                          APIs
                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00A488D1), ref: 00A48CB3
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: LogonUser
                          • String ID:
                          • API String ID: 1244722697-0
                          • Opcode ID: 26e242fa54d34df3afa38fd8109aff4a1df2eea162138154014ae0439f9dd569
                          • Instruction ID: 5221ce3ed1e1ffec22e7d2bbf3fe82449be22f9af09e014e5a3f050f0ba68d5e
                          • Opcode Fuzzy Hash: 26e242fa54d34df3afa38fd8109aff4a1df2eea162138154014ae0439f9dd569
                          • Instruction Fuzzy Hash: 1FD05E3226450EAFEF018EA4DC01EAE3B69EB04B01F408121FE15C61A1C775D936AB60
                          APIs
                          • GetUserNameW.ADVAPI32(?,?), ref: 00A32242
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: NameUser
                          • String ID:
                          • API String ID: 2645101109-0
                          • Opcode ID: b00b1068ea79decd5a6861eed08f8329096abe1f1fb5cf07368005dc26b0d98f
                          • Instruction ID: 3a6fe9f25162602cb427c41e2754fe352148d76ec03edf68f7dc9c584ae3a71b
                          • Opcode Fuzzy Hash: b00b1068ea79decd5a6861eed08f8329096abe1f1fb5cf07368005dc26b0d98f
                          • Instruction Fuzzy Hash: C0C048F1800109DBDB05DFA0DA88DEEB7BCAB08315F2080A6A106F2200E7749B858A71
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00A1A36A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 1ca7dbe58f0a9387470f092d890db8b2f4ce35d7d0c8a86e88c178fe8e2b1e88
                          • Instruction ID: a0dbf13dd238ad08a2911a6403a8d00f43672c0980316ad5a5773a537a168c6a
                          • Opcode Fuzzy Hash: 1ca7dbe58f0a9387470f092d890db8b2f4ce35d7d0c8a86e88c178fe8e2b1e88
                          • Instruction Fuzzy Hash: BEA0123000010CAB8A005B81EC044447F5CD7001957008020F40C44021873255514980
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d4e69e97c45f04b32debaefbf90894692c8e42df6ad2530af6e3725d3a33e17e
                          • Instruction ID: 9e7108c40da56b983826fd626db5edadacb7964049cf12ffe4febd1ddba256a3
                          • Opcode Fuzzy Hash: d4e69e97c45f04b32debaefbf90894692c8e42df6ad2530af6e3725d3a33e17e
                          • Instruction Fuzzy Hash: FE220934E0551ACBEF288F24E49467DB7B1EF82344F69446AD4828B6D2DB3C9D81CB64
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction ID: f6295a973055aa8e9f4b5575fc833fdf73c5dca164734e7e67d6356f60a3e14a
                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction Fuzzy Hash: B9C182322051930ADF2D473994746BEBAE15AA27F131A076EE4B3CB5C4EF20D5B6D720
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction ID: ed0299917af4bcbe3ebcef26c4b32d13539a43c95e17fb53a81a4fe598776ddf
                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction Fuzzy Hash: 45C193322091930ADB2D473994346BEBBE15BA27F131A076EE4B2DB5C4EF20D5B5D720
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction ID: cc1c39cfcbc98f197e3ab2a9a629e692531cf5d9de6b7e4127cccaddcc7d3fe3
                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction Fuzzy Hash: E841C471D1051CEBCF48CFADC991AAEBBF1AF88201F548299D516AB345D730AB41DB40
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction ID: 5d6c17d8e8a69af1005e54187cdf93f6c1c0489fe34ea5de8731e829296689f1
                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction Fuzzy Hash: 91018079A04109EFCB48DF98C5909AEF7F5FB58710B2085E9E809A7701D731AE41DB80
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction ID: e37825dc40dfdd9085b5bfc25a7fb82c624b91fc73b80d5b8f456f84d4f3cca7
                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction Fuzzy Hash: A9018078A04109EFCB44DF98C5909AEFBF5FB58710B6085A9E819A7701D730AE41DB80
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306852082.0000000000B90000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B90000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_b90000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                          APIs
                          • SetTextColor.GDI32(?,00000000), ref: 00A7A89F
                          • GetSysColorBrush.USER32(0000000F), ref: 00A7A8D0
                          • GetSysColor.USER32(0000000F), ref: 00A7A8DC
                          • SetBkColor.GDI32(?,000000FF), ref: 00A7A8F6
                          • SelectObject.GDI32(?,?), ref: 00A7A905
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00A7A930
                          • GetSysColor.USER32(00000010), ref: 00A7A938
                          • CreateSolidBrush.GDI32(00000000), ref: 00A7A93F
                          • FrameRect.USER32(?,?,00000000), ref: 00A7A94E
                          • DeleteObject.GDI32(00000000), ref: 00A7A955
                          • InflateRect.USER32(?,000000FE,000000FE), ref: 00A7A9A0
                          • FillRect.USER32(?,?,?), ref: 00A7A9D2
                          • GetWindowLongW.USER32(?,000000F0), ref: 00A7A9FD
                            • Part of subcall function 00A7AB60: GetSysColor.USER32(00000012), ref: 00A7AB99
                            • Part of subcall function 00A7AB60: SetTextColor.GDI32(?,?), ref: 00A7AB9D
                            • Part of subcall function 00A7AB60: GetSysColorBrush.USER32(0000000F), ref: 00A7ABB3
                            • Part of subcall function 00A7AB60: GetSysColor.USER32(0000000F), ref: 00A7ABBE
                            • Part of subcall function 00A7AB60: GetSysColor.USER32(00000011), ref: 00A7ABDB
                            • Part of subcall function 00A7AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A7ABE9
                            • Part of subcall function 00A7AB60: SelectObject.GDI32(?,00000000), ref: 00A7ABFA
                            • Part of subcall function 00A7AB60: SetBkColor.GDI32(?,00000000), ref: 00A7AC03
                            • Part of subcall function 00A7AB60: SelectObject.GDI32(?,?), ref: 00A7AC10
                            • Part of subcall function 00A7AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00A7AC2F
                            • Part of subcall function 00A7AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A7AC46
                            • Part of subcall function 00A7AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00A7AC5B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                          • String ID: @U=u
                          • API String ID: 4124339563-2594219639
                          • Opcode ID: 94d0d10ee300814e53854fccb1f5b1649e366d4ef54f7c4018748e8d266fd26f
                          • Instruction ID: 7bf8dea5b49cfaaaa8ef7be3a99048930515936723541e108fe3464a2f4254f2
                          • Opcode Fuzzy Hash: 94d0d10ee300814e53854fccb1f5b1649e366d4ef54f7c4018748e8d266fd26f
                          • Instruction Fuzzy Hash: F1A16272408301BFD710DFA4DC08A6F77A9FF88321F108B29FA5A961A1D775D986CB52
                          APIs
                          • CharUpperBuffW.USER32(?,?,00A7F910), ref: 00A738AF
                          • IsWindowVisible.USER32(?), ref: 00A738D3
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharUpperVisibleWindow
                          • String ID: @U=u$ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                          • API String ID: 4105515805-3469695742
                          • Opcode ID: e2464f8f2aeed78d8067aa641965f07c5c7ee26cac090c95e3734be7de6c657e
                          • Instruction ID: 353b6443bc90f7b3f45e52eba35f6aa97928cd4362a1cdee4ff80000683ed50e
                          • Opcode Fuzzy Hash: e2464f8f2aeed78d8067aa641965f07c5c7ee26cac090c95e3734be7de6c657e
                          • Instruction Fuzzy Hash: 30D19031214205DFCF14EF10C951BAABBA5AF95344F12C458B88A5B3E3CB71EE8ADB51
                          APIs
                          • DestroyWindow.USER32(?,?,?), ref: 009F2CA2
                          • DeleteObject.GDI32(00000000), ref: 009F2CE8
                          • DeleteObject.GDI32(00000000), ref: 009F2CF3
                          • DestroyIcon.USER32(00000000,?,?,?), ref: 009F2CFE
                          • DestroyWindow.USER32(00000000,?,?,?), ref: 009F2D09
                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00A2C68B
                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00A2C6C4
                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00A2CAED
                            • Part of subcall function 009F1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009F2036,?,00000000,?,?,?,?,009F16CB,00000000,?), ref: 009F1B9A
                          • SendMessageW.USER32(?,00001053), ref: 00A2CB2A
                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00A2CB41
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A2CB57
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00A2CB62
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                          • String ID: 0$@U=u
                          • API String ID: 464785882-975001249
                          • Opcode ID: c25e90fafa140ffc245810acee2d84fe568e8b1b07f3f5d1ada3b727147eb902
                          • Instruction ID: 4c3126e6c008db35659be09661c14f47702dca24bdb890ed2b004aaf569fa7cd
                          • Opcode Fuzzy Hash: c25e90fafa140ffc245810acee2d84fe568e8b1b07f3f5d1ada3b727147eb902
                          • Instruction Fuzzy Hash: 0F12AE30600215EFDB24CF28D994BADB7E5BF44320F5485B9E999DB262C731E882CF91
                          APIs
                          • DestroyWindow.USER32(00000000), ref: 00A677F1
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00A678B0
                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00A678EE
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00A67900
                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00A67946
                          • GetClientRect.USER32(00000000,?), ref: 00A67952
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00A67996
                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00A679A5
                          • GetStockObject.GDI32(00000011), ref: 00A679B5
                          • SelectObject.GDI32(00000000,00000000), ref: 00A679B9
                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00A679C9
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A679D2
                          • DeleteDC.GDI32(00000000), ref: 00A679DB
                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00A67A07
                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00A67A1E
                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00A67A59
                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00A67A6D
                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00A67A7E
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00A67AAE
                          • GetStockObject.GDI32(00000011), ref: 00A67AB9
                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00A67AC4
                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00A67ACE
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                          • String ID: @U=u$AutoIt v3$DISPLAY$msctls_progress32$static
                          • API String ID: 2910397461-2771358697
                          • Opcode ID: 90071f98f55b05095520aaa34498b72aaa120c8b8e2f05e614a6b9d9e23555ec
                          • Instruction ID: ee1967b5f11c6d9839839a3dc84b792c608fdf6a08046e56ba2159c5575aae02
                          • Opcode Fuzzy Hash: 90071f98f55b05095520aaa34498b72aaa120c8b8e2f05e614a6b9d9e23555ec
                          • Instruction Fuzzy Hash: 2DA17271A40219BFEB14DBA4DC4AFAE7BB9EF44714F008214FA19A72E1D774AD41CB60
                          APIs
                          • GetSysColor.USER32(00000012), ref: 00A7AB99
                          • SetTextColor.GDI32(?,?), ref: 00A7AB9D
                          • GetSysColorBrush.USER32(0000000F), ref: 00A7ABB3
                          • GetSysColor.USER32(0000000F), ref: 00A7ABBE
                          • CreateSolidBrush.GDI32(?), ref: 00A7ABC3
                          • GetSysColor.USER32(00000011), ref: 00A7ABDB
                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00A7ABE9
                          • SelectObject.GDI32(?,00000000), ref: 00A7ABFA
                          • SetBkColor.GDI32(?,00000000), ref: 00A7AC03
                          • SelectObject.GDI32(?,?), ref: 00A7AC10
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 00A7AC2F
                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00A7AC46
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00A7AC5B
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00A7ACA7
                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00A7ACCE
                          • InflateRect.USER32(?,000000FD,000000FD), ref: 00A7ACEC
                          • DrawFocusRect.USER32(?,?), ref: 00A7ACF7
                          • GetSysColor.USER32(00000011), ref: 00A7AD05
                          • SetTextColor.GDI32(?,00000000), ref: 00A7AD0D
                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00A7AD21
                          • SelectObject.GDI32(?,00A7A869), ref: 00A7AD38
                          • DeleteObject.GDI32(?), ref: 00A7AD43
                          • SelectObject.GDI32(?,?), ref: 00A7AD49
                          • DeleteObject.GDI32(?), ref: 00A7AD4E
                          • SetTextColor.GDI32(?,?), ref: 00A7AD54
                          • SetBkColor.GDI32(?,?), ref: 00A7AD5E
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                          • String ID: @U=u
                          • API String ID: 1996641542-2594219639
                          • Opcode ID: e49e1922d45b495c8e606dd6c4dd4125e37949907a0384a5d9c17e75f8d9d911
                          • Instruction ID: 7183876c754ad88c62947a0673a44acb257441d9c73b85a15da6ee76d2d1b134
                          • Opcode Fuzzy Hash: e49e1922d45b495c8e606dd6c4dd4125e37949907a0384a5d9c17e75f8d9d911
                          • Instruction Fuzzy Hash: 73611D71900218FFDB11DFA4DC48AAE7B79FB48320F10C225F919AB2A1D7759E81DB90
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00A5AF89
                          • GetDriveTypeW.KERNEL32(?,00A7FAC0,?,\\.\,00A7F910), ref: 00A5B066
                          • SetErrorMode.KERNEL32(00000000,00A7FAC0,?,\\.\,00A7F910), ref: 00A5B1C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorMode$DriveType
                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                          • API String ID: 2907320926-4222207086
                          • Opcode ID: 20faee9e1ae0e035ba4e962affb8e0cd38eb0717584262ac562064d0d937b425
                          • Instruction ID: 995cd15a25d805baf8a603274cb1cd484077a2f3589c5c449b5c71b32bf82058
                          • Opcode Fuzzy Hash: 20faee9e1ae0e035ba4e962affb8e0cd38eb0717584262ac562064d0d937b425
                          • Instruction Fuzzy Hash: E851E370694B09BF8B40DB50C99297E73F0BB653837208615ED0AE72D1CB359D49DB62
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                          • API String ID: 1038674560-86951937
                          • Opcode ID: de9e1cb90ac9154e81c8e8c573e51f9e5b625cd6f485f7bc168cb1ddaa454540
                          • Instruction ID: d8ba5b6d7fad205bb92d35e2085a8a69f3f3b7e93f3edb0520387db3a1a276d5
                          • Opcode Fuzzy Hash: de9e1cb90ac9154e81c8e8c573e51f9e5b625cd6f485f7bc168cb1ddaa454540
                          • Instruction Fuzzy Hash: 44812771604319BFCB20AF64DE92FBE7768AF15300F044435FE45AA1C2EB61EA95C3A1
                          APIs
                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00A78D34
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A78D45
                          • CharNextW.USER32(0000014E), ref: 00A78D74
                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00A78DB5
                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00A78DCB
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A78DDC
                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00A78DF9
                          • SetWindowTextW.USER32(?,0000014E), ref: 00A78E45
                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00A78E5B
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A78E8C
                          • _memset.LIBCMT ref: 00A78EB1
                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00A78EFA
                          • _memset.LIBCMT ref: 00A78F59
                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00A78F83
                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00A78FDB
                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00A79088
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00A790AA
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A790F4
                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A79121
                          • DrawMenuBar.USER32(?), ref: 00A79130
                          • SetWindowTextW.USER32(?,0000014E), ref: 00A79158
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                          • String ID: 0$@U=u
                          • API String ID: 1073566785-975001249
                          • Opcode ID: 491782490204a3231fcf9b30cb3e6fdc0768703d25a3f5dc586bbf2216ffc622
                          • Instruction ID: 8fd22c5c3da4369a3f1209f3da3c6372ac1732d597e950c8877395ccb9a00433
                          • Opcode Fuzzy Hash: 491782490204a3231fcf9b30cb3e6fdc0768703d25a3f5dc586bbf2216ffc622
                          • Instruction Fuzzy Hash: C3E15D71940219AEDF21DFA4CC88EEE7BB9FF05710F10C156F919AA291DB748A81DF60
                          APIs
                          • GetCursorPos.USER32(?), ref: 00A74C51
                          • GetDesktopWindow.USER32 ref: 00A74C66
                          • GetWindowRect.USER32(00000000), ref: 00A74C6D
                          • GetWindowLongW.USER32(?,000000F0), ref: 00A74CCF
                          • DestroyWindow.USER32(?), ref: 00A74CFB
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00A74D24
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A74D42
                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00A74D68
                          • SendMessageW.USER32(?,00000421,?,?), ref: 00A74D7D
                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00A74D90
                          • IsWindowVisible.USER32(?), ref: 00A74DB0
                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00A74DCB
                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00A74DDF
                          • GetWindowRect.USER32(?,?), ref: 00A74DF7
                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00A74E1D
                          • GetMonitorInfoW.USER32(00000000,?), ref: 00A74E37
                          • CopyRect.USER32(?,?), ref: 00A74E4E
                          • SendMessageW.USER32(?,00000412,00000000), ref: 00A74EB9
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                          • String ID: ($0$tooltips_class32
                          • API String ID: 698492251-4156429822
                          • Opcode ID: 066968da89b92e5a421af09b29c1cc868704b7aae3cc145231637d7c2d031dee
                          • Instruction ID: 562d00d60387c07a37fcb0fa02c090095a9dbe6ee0b11173b2cad283577a5bbf
                          • Opcode Fuzzy Hash: 066968da89b92e5a421af09b29c1cc868704b7aae3cc145231637d7c2d031dee
                          • Instruction Fuzzy Hash: 25B14671608340AFDB04DF64CC48B6ABBE4BB88710F00C919F59D9B2A1DB71ED45CB92
                          APIs
                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00A546E8
                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00A5470E
                          • _wcscpy.LIBCMT ref: 00A5473C
                          • _wcscmp.LIBCMT ref: 00A54747
                          • _wcscat.LIBCMT ref: 00A5475D
                          • _wcsstr.LIBCMT ref: 00A54768
                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00A54784
                          • _wcscat.LIBCMT ref: 00A547CD
                          • _wcscat.LIBCMT ref: 00A547D4
                          • _wcsncpy.LIBCMT ref: 00A547FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                          • API String ID: 699586101-1459072770
                          • Opcode ID: 9367ef5171cee361a5a01ce86855c756cd2c83a111be5bee185b3874db9b640d
                          • Instruction ID: 8f9605478173d70557120009651382f307ad6d56c2a141870daded1b08fac460
                          • Opcode Fuzzy Hash: 9367ef5171cee361a5a01ce86855c756cd2c83a111be5bee185b3874db9b640d
                          • Instruction Fuzzy Hash: FD411672A042007ADB10AB748D43FFF77BCEF4A750F004465F908A6182EB719AA197A5
                          APIs
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009F28BC
                          • GetSystemMetrics.USER32(00000007), ref: 009F28C4
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 009F28EF
                          • GetSystemMetrics.USER32(00000008), ref: 009F28F7
                          • GetSystemMetrics.USER32(00000004), ref: 009F291C
                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 009F2939
                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 009F2949
                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 009F297C
                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 009F2990
                          • GetClientRect.USER32(00000000,000000FF), ref: 009F29AE
                          • GetStockObject.GDI32(00000011), ref: 009F29CA
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 009F29D5
                            • Part of subcall function 009F2344: GetCursorPos.USER32(?), ref: 009F2357
                            • Part of subcall function 009F2344: ScreenToClient.USER32(00AB67B0,?), ref: 009F2374
                            • Part of subcall function 009F2344: GetAsyncKeyState.USER32(00000001), ref: 009F2399
                            • Part of subcall function 009F2344: GetAsyncKeyState.USER32(00000002), ref: 009F23A7
                          • SetTimer.USER32(00000000,00000000,00000028,009F1256), ref: 009F29FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                          • String ID: @U=u$AutoIt v3 GUI
                          • API String ID: 1458621304-2077007950
                          • Opcode ID: f4df3b5d6fb5f208e4810dff7afc1c87c1e8409a9cf9ccfec4b32ba2bec9f34e
                          • Instruction ID: 5f72660723a27c773c689c135d867dc35f5572b42b19a1ffc0becef1fea9dab7
                          • Opcode Fuzzy Hash: f4df3b5d6fb5f208e4810dff7afc1c87c1e8409a9cf9ccfec4b32ba2bec9f34e
                          • Instruction Fuzzy Hash: 1DB16B71A0020AEFDB14DFA8DC45BAE7BB5FB48314F108629FA15A72E0DB74E941CB50
                          APIs
                          • LoadIconW.USER32(00000063), ref: 00A4C4D4
                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00A4C4E6
                          • SetWindowTextW.USER32(?,?), ref: 00A4C4FD
                          • GetDlgItem.USER32(?,000003EA), ref: 00A4C512
                          • SetWindowTextW.USER32(00000000,?), ref: 00A4C518
                          • GetDlgItem.USER32(?,000003E9), ref: 00A4C528
                          • SetWindowTextW.USER32(00000000,?), ref: 00A4C52E
                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00A4C54F
                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00A4C569
                          • GetWindowRect.USER32(?,?), ref: 00A4C572
                          • SetWindowTextW.USER32(?,?), ref: 00A4C5DD
                          • GetDesktopWindow.USER32 ref: 00A4C5E3
                          • GetWindowRect.USER32(00000000), ref: 00A4C5EA
                          • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00A4C636
                          • GetClientRect.USER32(?,?), ref: 00A4C643
                          • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00A4C668
                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00A4C693
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                          • String ID: @U=u
                          • API String ID: 3869813825-2594219639
                          • Opcode ID: 7c64c3ff1d29349bb7fdd825322f1a53063ea4f2d5f75c12690eb00465d25a93
                          • Instruction ID: 9766d68d73bbe4abd5e59e93c274cca26c984ab7120922f74398697150432f5c
                          • Opcode Fuzzy Hash: 7c64c3ff1d29349bb7fdd825322f1a53063ea4f2d5f75c12690eb00465d25a93
                          • Instruction Fuzzy Hash: A351A074900709EFDB20DFA8CE89B6EBBF5FF44715F004928E68AA25A0D774B945CB50
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00A740F6
                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00A741B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharMessageSendUpper
                          • String ID: @U=u$DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                          • API String ID: 3974292440-1753161424
                          • Opcode ID: c4de9e8e5c928cda871a15b86177e935c2c80bf8133595448be2a0668c2d1b58
                          • Instruction ID: a167d2b75ebcbc5b6581673a9620caa68d00b27e074738ebb668f7af153f228d
                          • Opcode Fuzzy Hash: c4de9e8e5c928cda871a15b86177e935c2c80bf8133595448be2a0668c2d1b58
                          • Instruction Fuzzy Hash: 9AA17C302143059FCB14EF24CE51BBAB7A5BF89314F14C968B9AA9B2D2DB70EC45CB51
                          APIs
                          • LoadCursorW.USER32(00000000,00007F89), ref: 00A65309
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00A65314
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00A6531F
                          • LoadCursorW.USER32(00000000,00007F03), ref: 00A6532A
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00A65335
                          • LoadCursorW.USER32(00000000,00007F01), ref: 00A65340
                          • LoadCursorW.USER32(00000000,00007F81), ref: 00A6534B
                          • LoadCursorW.USER32(00000000,00007F88), ref: 00A65356
                          • LoadCursorW.USER32(00000000,00007F80), ref: 00A65361
                          • LoadCursorW.USER32(00000000,00007F86), ref: 00A6536C
                          • LoadCursorW.USER32(00000000,00007F83), ref: 00A65377
                          • LoadCursorW.USER32(00000000,00007F85), ref: 00A65382
                          • LoadCursorW.USER32(00000000,00007F82), ref: 00A6538D
                          • LoadCursorW.USER32(00000000,00007F84), ref: 00A65398
                          • LoadCursorW.USER32(00000000,00007F04), ref: 00A653A3
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00A653AE
                          • GetCursorInfo.USER32(?), ref: 00A653BE
                          • GetLastError.KERNEL32(00000001,00000000), ref: 00A653E9
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Cursor$Load$ErrorInfoLast
                          • String ID:
                          • API String ID: 3215588206-0
                          • Opcode ID: ed4998450e21c3f713fa6f5ab545e819921b61855c6240f311ff14eddd6e0950
                          • Instruction ID: becf4168b0ffb497e23c58a0f9adf046c7102f57b4dc25e1054c3027aac9382a
                          • Opcode Fuzzy Hash: ed4998450e21c3f713fa6f5ab545e819921b61855c6240f311ff14eddd6e0950
                          • Instruction Fuzzy Hash: 53416170E083196ADB109FBA8C4996FFFF8EF51B50F10452FE519E7290DAB8A501CE61
                          APIs
                          • GetClassNameW.USER32(?,?,00000100), ref: 00A4AAA5
                          • __swprintf.LIBCMT ref: 00A4AB46
                          • _wcscmp.LIBCMT ref: 00A4AB59
                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00A4ABAE
                          • _wcscmp.LIBCMT ref: 00A4ABEA
                          • GetClassNameW.USER32(?,?,00000400), ref: 00A4AC21
                          • GetDlgCtrlID.USER32(?), ref: 00A4AC73
                          • GetWindowRect.USER32(?,?), ref: 00A4ACA9
                          • GetParent.USER32(?), ref: 00A4ACC7
                          • ScreenToClient.USER32(00000000), ref: 00A4ACCE
                          • GetClassNameW.USER32(?,?,00000100), ref: 00A4AD48
                          • _wcscmp.LIBCMT ref: 00A4AD5C
                          • GetWindowTextW.USER32(?,?,00000400), ref: 00A4AD82
                          • _wcscmp.LIBCMT ref: 00A4AD96
                            • Part of subcall function 00A1386C: _iswctype.LIBCMT ref: 00A13874
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                          • String ID: %s%u
                          • API String ID: 3744389584-679674701
                          • Opcode ID: c764335df16bf46f5bf0f5d8f3650ef45f8ea56bcb902b7437a3bfe2a14bc826
                          • Instruction ID: 4d0c2ca0af7ea117004308973123ab9b0b74e464ee4c60b33a4a53aa5b9f5890
                          • Opcode Fuzzy Hash: c764335df16bf46f5bf0f5d8f3650ef45f8ea56bcb902b7437a3bfe2a14bc826
                          • Instruction Fuzzy Hash: 29A1F075644306AFDB14DF64C884BEAB7E8FF94315F008629F999C2190DB30EA45CB92
                          APIs
                          • GetClassNameW.USER32(00000008,?,00000400), ref: 00A4B3DB
                          • _wcscmp.LIBCMT ref: 00A4B3EC
                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 00A4B414
                          • CharUpperBuffW.USER32(?,00000000), ref: 00A4B431
                          • _wcscmp.LIBCMT ref: 00A4B44F
                          • _wcsstr.LIBCMT ref: 00A4B460
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00A4B498
                          • _wcscmp.LIBCMT ref: 00A4B4A8
                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 00A4B4CF
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00A4B518
                          • _wcscmp.LIBCMT ref: 00A4B528
                          • GetClassNameW.USER32(00000010,?,00000400), ref: 00A4B550
                          • GetWindowRect.USER32(00000004,?), ref: 00A4B5B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                          • String ID: @$ThumbnailClass
                          • API String ID: 1788623398-1539354611
                          • Opcode ID: 53350addfcae046435300246ec426c2772d7e98e8767e2b84ba80156b51f56b8
                          • Instruction ID: bb2b73b97da67673a3f47b00f9ef2692a8c656d88b371ccc3f8a2d7772aaff5d
                          • Opcode Fuzzy Hash: 53350addfcae046435300246ec426c2772d7e98e8767e2b84ba80156b51f56b8
                          • Instruction Fuzzy Hash: AB818F750182499FDB04DF14C985FAABBE8FF84314F048569FD899A0A2DB34DE46CB71
                          APIs
                          • _memset.LIBCMT ref: 00A7A4C8
                          • DestroyWindow.USER32(?,?), ref: 00A7A542
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00A7A5BC
                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00A7A5DE
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A7A5F1
                          • DestroyWindow.USER32(00000000), ref: 00A7A613
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,009F0000,00000000), ref: 00A7A64A
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00A7A663
                          • GetDesktopWindow.USER32 ref: 00A7A67C
                          • GetWindowRect.USER32(00000000), ref: 00A7A683
                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00A7A69B
                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00A7A6B3
                            • Part of subcall function 009F25DB: GetWindowLongW.USER32(?,000000EB), ref: 009F25EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                          • String ID: 0$@U=u$tooltips_class32
                          • API String ID: 1297703922-1130792468
                          • Opcode ID: 1177b5fc6f16b38beec3ff7828a2d4e61f484dd62685b1949c04508ac9631a57
                          • Instruction ID: 991a9701c459f47d16bd113fa1eaf2bd999c58b3d7bdf6306f49ef595e4508d6
                          • Opcode Fuzzy Hash: 1177b5fc6f16b38beec3ff7828a2d4e61f484dd62685b1949c04508ac9631a57
                          • Instruction Fuzzy Hash: E871BE72140245AFD721CF68CC49F6A7BFAFB98700F18852DF989872A1D775E942CB12
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • DragQueryPoint.SHELL32(?,?), ref: 00A7C917
                            • Part of subcall function 00A7ADF1: ClientToScreen.USER32(?,?), ref: 00A7AE1A
                            • Part of subcall function 00A7ADF1: GetWindowRect.USER32(?,?), ref: 00A7AE90
                            • Part of subcall function 00A7ADF1: PtInRect.USER32(?,?,00A7C304), ref: 00A7AEA0
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00A7C980
                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00A7C98B
                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00A7C9AE
                          • _wcscat.LIBCMT ref: 00A7C9DE
                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00A7C9F5
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00A7CA0E
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00A7CA25
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00A7CA47
                          • DragFinish.SHELL32(?), ref: 00A7CA4E
                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00A7CB41
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$@U=u
                          • API String ID: 169749273-762882726
                          • Opcode ID: c5794c5af875b7225f7e2852a40e2e9ad25ced402189a283547d71a47edfaa76
                          • Instruction ID: c1a5fb8c0252f6970be55976d42a9d6b09ccec5bc0cb056b1ada6171ac26c38d
                          • Opcode Fuzzy Hash: c5794c5af875b7225f7e2852a40e2e9ad25ced402189a283547d71a47edfaa76
                          • Instruction Fuzzy Hash: D4614A71108304AFC711DFA4DC85EAFBBE8FBC9710F00892EF695961A1DB709A49CB52
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                          • API String ID: 1038674560-1810252412
                          • Opcode ID: b3f931ec859f9ebec1a4c1a00062589698f660ac5a857e557a21fec03c12256b
                          • Instruction ID: 81e0cb6fc3fc57556aa51bc1db7ad2d275190c319cd1c049ca4ba3137ba369a0
                          • Opcode Fuzzy Hash: b3f931ec859f9ebec1a4c1a00062589698f660ac5a857e557a21fec03c12256b
                          • Instruction Fuzzy Hash: BB317E39A54209B6DF14FEA0CE43FFFB7A8AF65750F600529B541720D2EFA1AE04C661
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00A746AB
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00A746F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharMessageSendUpper
                          • String ID: @U=u$CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                          • API String ID: 3974292440-383632319
                          • Opcode ID: 3e0bbcba8d9f3bdced341b0a734406c2beec61a9ea330dba48107e9ad7f14707
                          • Instruction ID: 50e304bd013e8a150a1572c993183728bcf8dac883ccf39966347ba2cf8b7e90
                          • Opcode Fuzzy Hash: 3e0bbcba8d9f3bdced341b0a734406c2beec61a9ea330dba48107e9ad7f14707
                          • Instruction Fuzzy Hash: 7391A1342043059FCB14EF24C951B6AB7A5BF89354F01C85CF99A5B3A2DB70ED86CB41
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00A7BB6E
                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00A76D80,?), ref: 00A7BBCA
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A7BC03
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00A7BC46
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00A7BC7D
                          • FreeLibrary.KERNEL32(?), ref: 00A7BC89
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A7BC99
                          • DestroyIcon.USER32(?), ref: 00A7BCA8
                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00A7BCC5
                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00A7BCD1
                            • Part of subcall function 00A1313D: __wcsicmp_l.LIBCMT ref: 00A131C6
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                          • String ID: .dll$.exe$.icl$@U=u
                          • API String ID: 1212759294-1639919054
                          • Opcode ID: 538295edacd03e036f8aad359ea86299768c6c7c247c423e38d9210c70a8c778
                          • Instruction ID: aed5b03dc88e84844dd1eac766757ce015fdfe38615620e758052c4acc83c6a6
                          • Opcode Fuzzy Hash: 538295edacd03e036f8aad359ea86299768c6c7c247c423e38d9210c70a8c778
                          • Instruction Fuzzy Hash: 4A61B0B1610219BEEB14DF64CD46BBA7BA8FB08711F10C219F919D61D1DB749A90CBA0
                          APIs
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          • CharLowerBuffW.USER32(?,?), ref: 00A5A636
                          • GetDriveTypeW.KERNEL32 ref: 00A5A683
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A5A6CB
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A5A702
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A5A730
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                          • API String ID: 2698844021-4113822522
                          • Opcode ID: 04e168125fe3d898c60184d6ca42e8652920f8753afa298df6a18f1220ee4d18
                          • Instruction ID: 4576c69c097068552d2919f5f8d5aa90967f616317fa60f6090ac4011f64e675
                          • Opcode Fuzzy Hash: 04e168125fe3d898c60184d6ca42e8652920f8753afa298df6a18f1220ee4d18
                          • Instruction Fuzzy Hash: EB514C711047099FC700EF20C981A6AB7F8FF98758F14496DF996972A1DB31EE0ACB52
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00A5A47A
                          • __swprintf.LIBCMT ref: 00A5A49C
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00A5A4D9
                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00A5A4FE
                          • _memset.LIBCMT ref: 00A5A51D
                          • _wcsncpy.LIBCMT ref: 00A5A559
                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00A5A58E
                          • CloseHandle.KERNEL32(00000000), ref: 00A5A599
                          • RemoveDirectoryW.KERNEL32(?), ref: 00A5A5A2
                          • CloseHandle.KERNEL32(00000000), ref: 00A5A5AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                          • String ID: :$\$\??\%s
                          • API String ID: 2733774712-3457252023
                          • Opcode ID: 207c10937c9e247bb72fdb21c60b7a10b0114678823e339103549523718084ae
                          • Instruction ID: ffeb0e7adf20baced30298859c648943874984894718c16b5b069cec1f3e1589
                          • Opcode Fuzzy Hash: 207c10937c9e247bb72fdb21c60b7a10b0114678823e339103549523718084ae
                          • Instruction Fuzzy Hash: 77316EB6600119ABDB21DFA0DC49FEB77BCEF88701F1041B6F909D6160EB7097898B65
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00A7C4EC
                          • GetFocus.USER32 ref: 00A7C4FC
                          • GetDlgCtrlID.USER32(00000000), ref: 00A7C507
                          • _memset.LIBCMT ref: 00A7C632
                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00A7C65D
                          • GetMenuItemCount.USER32(?), ref: 00A7C67D
                          • GetMenuItemID.USER32(?,00000000), ref: 00A7C690
                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00A7C6C4
                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00A7C70C
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A7C744
                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00A7C779
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                          • String ID: 0
                          • API String ID: 1296962147-4108050209
                          • Opcode ID: 86c1aa8e49c456fac31d59784303abf3d2d2eb63f3b8ac48ff19e10884fd08ca
                          • Instruction ID: 1bddbc13723e595bf5918facecf0278f5c520d89fcbf0c36cb40365d7f441f19
                          • Opcode Fuzzy Hash: 86c1aa8e49c456fac31d59784303abf3d2d2eb63f3b8ac48ff19e10884fd08ca
                          • Instruction Fuzzy Hash: 3E818D71208311AFD714CF24CD84AABBBE8FB88724F00C52DF99997291DB71D945CBA2
                          APIs
                            • Part of subcall function 00A4874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A48766
                            • Part of subcall function 00A4874A: GetLastError.KERNEL32(?,00A4822A,?,?,?), ref: 00A48770
                            • Part of subcall function 00A4874A: GetProcessHeap.KERNEL32(00000008,?,?,00A4822A,?,?,?), ref: 00A4877F
                            • Part of subcall function 00A4874A: HeapAlloc.KERNEL32(00000000,?,00A4822A,?,?,?), ref: 00A48786
                            • Part of subcall function 00A4874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A4879D
                            • Part of subcall function 00A487E7: GetProcessHeap.KERNEL32(00000008,00A48240,00000000,00000000,?,00A48240,?), ref: 00A487F3
                            • Part of subcall function 00A487E7: HeapAlloc.KERNEL32(00000000,?,00A48240,?), ref: 00A487FA
                            • Part of subcall function 00A487E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00A48240,?), ref: 00A4880B
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00A48458
                          • _memset.LIBCMT ref: 00A4846D
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00A4848C
                          • GetLengthSid.ADVAPI32(?), ref: 00A4849D
                          • GetAce.ADVAPI32(?,00000000,?), ref: 00A484DA
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00A484F6
                          • GetLengthSid.ADVAPI32(?), ref: 00A48513
                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00A48522
                          • HeapAlloc.KERNEL32(00000000), ref: 00A48529
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00A4854A
                          • CopySid.ADVAPI32(00000000), ref: 00A48551
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00A48582
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00A485A8
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00A485BC
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                          • String ID:
                          • API String ID: 3996160137-0
                          • Opcode ID: 2d12e19315d012f6e02ec806f5bc2721ddd85f981edf3a04da9ef91f1e227f80
                          • Instruction ID: 6dbcfcc514b5693be90580f7d4f78336528259c5beb8238384d2431d3911e0b3
                          • Opcode Fuzzy Hash: 2d12e19315d012f6e02ec806f5bc2721ddd85f981edf3a04da9ef91f1e227f80
                          • Instruction Fuzzy Hash: D0615975900219EFDF00DFA4EC44AEEBBB9FF44300F048129E815A7291EB349A46DF60
                          APIs
                          • GetDC.USER32(00000000), ref: 00A676A2
                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00A676AE
                          • CreateCompatibleDC.GDI32(?), ref: 00A676BA
                          • SelectObject.GDI32(00000000,?), ref: 00A676C7
                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00A6771B
                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00A67757
                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00A6777B
                          • SelectObject.GDI32(00000006,?), ref: 00A67783
                          • DeleteObject.GDI32(?), ref: 00A6778C
                          • DeleteDC.GDI32(00000006), ref: 00A67793
                          • ReleaseDC.USER32(00000000,?), ref: 00A6779E
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                          • String ID: (
                          • API String ID: 2598888154-3887548279
                          • Opcode ID: 85f29bb6efddd9f63fbb0ed5e6d1dadaf3c5ed887cd206280139d94602281c5f
                          • Instruction ID: 1be08edbeb3b319f39ade5fb94690f8c20fb6dc437e68a2625e73b5639445d8a
                          • Opcode Fuzzy Hash: 85f29bb6efddd9f63fbb0ed5e6d1dadaf3c5ed887cd206280139d94602281c5f
                          • Instruction Fuzzy Hash: 66512875904209EFCB15CFA8DC85EAEBBB9FF48710F14852DF95A97210D731A941CB60
                          APIs
                          • LoadStringW.USER32(00000066,?,00000FFF,00A7FB78), ref: 00A5A0FC
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                          • LoadStringW.USER32(?,?,00000FFF,?), ref: 00A5A11E
                          • __swprintf.LIBCMT ref: 00A5A177
                          • __swprintf.LIBCMT ref: 00A5A190
                          • _wprintf.LIBCMT ref: 00A5A246
                          • _wprintf.LIBCMT ref: 00A5A264
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: LoadString__swprintf_wprintf$_memmove
                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                          • API String ID: 311963372-2391861430
                          • Opcode ID: 95831378ad7f2adf8b65690044a744a65b528dd5368633f08edf12573d333cbe
                          • Instruction ID: 49aec3156a35249f1bfbcdf2ed9ab0b4cd708f7225089c3420d80b41ad8a7bde
                          • Opcode Fuzzy Hash: 95831378ad7f2adf8b65690044a744a65b528dd5368633f08edf12573d333cbe
                          • Instruction Fuzzy Hash: 0D516B7290020DBADF15EBE0CD86EFEB778BF54300F100665BA05621A2EB316F59CB61
                          APIs
                          • timeGetTime.WINMM ref: 00A5521C
                            • Part of subcall function 00A10719: timeGetTime.WINMM(?,753DB400,00A00FF9), ref: 00A1071D
                          • Sleep.KERNEL32(0000000A), ref: 00A55248
                          • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00A5526C
                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00A5528E
                          • SetActiveWindow.USER32 ref: 00A552AD
                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00A552BB
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00A552DA
                          • Sleep.KERNEL32(000000FA), ref: 00A552E5
                          • IsWindow.USER32 ref: 00A552F1
                          • EndDialog.USER32(00000000), ref: 00A55302
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                          • String ID: @U=u$BUTTON
                          • API String ID: 1194449130-2582809321
                          • Opcode ID: 36dcf67186bd19c94fdc72f934e8e57f55eb4c681fb3e33b063a54833bcfe291
                          • Instruction ID: 5af45b8e92985ab3fa8af51312d73420e95c15542f8af7165f79b7e2f43cb64d
                          • Opcode Fuzzy Hash: 36dcf67186bd19c94fdc72f934e8e57f55eb4c681fb3e33b063a54833bcfe291
                          • Instruction Fuzzy Hash: 4C21F970604704AFE710DBF0ED98B6E3B69F794357F044624F80A851B2DBB16D8AD721
                          APIs
                            • Part of subcall function 00A10B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,009F6C6C,?,00008000), ref: 00A10BB7
                            • Part of subcall function 009F48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F48A1,?,?,009F37C0,?), ref: 009F48CE
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 009F6D0D
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 009F6E5A
                            • Part of subcall function 009F59CD: _wcscpy.LIBCMT ref: 009F5A05
                            • Part of subcall function 00A1387D: _iswctype.LIBCMT ref: 00A13885
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                          • API String ID: 537147316-1018226102
                          • Opcode ID: e58f2f2d3e96918f2725b14ac43442e2068931df06b5e03d73ea4165f04e5461
                          • Instruction ID: aa418421d626ba222ba8b4a286cf0d7687bd9425980b6080cf4c7a7bc952086b
                          • Opcode Fuzzy Hash: e58f2f2d3e96918f2725b14ac43442e2068931df06b5e03d73ea4165f04e5461
                          • Instruction Fuzzy Hash: C602AC311083459FC724EF24C981AAFBBE5BFD9354F14492DF68A972A1DB30D989CB42
                          APIs
                          • _memset.LIBCMT ref: 009F45F9
                          • GetMenuItemCount.USER32(00AB6890), ref: 00A2D7CD
                          • GetMenuItemCount.USER32(00AB6890), ref: 00A2D87D
                          • GetCursorPos.USER32(?), ref: 00A2D8C1
                          • SetForegroundWindow.USER32(00000000), ref: 00A2D8CA
                          • TrackPopupMenuEx.USER32(00AB6890,00000000,?,00000000,00000000,00000000), ref: 00A2D8DD
                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00A2D8E9
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                          • String ID:
                          • API String ID: 2751501086-0
                          • Opcode ID: 63a9ab71291d58a4739eb266d4fd4d4b873b87c4e9abb9f8169098cf2568d2da
                          • Instruction ID: 76eeec61d89a888786b4f28520e046d026c0ef43246ca9349e96e1f5f62b4d73
                          • Opcode Fuzzy Hash: 63a9ab71291d58a4739eb266d4fd4d4b873b87c4e9abb9f8169098cf2568d2da
                          • Instruction Fuzzy Hash: 4D710770605219BFFB209F68EC85FAABF64FF05364F204226F618A61E2C7B55D50DB90
                          APIs
                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A70038,?,?), ref: 00A710BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                          • API String ID: 3964851224-909552448
                          • Opcode ID: c8d02b45b98398ae4fc6355404d41165222a27fc96591faaecc830f425663cd8
                          • Instruction ID: 0a76a7485c0f54285f9e8594af20aa7b1629127b117e1e25b4933b3f7c1ed24d
                          • Opcode Fuzzy Hash: c8d02b45b98398ae4fc6355404d41165222a27fc96591faaecc830f425663cd8
                          • Instruction Fuzzy Hash: 01416C3015024E8FCF10EF94ED91AEA3768BF52340F51C568FD955B292DB70AD9ACBA0
                          APIs
                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00A777CD
                          • CreateCompatibleDC.GDI32(00000000), ref: 00A777D4
                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00A777E7
                          • SelectObject.GDI32(00000000,00000000), ref: 00A777EF
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A777FA
                          • DeleteDC.GDI32(00000000), ref: 00A77803
                          • GetWindowLongW.USER32(?,000000EC), ref: 00A7780D
                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00A77821
                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00A7782D
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                          • String ID: @U=u$static
                          • API String ID: 2559357485-3553413495
                          • Opcode ID: 93bb569db1dac409eacfc783832dc66ca5f4ed28d1aabfdb2decc13644bcd270
                          • Instruction ID: 2a389bace53340a90b47c796cdd07596e9a4e504591d3b5e03a557c6a1a616d6
                          • Opcode Fuzzy Hash: 93bb569db1dac409eacfc783832dc66ca5f4ed28d1aabfdb2decc13644bcd270
                          • Instruction Fuzzy Hash: F0316C31105215AFDF119FA4DC08FDA3B69FF09321F118224FA19A61A0DB31D952DBA4
                          APIs
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                            • Part of subcall function 009F7A84: _memmove.LIBCMT ref: 009F7B0D
                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00A555D2
                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00A555E8
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00A555F9
                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00A5560B
                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00A5561C
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: SendString$_memmove
                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                          • API String ID: 2279737902-1007645807
                          • Opcode ID: 8ead91e9fbdf3cf963e42af0cb18ebce32a34a555d85532d0e4a02438c26711b
                          • Instruction ID: 39bffb8be916e50147ef1ef627fae6374db0ee8179b553470bc7938d576811d8
                          • Opcode Fuzzy Hash: 8ead91e9fbdf3cf963e42af0cb18ebce32a34a555d85532d0e4a02438c26711b
                          • Instruction Fuzzy Hash: D311903095016D79DB20A7B1CC5AEBFBABCFFE2B00F440869B901A70D1EB604D09C6B1
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                          • String ID: 0.0.0.0
                          • API String ID: 208665112-3771769585
                          • Opcode ID: 595ac3705149aff471298eaf3c3b95387d87c613a0e36b6c346c72ce511c1036
                          • Instruction ID: 845ac65fdd4f0043dcc0ed5a8f04319607e0c00f228aa3ac3e697cbfea5a81f7
                          • Opcode Fuzzy Hash: 595ac3705149aff471298eaf3c3b95387d87c613a0e36b6c346c72ce511c1036
                          • Instruction Fuzzy Hash: 0B11D532908114EFCB24EB64ED06EDB77BCEF05715F044175F94996091EF709AC687A1
                          APIs
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          • CoInitialize.OLE32(00000000), ref: 00A5D855
                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00A5D8E8
                          • SHGetDesktopFolder.SHELL32(?), ref: 00A5D8FC
                          • CoCreateInstance.OLE32(00A82D7C,00000000,00000001,00AAA89C,?), ref: 00A5D948
                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00A5D9B7
                          • CoTaskMemFree.OLE32(?,?), ref: 00A5DA0F
                          • _memset.LIBCMT ref: 00A5DA4C
                          • SHBrowseForFolderW.SHELL32(?), ref: 00A5DA88
                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00A5DAAB
                          • CoTaskMemFree.OLE32(00000000), ref: 00A5DAB2
                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00A5DAE9
                          • CoUninitialize.OLE32(00000001,00000000), ref: 00A5DAEB
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                          • String ID:
                          • API String ID: 1246142700-0
                          • Opcode ID: 45208f6875ca1c43f1f350e6daef2ade9bca74277e787328afe701baf765453f
                          • Instruction ID: 3157ca7d88748f12193334ffac435b4b86bf47bd8ada666cf892d85b93e43b54
                          • Opcode Fuzzy Hash: 45208f6875ca1c43f1f350e6daef2ade9bca74277e787328afe701baf765453f
                          • Instruction Fuzzy Hash: 23B1FE75A00109AFDB14DFA4C884EAEBBF9FF89305B148469F909EB251DB30EE45CB51
                          APIs
                          • GetKeyboardState.USER32(?), ref: 00A505A7
                          • SetKeyboardState.USER32(?), ref: 00A50612
                          • GetAsyncKeyState.USER32(000000A0), ref: 00A50632
                          • GetKeyState.USER32(000000A0), ref: 00A50649
                          • GetAsyncKeyState.USER32(000000A1), ref: 00A50678
                          • GetKeyState.USER32(000000A1), ref: 00A50689
                          • GetAsyncKeyState.USER32(00000011), ref: 00A506B5
                          • GetKeyState.USER32(00000011), ref: 00A506C3
                          • GetAsyncKeyState.USER32(00000012), ref: 00A506EC
                          • GetKeyState.USER32(00000012), ref: 00A506FA
                          • GetAsyncKeyState.USER32(0000005B), ref: 00A50723
                          • GetKeyState.USER32(0000005B), ref: 00A50731
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: ff0179ff70fa27a7bfac5a89e69685bdc7ed41c8c8f69552d266b6396c2c40f0
                          • Instruction ID: af981e46962a35c235767d8a85b35216d58797885f3546a0a19e16f9f0a1848d
                          • Opcode Fuzzy Hash: ff0179ff70fa27a7bfac5a89e69685bdc7ed41c8c8f69552d266b6396c2c40f0
                          • Instruction Fuzzy Hash: 2951DB60A0478429FB35DBB08954FEABFB4BF11381F08859DDDC2565C2EAB49B8CCB51
                          APIs
                          • GetDlgItem.USER32(?,00000001), ref: 00A4C746
                          • GetWindowRect.USER32(00000000,?), ref: 00A4C758
                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00A4C7B6
                          • GetDlgItem.USER32(?,00000002), ref: 00A4C7C1
                          • GetWindowRect.USER32(00000000,?), ref: 00A4C7D3
                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00A4C827
                          • GetDlgItem.USER32(?,000003E9), ref: 00A4C835
                          • GetWindowRect.USER32(00000000,?), ref: 00A4C846
                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00A4C889
                          • GetDlgItem.USER32(?,000003EA), ref: 00A4C897
                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00A4C8B4
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00A4C8C1
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$ItemMoveRect$Invalidate
                          • String ID:
                          • API String ID: 3096461208-0
                          • Opcode ID: 29f3b4a8c360b0930c9b03129627730414d05ba158e894051bc695219a6db5b3
                          • Instruction ID: 23d8b90c9ca594a9dd81c8047a0ba42d85cf6b62493a21f40c8e25a612176591
                          • Opcode Fuzzy Hash: 29f3b4a8c360b0930c9b03129627730414d05ba158e894051bc695219a6db5b3
                          • Instruction Fuzzy Hash: 58514E75B00205AFDB18CFA9DD89AAEBBBAFB88711F14812DF519D7290D7709E418B10
                          APIs
                            • Part of subcall function 009F1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,009F2036,?,00000000,?,?,?,?,009F16CB,00000000,?), ref: 009F1B9A
                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 009F20D3
                          • KillTimer.USER32(-00000001,?,?,?,?,009F16CB,00000000,?,?,009F1AE2,?,?), ref: 009F216E
                          • DestroyAcceleratorTable.USER32(00000000), ref: 00A2BEF6
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009F16CB,00000000,?,?,009F1AE2,?,?), ref: 00A2BF27
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009F16CB,00000000,?,?,009F1AE2,?,?), ref: 00A2BF3E
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,009F16CB,00000000,?,?,009F1AE2,?,?), ref: 00A2BF5A
                          • DeleteObject.GDI32(00000000), ref: 00A2BF6C
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                          • String ID:
                          • API String ID: 641708696-0
                          • Opcode ID: 7a36dc3d9d34a91da4994133a01d29bd72de555be5ffc7239a0f9fd9b4bebf85
                          • Instruction ID: 59b50f254fab6001511f8d82bf05549239c55e490f4729767acc5191c24121e5
                          • Opcode Fuzzy Hash: 7a36dc3d9d34a91da4994133a01d29bd72de555be5ffc7239a0f9fd9b4bebf85
                          • Instruction Fuzzy Hash: 8461AB32214614DFCB25DF98DE48B39B7F1FF44312F148928E64686A71CB79A892DF90
                          APIs
                            • Part of subcall function 009F25DB: GetWindowLongW.USER32(?,000000EB), ref: 009F25EC
                          • GetSysColor.USER32(0000000F), ref: 009F21D3
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ColorLongWindow
                          • String ID:
                          • API String ID: 259745315-0
                          • Opcode ID: aa256696db754a44d6f584d049de15758605b0eb97e6773073e4c5c98a40d034
                          • Instruction ID: 0ab6ef5e0256002635875bceae4ec846edfe578d1e16b409b59b312c0fb10f66
                          • Opcode Fuzzy Hash: aa256696db754a44d6f584d049de15758605b0eb97e6773073e4c5c98a40d034
                          • Instruction Fuzzy Hash: 5341A3311041549FDB299F68EC88BF93B65EB06331F548365FE758A1E2C7318D82DB61
                          APIs
                          • CharLowerBuffW.USER32(?,?,00A7F910), ref: 00A5AB76
                          • GetDriveTypeW.KERNEL32(00000061,00AAA620,00000061), ref: 00A5AC40
                          • _wcscpy.LIBCMT ref: 00A5AC6A
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharDriveLowerType_wcscpy
                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                          • API String ID: 2820617543-1000479233
                          • Opcode ID: 9af802e01758ccba6a73b77fe26eeb463403b66b76be60dc877c2c12ca8ef489
                          • Instruction ID: 72c6de6dfde2b6277f18794db57a398f519dcd4bcda38bbce92b1b490c54db77
                          • Opcode Fuzzy Hash: 9af802e01758ccba6a73b77fe26eeb463403b66b76be60dc877c2c12ca8ef489
                          • Instruction Fuzzy Hash: D4519A312083059FC710EF54D981BAAB7E5FFA1301F148929F986972A2DB319D49CB93
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00A7896E
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID: @U=u
                          • API String ID: 634782764-2594219639
                          • Opcode ID: d6e31cd6d85382301ae0b61d490ccb4f668f29c6fb5f8374c69fe8babc01abf1
                          • Instruction ID: 7ed83c947c8716a4f6be67dfe156511c5394fc96e45c5f1575f611c8d2ac72c8
                          • Opcode Fuzzy Hash: d6e31cd6d85382301ae0b61d490ccb4f668f29c6fb5f8374c69fe8babc01abf1
                          • Instruction Fuzzy Hash: 0A518930580248BFDF24DF68CC8DBA97BA5BB05390F60C126F51DE61A1DF79A980D751
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00A2C547
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00A2C569
                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00A2C581
                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00A2C59F
                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00A2C5C0
                          • DestroyIcon.USER32(00000000), ref: 00A2C5CF
                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00A2C5EC
                          • DestroyIcon.USER32(?), ref: 00A2C5FB
                            • Part of subcall function 00A7A71E: DeleteObject.GDI32(00000000), ref: 00A7A757
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                          • String ID: @U=u
                          • API String ID: 2819616528-2594219639
                          • Opcode ID: c459301f374b318155225c3c3e405ed021ffc31985923be3309bb497e07e4522
                          • Instruction ID: 8329010691b38bf4711dbae5322c326d55e28c66632852a2b5fb408203f810c1
                          • Opcode Fuzzy Hash: c459301f374b318155225c3c3e405ed021ffc31985923be3309bb497e07e4522
                          • Instruction Fuzzy Hash: F5516870A40209AFDB24DF68DC45FBA37B9FB58721F104528FA06A72A0DB74ED91DB50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __i64tow__itow__swprintf
                          • String ID: %.15g$0x%p$False$True
                          • API String ID: 421087845-2263619337
                          • Opcode ID: f4c7a5919a2c865b3c8bc05a5e6572515f1511cca75f900f0ed19ce300c71e99
                          • Instruction ID: a4dc2ba0e33e68712d23795a2ff4a4bd288f9a4f5fe7588d3bb4dc69d888dd1b
                          • Opcode Fuzzy Hash: f4c7a5919a2c865b3c8bc05a5e6572515f1511cca75f900f0ed19ce300c71e99
                          • Instruction Fuzzy Hash: D741C372504219AFDB24AF38E942F76B7F8EB49300F20487EE649D7291EA719981CB11
                          APIs
                          • _memset.LIBCMT ref: 00A773D9
                          • CreateMenu.USER32 ref: 00A773F4
                          • SetMenu.USER32(?,00000000), ref: 00A77403
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A77490
                          • IsMenu.USER32(?), ref: 00A774A6
                          • CreatePopupMenu.USER32 ref: 00A774B0
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A774DD
                          • DrawMenuBar.USER32 ref: 00A774E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                          • String ID: 0$F
                          • API String ID: 176399719-3044882817
                          • Opcode ID: c0fd4ef53d77d87426c47f11d87a3bcb1ee7f678b9b3089377a3edfce398ab89
                          • Instruction ID: 5c1e6eb36b425a0cf2447cefe4d809755e255245496091f06320dafc6f0e78e8
                          • Opcode Fuzzy Hash: c0fd4ef53d77d87426c47f11d87a3bcb1ee7f678b9b3089377a3edfce398ab89
                          • Instruction Fuzzy Hash: 04412575A01209EFDB20DFA4DC84E9ABBF9FF49310F148029E95997360DB31AA10CB60
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A4B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B0E7
                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00A494F6
                          • GetDlgCtrlID.USER32 ref: 00A49501
                          • GetParent.USER32 ref: 00A4951D
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A49520
                          • GetDlgCtrlID.USER32(?), ref: 00A49529
                          • GetParent.USER32(?), ref: 00A49545
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A49548
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: @U=u$ComboBox$ListBox
                          • API String ID: 1536045017-2258501812
                          • Opcode ID: 47846126f9e79c17ce23176c35cb83438b5f9239975d99f8bc7b0a58f47a2d42
                          • Instruction ID: 8027318b83d54dae8401fe8810ff9d53d5f6a126dfd80cb39dd74fa7c9b027bb
                          • Opcode Fuzzy Hash: 47846126f9e79c17ce23176c35cb83438b5f9239975d99f8bc7b0a58f47a2d42
                          • Instruction Fuzzy Hash: B021A174A00108BFDF05ABA4CC85ABEBB74EF85310F104115B661972A1DB7599699B20
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A4B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B0E7
                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00A495DF
                          • GetDlgCtrlID.USER32 ref: 00A495EA
                          • GetParent.USER32 ref: 00A49606
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00A49609
                          • GetDlgCtrlID.USER32(?), ref: 00A49612
                          • GetParent.USER32(?), ref: 00A4962E
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 00A49631
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: @U=u$ComboBox$ListBox
                          • API String ID: 1536045017-2258501812
                          • Opcode ID: 6fb91bb2c04e051fa8b8283cce2ca61c8d2eb346c4d5c27a301912c73c654208
                          • Instruction ID: de284dbee0355a45ce4fbc9ebbfbc0f68c4875ff7800af349283f7d36d2d3cbd
                          • Opcode Fuzzy Hash: 6fb91bb2c04e051fa8b8283cce2ca61c8d2eb346c4d5c27a301912c73c654208
                          • Instruction Fuzzy Hash: 3C21B374E00248BFDF05EBA4CC85EFFBB78EF89300F104115BA11971A1DB7599699B20
                          APIs
                          • GetParent.USER32 ref: 00A49651
                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00A49666
                          • _wcscmp.LIBCMT ref: 00A49678
                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00A496F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClassMessageNameParentSend_wcscmp
                          • String ID: @U=u$SHELLDLL_DefView$details$largeicons$list$smallicons
                          • API String ID: 1704125052-1428604138
                          • Opcode ID: f1bcc682520abf1780883e659d04a109acc129b71458214ce3d0ea53e7bab809
                          • Instruction ID: e575a642e8c2f2dab7aa9704444378871045c3adb34ab0130dc42e3a5d9f8fec
                          • Opcode Fuzzy Hash: f1bcc682520abf1780883e659d04a109acc129b71458214ce3d0ea53e7bab809
                          • Instruction Fuzzy Hash: 1111297B648317BAFE052B20DC0BDE7B79CAB46770F200166F904A50D1FFA16AA15A58
                          APIs
                          • _memset.LIBCMT ref: 00A1707B
                            • Part of subcall function 00A18D68: __getptd_noexit.LIBCMT ref: 00A18D68
                          • __gmtime64_s.LIBCMT ref: 00A17114
                          • __gmtime64_s.LIBCMT ref: 00A1714A
                          • __gmtime64_s.LIBCMT ref: 00A17167
                          • __allrem.LIBCMT ref: 00A171BD
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A171D9
                          • __allrem.LIBCMT ref: 00A171F0
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A1720E
                          • __allrem.LIBCMT ref: 00A17225
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00A17243
                          • __invoke_watson.LIBCMT ref: 00A172B4
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                          • String ID:
                          • API String ID: 384356119-0
                          • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                          • Instruction ID: be6910453f81dd0d312df0d409d4eefc41cb065fb00365c2bb9fc0d6abfa76fd
                          • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                          • Instruction Fuzzy Hash: 7171F772A04716ABDB149F7DDD41BDEB3B8AF15320F14523AF814D7281E774D9808B90
                          APIs
                          • _memset.LIBCMT ref: 00A52A31
                          • GetMenuItemInfoW.USER32(00AB6890,000000FF,00000000,00000030), ref: 00A52A92
                          • SetMenuItemInfoW.USER32(00AB6890,00000004,00000000,00000030), ref: 00A52AC8
                          • Sleep.KERNEL32(000001F4), ref: 00A52ADA
                          • GetMenuItemCount.USER32(?), ref: 00A52B1E
                          • GetMenuItemID.USER32(?,00000000), ref: 00A52B3A
                          • GetMenuItemID.USER32(?,-00000001), ref: 00A52B64
                          • GetMenuItemID.USER32(?,?), ref: 00A52BA9
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00A52BEF
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A52C03
                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A52C24
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                          • String ID:
                          • API String ID: 4176008265-0
                          • Opcode ID: e31f025f4faa5f36935fdfad375da0b7d920d3a49d7bd24a2e351d616187096b
                          • Instruction ID: eb62f056a2ca604b9b0bd9928b2fdeca5cf0b0eefa35229cfe230014b343a261
                          • Opcode Fuzzy Hash: e31f025f4faa5f36935fdfad375da0b7d920d3a49d7bd24a2e351d616187096b
                          • Instruction Fuzzy Hash: 8C619FB1900249AFDB21CFA4DD88FBE7BB8FB42346F144559EC4197252D731AE4ADB20
                          APIs
                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A77214
                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00A77217
                          • GetWindowLongW.USER32(?,000000F0), ref: 00A7723B
                          • _memset.LIBCMT ref: 00A7724C
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A7725E
                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00A772D6
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow_memset
                          • String ID:
                          • API String ID: 830647256-0
                          • Opcode ID: 259395bf8e36f37f7dcc9117c3ddff577876a61a63a45e9857084fb7035919bc
                          • Instruction ID: 3bc5185a2ff1a713839da7295af531e965f8e8daf91e9daf7b98b3da93c83327
                          • Opcode Fuzzy Hash: 259395bf8e36f37f7dcc9117c3ddff577876a61a63a45e9857084fb7035919bc
                          • Instruction Fuzzy Hash: B6617F71900208AFDB11DFA4CD81EEE77F8EB09710F148159FA19AB2A2D774AD45DBA0
                          APIs
                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00A47135
                          • SafeArrayAllocData.OLEAUT32(?), ref: 00A4718E
                          • VariantInit.OLEAUT32(?), ref: 00A471A0
                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00A471C0
                          • VariantCopy.OLEAUT32(?,?), ref: 00A47213
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00A47227
                          • VariantClear.OLEAUT32(?), ref: 00A4723C
                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00A47249
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A47252
                          • VariantClear.OLEAUT32(?), ref: 00A47264
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00A4726F
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                          • String ID:
                          • API String ID: 2706829360-0
                          • Opcode ID: 862ae54db243efabd07c99a09d6c23f728d91d253e7c5fb743724f4988eee459
                          • Instruction ID: 08f1587bd9bf525be765dbb1abd0dc27d384d7387e82ff82c78a8c29cbed87b3
                          • Opcode Fuzzy Hash: 862ae54db243efabd07c99a09d6c23f728d91d253e7c5fb743724f4988eee459
                          • Instruction Fuzzy Hash: 63414075904119AFCF10DFA8DC449EEBBB9FF48354F008069F915A7261CB70AA46CB90
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • GetSystemMetrics.USER32(0000000F), ref: 00A7D78A
                          • GetSystemMetrics.USER32(0000000F), ref: 00A7D7AA
                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00A7D9E5
                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00A7DA03
                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00A7DA24
                          • ShowWindow.USER32(00000003,00000000), ref: 00A7DA43
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00A7DA68
                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 00A7DA8B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                          • String ID: @U=u
                          • API String ID: 1211466189-2594219639
                          • Opcode ID: 100d7ef6188ee205d4dbdba1d6f9fef0dca406184043029690f264738dd6d9f1
                          • Instruction ID: 64b35199a2312d2e21b3cf8196cbe263223ec315063cbc03996ad8248eab5fa6
                          • Opcode Fuzzy Hash: 100d7ef6188ee205d4dbdba1d6f9fef0dca406184043029690f264738dd6d9f1
                          • Instruction Fuzzy Hash: E0B17971600225EFDF18CF68C985BBD7BB1BF44711F08C169ED889B695D734AA90CB60
                          APIs
                          • SetWindowLongW.USER32(?,000000EB), ref: 009F2EAE
                            • Part of subcall function 009F1DB3: GetClientRect.USER32(?,?), ref: 009F1DDC
                            • Part of subcall function 009F1DB3: GetWindowRect.USER32(?,?), ref: 009F1E1D
                            • Part of subcall function 009F1DB3: ScreenToClient.USER32(?,?), ref: 009F1E45
                          • GetDC.USER32 ref: 00A2CF82
                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00A2CF95
                          • SelectObject.GDI32(00000000,00000000), ref: 00A2CFA3
                          • SelectObject.GDI32(00000000,00000000), ref: 00A2CFB8
                          • ReleaseDC.USER32(?,00000000), ref: 00A2CFC0
                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00A2D04B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                          • String ID: @U=u$U
                          • API String ID: 4009187628-4110099822
                          • Opcode ID: 8490cd6664975a8964c25d943807cf2964d0a2ab1f3f5a4c03e94d55423ffba4
                          • Instruction ID: 5f5e6f7a17620d132394b90b969777c5b39be7d92552c6154d68cf3f3471f326
                          • Opcode Fuzzy Hash: 8490cd6664975a8964c25d943807cf2964d0a2ab1f3f5a4c03e94d55423ffba4
                          • Instruction Fuzzy Hash: 7171C531504209DFCF21CF68DD84ABA7BB5FF48360F248279EE565A1A6C7358C82DB60
                          APIs
                          • WSAStartup.WSOCK32(00000101,?), ref: 00A65AA6
                          • inet_addr.WSOCK32(?,?,?), ref: 00A65AEB
                          • gethostbyname.WSOCK32(?), ref: 00A65AF7
                          • IcmpCreateFile.IPHLPAPI ref: 00A65B05
                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00A65B75
                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00A65B8B
                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00A65C00
                          • WSACleanup.WSOCK32 ref: 00A65C06
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                          • String ID: Ping
                          • API String ID: 1028309954-2246546115
                          • Opcode ID: b008e3b55141f5ac063c713be3c30170fb91ceb918391cb2e18521da87e79501
                          • Instruction ID: 3bbea6a7c792e75d4983f4c8e8c16281df8d01e5c58197125303c06cc9080f86
                          • Opcode Fuzzy Hash: b008e3b55141f5ac063c713be3c30170fb91ceb918391cb2e18521da87e79501
                          • Instruction Fuzzy Hash: 7F516D31A047019FD720DF64CC49B2ABBF4EF89750F148929F65ADB2A1EB70E941CB52
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                            • Part of subcall function 009F2344: GetCursorPos.USER32(?), ref: 009F2357
                            • Part of subcall function 009F2344: ScreenToClient.USER32(00AB67B0,?), ref: 009F2374
                            • Part of subcall function 009F2344: GetAsyncKeyState.USER32(00000001), ref: 009F2399
                            • Part of subcall function 009F2344: GetAsyncKeyState.USER32(00000002), ref: 009F23A7
                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00A7C2E4
                          • ImageList_EndDrag.COMCTL32 ref: 00A7C2EA
                          • ReleaseCapture.USER32 ref: 00A7C2F0
                          • SetWindowTextW.USER32(?,00000000), ref: 00A7C39A
                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00A7C3AD
                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00A7C48F
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                          • String ID: @GUI_DRAGFILE$@GUI_DROPID$@U=u
                          • API String ID: 1924731296-2104563098
                          • Opcode ID: a0b1cbc289facde140bd027063b5d9a7af7a2aebee18b7aec7a642fe46fda51e
                          • Instruction ID: 033c6ff55e30f8877e6c206b953cb43b5796ac494c029533c48e606c885e422b
                          • Opcode Fuzzy Hash: a0b1cbc289facde140bd027063b5d9a7af7a2aebee18b7aec7a642fe46fda51e
                          • Instruction Fuzzy Hash: A4519C70204304AFD704EF64CC95FAA7BE5FB88314F00852DF6998B2E2DB75A955CB52
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00A5B73B
                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00A5B7B1
                          • GetLastError.KERNEL32 ref: 00A5B7BB
                          • SetErrorMode.KERNEL32(00000000,READY), ref: 00A5B828
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Error$Mode$DiskFreeLastSpace
                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                          • API String ID: 4194297153-14809454
                          • Opcode ID: 123d3296720c39426c65269dddb2878154c3a450d9b2ebdd624181e0ef84dac0
                          • Instruction ID: 7b146be4e14e0629b130fc86465b29945b62989c93c53c5cdb5a885f93ac30dc
                          • Opcode Fuzzy Hash: 123d3296720c39426c65269dddb2878154c3a450d9b2ebdd624181e0ef84dac0
                          • Instruction Fuzzy Hash: EB31B735A01209AFDB00EFA4CC85BBE77B4FF99702F108029F905D7292DB719A46C761
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 00A7645A
                          • GetDC.USER32(00000000), ref: 00A76462
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00A7646D
                          • ReleaseDC.USER32(00000000,00000000), ref: 00A76479
                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00A764B5
                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00A764C6
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00A79299,?,?,000000FF,00000000,?,000000FF,?), ref: 00A76500
                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00A76520
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                          • String ID: @U=u
                          • API String ID: 3864802216-2594219639
                          • Opcode ID: 6d5a672925b366dec951a015a05530aa57dcb86060c34253c90e145c773b0d70
                          • Instruction ID: 4ac3ac3d7d25d905657f73e60b1bc35929b57afccf175374df0019a00697fe4d
                          • Opcode Fuzzy Hash: 6d5a672925b366dec951a015a05530aa57dcb86060c34253c90e145c773b0d70
                          • Instruction Fuzzy Hash: E1316D72201614BFEB118F50CC4AFEA3FA9EF09761F048065FE0C9A291D6759D82CB64
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00A68BEC
                          • CoInitialize.OLE32(00000000), ref: 00A68C19
                          • CoUninitialize.OLE32 ref: 00A68C23
                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00A68D23
                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00A68E50
                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00A82C0C), ref: 00A68E84
                          • CoGetObject.OLE32(?,00000000,00A82C0C,?), ref: 00A68EA7
                          • SetErrorMode.KERNEL32(00000000), ref: 00A68EBA
                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00A68F3A
                          • VariantClear.OLEAUT32(?), ref: 00A68F4A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                          • String ID:
                          • API String ID: 2395222682-0
                          • Opcode ID: c0094cc70ac94c940b63f2edfdfe8c6a242db36da9cb497b5d966e230f3e8244
                          • Instruction ID: ff22056e5a678c1a620a9eecca385ca572cb77fbaba2be0b4bca3777aaa0a29f
                          • Opcode Fuzzy Hash: c0094cc70ac94c940b63f2edfdfe8c6a242db36da9cb497b5d966e230f3e8244
                          • Instruction Fuzzy Hash: 3DC124B1608305AFC700DF68C884A2BB7F9BF89748F004A6DF5899B251DB75ED45CB62
                          APIs
                          • __swprintf.LIBCMT ref: 00A5419D
                          • __swprintf.LIBCMT ref: 00A541AA
                            • Part of subcall function 00A138D8: __woutput_l.LIBCMT ref: 00A13931
                          • FindResourceW.KERNEL32(?,?,0000000E), ref: 00A541D4
                          • LoadResource.KERNEL32(?,00000000), ref: 00A541E0
                          • LockResource.KERNEL32(00000000), ref: 00A541ED
                          • FindResourceW.KERNEL32(?,?,00000003), ref: 00A5420D
                          • LoadResource.KERNEL32(?,00000000), ref: 00A5421F
                          • SizeofResource.KERNEL32(?,00000000), ref: 00A5422E
                          • LockResource.KERNEL32(?), ref: 00A5423A
                          • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00A5429B
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                          • String ID:
                          • API String ID: 1433390588-0
                          • Opcode ID: f5bdee4c8f4f3589af577b1d862c11b35cd06cf5f0e4d5d8cfa11c6a31de9734
                          • Instruction ID: 739614d91f36d63e1395091b0eee7998f65e687ef9ae2d23543c5b6c8a893750
                          • Opcode Fuzzy Hash: f5bdee4c8f4f3589af577b1d862c11b35cd06cf5f0e4d5d8cfa11c6a31de9734
                          • Instruction Fuzzy Hash: F1315CB160521AAFDB11DFA1DD48AFE7BACFF08306F008625FD05D2151E770DA968AA0
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00A51700
                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00A50778,?,00000001), ref: 00A51714
                          • GetWindowThreadProcessId.USER32(00000000), ref: 00A5171B
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A50778,?,00000001), ref: 00A5172A
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A5173C
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A50778,?,00000001), ref: 00A51755
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00A50778,?,00000001), ref: 00A51767
                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00A50778,?,00000001), ref: 00A517AC
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A50778,?,00000001), ref: 00A517C1
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00A50778,?,00000001), ref: 00A517CC
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                          • String ID:
                          • API String ID: 2156557900-0
                          • Opcode ID: 1c5ea308943b9b80552da5b696e681d126fbce002797203f3c86476c664dc3a0
                          • Instruction ID: be58af39c6298ec200a44e39b6c18c9ea95bb5316ff16aa5a3d593797e058711
                          • Opcode Fuzzy Hash: 1c5ea308943b9b80552da5b696e681d126fbce002797203f3c86476c664dc3a0
                          • Instruction Fuzzy Hash: E031CC71604204AFEB11DFA8DC88F793BE9FB89716F108124FC04962A1D7B49E86CF64
                          APIs
                          • EnumChildWindows.USER32(?,00A4AA64), ref: 00A4A9A2
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ChildEnumWindows
                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                          • API String ID: 3555792229-1603158881
                          • Opcode ID: 74204587a3f422a4b88756338a4b8949b25e23b91b8c37e2e20ac4b929b0c942
                          • Instruction ID: a29f0766c589407aab46c614ae2e023466b021de70e7f5648f6a47b02d131887
                          • Opcode Fuzzy Hash: 74204587a3f422a4b88756338a4b8949b25e23b91b8c37e2e20ac4b929b0c942
                          • Instruction Fuzzy Hash: D691C674A4060AEBDF58DF70C581BEAFB74FF54304F108119E99AA7182DF306A99CB91
                          APIs
                          • IsWindow.USER32(013A57A0), ref: 00A7B6A5
                          • IsWindowEnabled.USER32(013A57A0), ref: 00A7B6B1
                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00A7B795
                          • SendMessageW.USER32(013A57A0,000000B0,?,?), ref: 00A7B7CC
                          • IsDlgButtonChecked.USER32(?,?), ref: 00A7B809
                          • GetWindowLongW.USER32(013A57A0,000000EC), ref: 00A7B82B
                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00A7B843
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                          • String ID: @U=u
                          • API String ID: 4072528602-2594219639
                          • Opcode ID: 22149e21177123cf8d80ced32aa42e319661e3babb348d8a72765d3fab47bc37
                          • Instruction ID: 6c31ad42371b8ad0d4980efd3c06982e9d6d077e8a3f0cbfcb57c3a674ae28d6
                          • Opcode Fuzzy Hash: 22149e21177123cf8d80ced32aa42e319661e3babb348d8a72765d3fab47bc37
                          • Instruction Fuzzy Hash: A2716CB4611204AFDB24DFA4CCE4FAA7BB9FF49300F14C469FA59972A1C731A951CB60
                          APIs
                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00A77093
                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00A770A7
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00A770C1
                          • _wcscat.LIBCMT ref: 00A7711C
                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00A77133
                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00A77161
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$Window_wcscat
                          • String ID: @U=u$SysListView32
                          • API String ID: 307300125-1908207174
                          • Opcode ID: 82f1958d9a91ad178b0fa07b1568569f911b5af266815adfbed30df217f5a6dc
                          • Instruction ID: 630bdd8ec2cfa6dfb55dd2365beb904cc6dc92f7b35375d693c5fbe6fabd334d
                          • Opcode Fuzzy Hash: 82f1958d9a91ad178b0fa07b1568569f911b5af266815adfbed30df217f5a6dc
                          • Instruction Fuzzy Hash: C8419371A04308AFDB21DFA4CC85BEE77B8EF08750F10856AF548E7192D7719D858B60
                          APIs
                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00A7655B
                          • GetWindowLongW.USER32(013A57A0,000000F0), ref: 00A7658E
                          • GetWindowLongW.USER32(013A57A0,000000F0), ref: 00A765C3
                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00A765F5
                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00A7661F
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 00A76630
                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00A7664A
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend
                          • String ID: @U=u
                          • API String ID: 2178440468-2594219639
                          • Opcode ID: 09bee54c798e98713c94d546319f0b109bdea67095e6ba8fc9e31b9392d34bc1
                          • Instruction ID: 29c162cfe613ae5e7d010579f21f00f8fb70b91a4dde0cf44a7ccaaea36e607e
                          • Opcode Fuzzy Hash: 09bee54c798e98713c94d546319f0b109bdea67095e6ba8fc9e31b9392d34bc1
                          • Instruction Fuzzy Hash: F4313531604650AFDB21CFA8DC84F553BE1FB4A710F1882A8F5098B2B6CB71EC81EB51
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00A7F910), ref: 00A6903D
                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00A7F910), ref: 00A69071
                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00A691EB
                          • SysFreeString.OLEAUT32(?), ref: 00A69215
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                          • String ID:
                          • API String ID: 560350794-0
                          • Opcode ID: 34468d9c07227b58f5c801625baf1fbf178dc9bb907e0e1d113a8fb3b0fbc3c2
                          • Instruction ID: fa47a1ae2ab636d3ea4dd16f9c649adeeed7e849ae07b2487918ec8022b4b2d2
                          • Opcode Fuzzy Hash: 34468d9c07227b58f5c801625baf1fbf178dc9bb907e0e1d113a8fb3b0fbc3c2
                          • Instruction Fuzzy Hash: CCF12B71A00209EFDF04DF94C888EAEB7B9FF89315F108559F915AB291DB31AE46CB50
                          APIs
                          • _memset.LIBCMT ref: 00A6F9C9
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FB5C
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FB80
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FBC0
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00A6FBE2
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A6FD5E
                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00A6FD90
                          • CloseHandle.KERNEL32(?), ref: 00A6FDBF
                          • CloseHandle.KERNEL32(?), ref: 00A6FE36
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                          • String ID:
                          • API String ID: 4090791747-0
                          • Opcode ID: 2e64e0472d55f3b85453696eae1733eeda3427760823165f49412acb60f9f778
                          • Instruction ID: 7afe66a68759cabcdffdec82ba5bd8badc6c957b8bbbc525a2d367b40938719f
                          • Opcode Fuzzy Hash: 2e64e0472d55f3b85453696eae1733eeda3427760823165f49412acb60f9f778
                          • Instruction Fuzzy Hash: 72E1BF31604201DFCB24EF24D981B6ABBF1AF85354F14896DF9999B2A2CB31EC45CB52
                          APIs
                            • Part of subcall function 00A548AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A538D3,?), ref: 00A548C7
                            • Part of subcall function 00A548AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A538D3,?), ref: 00A548E0
                            • Part of subcall function 00A54CD3: GetFileAttributesW.KERNEL32(?,00A53947), ref: 00A54CD4
                          • lstrcmpiW.KERNEL32(?,?), ref: 00A54FE2
                          • _wcscmp.LIBCMT ref: 00A54FFC
                          • MoveFileW.KERNEL32(?,?), ref: 00A55017
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                          • String ID:
                          • API String ID: 793581249-0
                          • Opcode ID: 67b8c2881f6c3c93c95e949c1627e8b9beddcfd43b2073bf1ffc902a32faa96f
                          • Instruction ID: cedf84df8710eda54c2eed3768a2d5f15961cd7d06b0a12fd2e3c644d28c08ca
                          • Opcode Fuzzy Hash: 67b8c2881f6c3c93c95e949c1627e8b9beddcfd43b2073bf1ffc902a32faa96f
                          • Instruction Fuzzy Hash: 1D5186B24087845BC720DBA0DC819DFB7ECAF85341F00492EB689C7191EF70E28C8766
                          APIs
                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00A48A84,00000B00,?,?), ref: 00A48E0C
                          • HeapAlloc.KERNEL32(00000000,?,00A48A84,00000B00,?,?), ref: 00A48E13
                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00A48A84,00000B00,?,?), ref: 00A48E28
                          • GetCurrentProcess.KERNEL32(?,00000000,?,00A48A84,00000B00,?,?), ref: 00A48E30
                          • DuplicateHandle.KERNEL32(00000000,?,00A48A84,00000B00,?,?), ref: 00A48E33
                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00A48A84,00000B00,?,?), ref: 00A48E43
                          • GetCurrentProcess.KERNEL32(00A48A84,00000000,?,00A48A84,00000B00,?,?), ref: 00A48E4B
                          • DuplicateHandle.KERNEL32(00000000,?,00A48A84,00000B00,?,?), ref: 00A48E4E
                          • CreateThread.KERNEL32(00000000,00000000,00A48E74,00000000,00000000,00000000), ref: 00A48E68
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                          • String ID:
                          • API String ID: 1957940570-0
                          • Opcode ID: 9186cd16aee9f886e7f90f683b2192717a6ff11036e4c41d380daec5d897b073
                          • Instruction ID: 61d13e9bc8dad612e37a72f5a8b2a267ea41fe3dd12379f4ef1ca9b94b9bbf4b
                          • Opcode Fuzzy Hash: 9186cd16aee9f886e7f90f683b2192717a6ff11036e4c41d380daec5d897b073
                          • Instruction Fuzzy Hash: B201A8B5240308FFE610EBA5DC49F6B3BACEB89711F408521FB09DB1A1CA7499418A60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$_memset
                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                          • API String ID: 2862541840-625585964
                          • Opcode ID: a7079d9245fc73b09052abd64d89e27ba5ebdf8846015c0185eb27dba54137d6
                          • Instruction ID: 84f8cd5ab9d2ab67c9f49a859974eaf6fa2462e3841fda60921b15857aa3d195
                          • Opcode Fuzzy Hash: a7079d9245fc73b09052abd64d89e27ba5ebdf8846015c0185eb27dba54137d6
                          • Instruction Fuzzy Hash: B5918A75A00219AFDF24DFA5C848FAFBBB8EF85710F108559F519AB280D7709945CFA0
                          APIs
                            • Part of subcall function 00A47652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?,?,?,00A4799D), ref: 00A4766F
                            • Part of subcall function 00A47652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?,?), ref: 00A4768A
                            • Part of subcall function 00A47652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?,?), ref: 00A47698
                            • Part of subcall function 00A47652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?), ref: 00A476A8
                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00A69B1B
                          • _memset.LIBCMT ref: 00A69B28
                          • _memset.LIBCMT ref: 00A69C6B
                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00A69C97
                          • CoTaskMemFree.OLE32(?), ref: 00A69CA2
                          Strings
                          • NULL Pointer assignment, xrefs: 00A69CF0
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                          • String ID: NULL Pointer assignment
                          • API String ID: 1300414916-2785691316
                          • Opcode ID: 20269a52f21cea50adbba9b2813ad713eda2ec5f3888322cb4adf4c92d6ac566
                          • Instruction ID: 64d8ebb7e9d52ccf6744750cb8a97189157881dea416760a8adf1686ed3d66ba
                          • Opcode Fuzzy Hash: 20269a52f21cea50adbba9b2813ad713eda2ec5f3888322cb4adf4c92d6ac566
                          • Instruction Fuzzy Hash: 4B911871D00219EFDB10DFA5DC81AEEBBB9AF48710F204169F519A7281DB719A45CFA0
                          APIs
                            • Part of subcall function 00A53E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00A53EB6
                            • Part of subcall function 00A53E91: Process32FirstW.KERNEL32(00000000,?), ref: 00A53EC4
                            • Part of subcall function 00A53E91: CloseHandle.KERNEL32(00000000), ref: 00A53F8E
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A6ECB8
                          • GetLastError.KERNEL32 ref: 00A6ECCB
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00A6ECFA
                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00A6ED77
                          • GetLastError.KERNEL32(00000000), ref: 00A6ED82
                          • CloseHandle.KERNEL32(00000000), ref: 00A6EDB7
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                          • String ID: SeDebugPrivilege
                          • API String ID: 2533919879-2896544425
                          • Opcode ID: 7b0ad36503b66e1f1844eff0a1fa9c5d3099457758a920c95b04b72110f73c36
                          • Instruction ID: 0be616c8367e0c306f77583313a298d85b1cc32a070dbeab6e897a761c99ba3e
                          • Opcode Fuzzy Hash: 7b0ad36503b66e1f1844eff0a1fa9c5d3099457758a920c95b04b72110f73c36
                          • Instruction Fuzzy Hash: 1241C8752002019FDB20EF24CD95F7EB7B1AF80714F088028F9469F2C2DBB5A945CB92
                          APIs
                          • ShowWindow.USER32(00AB67B0,00000000,013A57A0,?,?,00AB67B0,?,00A7B862,?,?), ref: 00A7B9CC
                          • EnableWindow.USER32(00000000,00000000), ref: 00A7B9F0
                          • ShowWindow.USER32(00AB67B0,00000000,013A57A0,?,?,00AB67B0,?,00A7B862,?,?), ref: 00A7BA50
                          • ShowWindow.USER32(00000000,00000004,?,00A7B862,?,?), ref: 00A7BA62
                          • EnableWindow.USER32(00000000,00000001), ref: 00A7BA86
                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00A7BAA9
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$Show$Enable$MessageSend
                          • String ID: @U=u
                          • API String ID: 642888154-2594219639
                          • Opcode ID: 0823d7d3f9259af7638ed13649d3aacf4be0b6630e839b7bf688d3e6b57ca5c5
                          • Instruction ID: 418211c7328dc876e653ac5f74daf36919430e299cd1127d5bb4d6364b8cbaf1
                          • Opcode Fuzzy Hash: 0823d7d3f9259af7638ed13649d3aacf4be0b6630e839b7bf688d3e6b57ca5c5
                          • Instruction Fuzzy Hash: 0E415E70610241AFDB26DF64CC89B957BE0FB05350F18C2B9EA5C8F2A2C731A846CB61
                          APIs
                          • LoadIconW.USER32(00000000,00007F03), ref: 00A532C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: IconLoad
                          • String ID: blank$info$question$stop$warning
                          • API String ID: 2457776203-404129466
                          • Opcode ID: 6a461ef7ab7676c2b5242b265a7d3c26ed1bfb6369473d36d882349612f874f1
                          • Instruction ID: 5333a46a51d1b0bb8787d53efdecffabe4718c6822463cea1bcc3e88c6964302
                          • Opcode Fuzzy Hash: 6a461ef7ab7676c2b5242b265a7d3c26ed1bfb6369473d36d882349612f874f1
                          • Instruction Fuzzy Hash: F411A4332087467A9F055B54DC42DEEB3ACFF693B1F10006AF900961C2E7755B8545A5
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00A5454E
                          • LoadStringW.USER32(00000000), ref: 00A54555
                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00A5456B
                          • LoadStringW.USER32(00000000), ref: 00A54572
                          • _wprintf.LIBCMT ref: 00A54598
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00A545B6
                          Strings
                          • %s (%d) : ==> %s: %s %s, xrefs: 00A54593
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString$Message_wprintf
                          • String ID: %s (%d) : ==> %s: %s %s
                          • API String ID: 3648134473-3128320259
                          • Opcode ID: cf7115e0f75a9af5f38e23ec5d0c6352fb17aa30e02d3b06205aa4a40ccb4b45
                          • Instruction ID: b30e030447abf7f96666995f01feb644a776f8399e7dec056417fc7547cc3e1f
                          • Opcode Fuzzy Hash: cf7115e0f75a9af5f38e23ec5d0c6352fb17aa30e02d3b06205aa4a40ccb4b45
                          • Instruction Fuzzy Hash: 73014FF2900208BFE750EBE09D89EE7776CE708301F4045A5BB49D2051EA749FC58B70
                          APIs
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A2C417,00000004,00000000,00000000,00000000), ref: 009F2ACF
                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00A2C417,00000004,00000000,00000000,00000000,000000FF), ref: 009F2B17
                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00A2C417,00000004,00000000,00000000,00000000), ref: 00A2C46A
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00A2C417,00000004,00000000,00000000,00000000), ref: 00A2C4D6
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ShowWindow
                          • String ID:
                          • API String ID: 1268545403-0
                          • Opcode ID: 111fbcfa5d5c378160831b54632f3aada05c4a0ebadd4270bdb481e3b1f677a2
                          • Instruction ID: 9e929fd3d5c04f2f0a37e1db08290c98075eccf8a0648cb0c1aabb423796086b
                          • Opcode Fuzzy Hash: 111fbcfa5d5c378160831b54632f3aada05c4a0ebadd4270bdb481e3b1f677a2
                          • Instruction Fuzzy Hash: 9A412C30208A889EC739DB7DDC9C77B7B96AB86310F14C82DE24B865E1C679D982D711
                          APIs
                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00A5737F
                            • Part of subcall function 00A10FF6: std::exception::exception.LIBCMT ref: 00A1102C
                            • Part of subcall function 00A10FF6: __CxxThrowException@8.LIBCMT ref: 00A11041
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00A573B6
                          • EnterCriticalSection.KERNEL32(?), ref: 00A573D2
                          • _memmove.LIBCMT ref: 00A57420
                          • _memmove.LIBCMT ref: 00A5743D
                          • LeaveCriticalSection.KERNEL32(?), ref: 00A5744C
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00A57461
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A57480
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                          • String ID:
                          • API String ID: 256516436-0
                          • Opcode ID: a0ea8af1788fd74039500a6fd969c01b6bf1b5507849f2890c2e3877cd38d472
                          • Instruction ID: f17d99578fd118d3c968e1b26c11912e283206b6df3a30f3c20210677b80071e
                          • Opcode Fuzzy Hash: a0ea8af1788fd74039500a6fd969c01b6bf1b5507849f2890c2e3877cd38d472
                          • Instruction Fuzzy Hash: 47316D72904205EFCB10DFA4DD85AAE7B78FF49710B1481B5FA04AB246DB709A95CBA0
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: 4f76ccc8bc92e0a24122f7f2dd62f929c77784bfe252bba182321a3720c2c341
                          • Instruction ID: c5f83fbd44b34f272cf02ae85deafb1df749e05062a6b05ed2a86f9dbe8a0a71
                          • Opcode Fuzzy Hash: 4f76ccc8bc92e0a24122f7f2dd62f929c77784bfe252bba182321a3720c2c341
                          • Instruction Fuzzy Hash: E221A779702205B7D694B6259E42FFB376CAFE03F4B044020FE0D96282F756DD1283A5
                          APIs
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                            • Part of subcall function 00A0FEC6: _wcscpy.LIBCMT ref: 00A0FEE9
                          • _wcstok.LIBCMT ref: 00A5EEFF
                          • _wcscpy.LIBCMT ref: 00A5EF8E
                          • _memset.LIBCMT ref: 00A5EFC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                          • String ID: X
                          • API String ID: 774024439-3081909835
                          • Opcode ID: 0511a023f08289c5e060748c5cab4ad71a978f6b45f943f5e837405c96f713f8
                          • Instruction ID: 6c0a75c604dc8ec2fde84b624374c7f9a95e3953c06d97e774f4c45ed8701151
                          • Opcode Fuzzy Hash: 0511a023f08289c5e060748c5cab4ad71a978f6b45f943f5e837405c96f713f8
                          • Instruction Fuzzy Hash: 40C16E715087049FC724EF64C981B6AB7E4FF85310F14492DFA999B2A2DB70ED49CB82
                          APIs
                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00A66F14
                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00A66F35
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A66F48
                          • htons.WSOCK32(?,?,?,00000000,?), ref: 00A66FFE
                          • inet_ntoa.WSOCK32(?), ref: 00A66FBB
                            • Part of subcall function 00A4AE14: _strlen.LIBCMT ref: 00A4AE1E
                            • Part of subcall function 00A4AE14: _memmove.LIBCMT ref: 00A4AE40
                          • _strlen.LIBCMT ref: 00A67058
                          • _memmove.LIBCMT ref: 00A670C1
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                          • String ID:
                          • API String ID: 3619996494-0
                          • Opcode ID: e833b9072e8edf32a71227e3815cf51811e7dee5db35a3dffb9e924c8276de8c
                          • Instruction ID: 189ed1bb8138e7c6cc3527565b0fa9e1eb1e64e428dcb93275ca02756f7eb021
                          • Opcode Fuzzy Hash: e833b9072e8edf32a71227e3815cf51811e7dee5db35a3dffb9e924c8276de8c
                          • Instruction Fuzzy Hash: 1E81DF71508304ABD710EF24CC82F6FB7B9AFC4718F14891CF6569B2A2DA719D01CBA2
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7dcdc8d69dd46563559556c87f4fc5eeea0c0269620d5eb7d18a43c9cb0e35f3
                          • Instruction ID: 28cc576fa222c04da139859f34318e9867814e9298cb1b3c4a4af48c203f2f7b
                          • Opcode Fuzzy Hash: 7dcdc8d69dd46563559556c87f4fc5eeea0c0269620d5eb7d18a43c9cb0e35f3
                          • Instruction Fuzzy Hash: 67715D3090011DEFCB14DF98CC89ABEBB79FF85324F148159FA15AA251D734AA52CFA4
                          APIs
                          • _memset.LIBCMT ref: 00A6F75C
                          • _memset.LIBCMT ref: 00A6F825
                          • ShellExecuteExW.SHELL32(?), ref: 00A6F86A
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                            • Part of subcall function 00A0FEC6: _wcscpy.LIBCMT ref: 00A0FEE9
                          • GetProcessId.KERNEL32(00000000), ref: 00A6F8E1
                          • CloseHandle.KERNEL32(00000000), ref: 00A6F910
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                          • String ID: @
                          • API String ID: 3522835683-2766056989
                          • Opcode ID: 5a7820a514dc79e02f88caad2fdf6248dbcba4e485616be6222e2aa7243a06bb
                          • Instruction ID: 9c871df037586d1410b6620b975551e1d65a329d20fa686adf487196e4dad760
                          • Opcode Fuzzy Hash: 5a7820a514dc79e02f88caad2fdf6248dbcba4e485616be6222e2aa7243a06bb
                          • Instruction Fuzzy Hash: 03619F75A00619DFCF14EFA4D580AAEBBF5FF88310B158469E95AAB351CB30AD41CB90
                          APIs
                          • GetParent.USER32(?), ref: 00A5149C
                          • GetKeyboardState.USER32(?), ref: 00A514B1
                          • SetKeyboardState.USER32(?), ref: 00A51512
                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00A51540
                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00A5155F
                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00A515A5
                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00A515C8
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: d791729b7d88dd171fae4c5c9b15952f9c67770becd66b873074941eb86ccf03
                          • Instruction ID: 438d8c48a1a91f66df92a0105b57bebb756a43d0556534c05faeafe85a4d9ef9
                          • Opcode Fuzzy Hash: d791729b7d88dd171fae4c5c9b15952f9c67770becd66b873074941eb86ccf03
                          • Instruction Fuzzy Hash: 0151E2A06046D53EFB3253348C45BBA7EA97B46306F088989E9D5458C2D2F89CC8D750
                          APIs
                          • GetParent.USER32(00000000), ref: 00A512B5
                          • GetKeyboardState.USER32(?), ref: 00A512CA
                          • SetKeyboardState.USER32(?), ref: 00A5132B
                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00A51357
                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00A51374
                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00A513B8
                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00A513D9
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 90c77b1f3281cafd856c79a88d63b9fccc01d0877c095194d25ae0b9f4f15625
                          • Instruction ID: f0a2ebee65d718f54609d06a163a8282e037a7626cc5041b4a6620e6e9b1057a
                          • Opcode Fuzzy Hash: 90c77b1f3281cafd856c79a88d63b9fccc01d0877c095194d25ae0b9f4f15625
                          • Instruction Fuzzy Hash: 6F5106A05047D53DFB3297248C55BBA7FA97F06312F088589E9D84A8C2D3B4EC9CD750
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _wcsncpy$LocalTime
                          • String ID:
                          • API String ID: 2945705084-0
                          • Opcode ID: 3c4f9441079e99902e1ce76ab03a139bd137ab45443ca25e33e11139811f2c6e
                          • Instruction ID: 1f79c8d94e0214537a4b68ecc9166138870ea9e49df4ae47e04ffc8add2528cc
                          • Opcode Fuzzy Hash: 3c4f9441079e99902e1ce76ab03a139bd137ab45443ca25e33e11139811f2c6e
                          • Instruction Fuzzy Hash: 5441B266C2011876CB10FBB5888AACFB7ACAF05310F508452F918E3161E734E794C7A9
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID: @U=u
                          • API String ID: 0-2594219639
                          • Opcode ID: 161228e91aa77560e7e8d2fcccc2905ded812345d95a2e66c91436996aced9c8
                          • Instruction ID: f66898c1672360dc9496dd8185ab9f3431eba11ec00eb61804c74391459712d7
                          • Opcode Fuzzy Hash: 161228e91aa77560e7e8d2fcccc2905ded812345d95a2e66c91436996aced9c8
                          • Instruction Fuzzy Hash: 6441C339A00104BFD710DF68CC48FADBBA8EB99310F14C165F95EAB2E1D770AE41DA51
                          APIs
                            • Part of subcall function 00A548AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00A538D3,?), ref: 00A548C7
                            • Part of subcall function 00A548AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00A538D3,?), ref: 00A548E0
                          • lstrcmpiW.KERNEL32(?,?), ref: 00A538F3
                          • _wcscmp.LIBCMT ref: 00A5390F
                          • MoveFileW.KERNEL32(?,?), ref: 00A53927
                          • _wcscat.LIBCMT ref: 00A5396F
                          • SHFileOperationW.SHELL32(?), ref: 00A539DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                          • String ID: \*.*
                          • API String ID: 1377345388-1173974218
                          • Opcode ID: 3b3247086dfa3afe7433f07c42a6a3950aa232898963fc61bc97b04bc60b71ab
                          • Instruction ID: fbb0eb3609ab2785ef22530366bf4d1999a6361da862102067f9d03753e2ead9
                          • Opcode Fuzzy Hash: 3b3247086dfa3afe7433f07c42a6a3950aa232898963fc61bc97b04bc60b71ab
                          • Instruction Fuzzy Hash: 1E4181B24083849ECB51EF64D451AEFB7E8BF88381F04096EB889C3151EA74D69CC752
                          APIs
                          • _memset.LIBCMT ref: 00A77519
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A775C0
                          • IsMenu.USER32(?), ref: 00A775D8
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00A77620
                          • DrawMenuBar.USER32 ref: 00A77633
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Menu$Item$DrawInfoInsert_memset
                          • String ID: 0
                          • API String ID: 3866635326-4108050209
                          • Opcode ID: 4e3b1b86334a38632a2d78e0ad35f74e334ec39308c0efa7cf90736fb2619b6c
                          • Instruction ID: 0179346532a196a4b5989835509ac92b1f3e45975b610e7a544959f31dadf97a
                          • Opcode Fuzzy Hash: 4e3b1b86334a38632a2d78e0ad35f74e334ec39308c0efa7cf90736fb2619b6c
                          • Instruction Fuzzy Hash: E3410675A05649AFDB20DF94DC84EAABBF9FB08314F04C129EA5997250DB30AD51CFA0
                          APIs
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00A7125C
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A71286
                          • FreeLibrary.KERNEL32(00000000), ref: 00A7133D
                            • Part of subcall function 00A7122D: RegCloseKey.ADVAPI32(?), ref: 00A712A3
                            • Part of subcall function 00A7122D: FreeLibrary.KERNEL32(?), ref: 00A712F5
                            • Part of subcall function 00A7122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00A71318
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00A712E0
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                          • String ID:
                          • API String ID: 395352322-0
                          • Opcode ID: 6e26805007476907cd0b787e285edd6ce997a287571c5aa07bea35eb5cc5b54a
                          • Instruction ID: e9a1611de448bdb64bec6c0d371f232843263ce33ec1271fcfd9bb1ae25334cd
                          • Opcode Fuzzy Hash: 6e26805007476907cd0b787e285edd6ce997a287571c5aa07bea35eb5cc5b54a
                          • Instruction Fuzzy Hash: C2312BB1901109BFDB14DBD4DC89EFEB7BCEF08340F108179E519E2251EA749F869AA0
                          APIs
                            • Part of subcall function 00A680A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A680CB
                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00A664D9
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A664E8
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A66521
                          • connect.WSOCK32(00000000,?,00000010), ref: 00A6652A
                          • WSAGetLastError.WSOCK32 ref: 00A66534
                          • closesocket.WSOCK32(00000000), ref: 00A6655D
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00A66576
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                          • String ID:
                          • API String ID: 910771015-0
                          • Opcode ID: 1dc5e004ba9cd56bea2f9dc0b709ed3bed49ef5bfd6af2f77a0a8fd499b072b4
                          • Instruction ID: f8de482c5780602384fc665974c130cf7c603f747a8f652f4f0a171e2ea45ffd
                          • Opcode Fuzzy Hash: 1dc5e004ba9cd56bea2f9dc0b709ed3bed49ef5bfd6af2f77a0a8fd499b072b4
                          • Instruction Fuzzy Hash: 5031B331600118AFDB10DF64CD85BBE7BBCEB45710F048029F90AD7291CB74AD45CB62
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A4B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B0E7
                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00A493F6
                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00A49409
                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00A49439
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$_memmove$ClassName
                          • String ID: @U=u$ComboBox$ListBox
                          • API String ID: 365058703-2258501812
                          • Opcode ID: 11e4d2e96bbe5e263c8a56c569c2ccd939daa1a07f4a5ad3109805660c856edb
                          • Instruction ID: 21ebee176cb4ef262bc4b2f3e7172f2e83e190fba31faade6ca9cb6ef38c780c
                          • Opcode Fuzzy Hash: 11e4d2e96bbe5e263c8a56c569c2ccd939daa1a07f4a5ad3109805660c856edb
                          • Instruction Fuzzy Hash: 6F212675D00108BFDB14ABB4DC86DFFB778EF85360B108129FA25971E0DB344E5A8620
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A4E0FA
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00A4E120
                          • SysAllocString.OLEAUT32(00000000), ref: 00A4E123
                          • SysAllocString.OLEAUT32 ref: 00A4E144
                          • SysFreeString.OLEAUT32 ref: 00A4E14D
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00A4E167
                          • SysAllocString.OLEAUT32(?), ref: 00A4E175
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: 3743d5b7aab1037372076fdde635afcd5328b88f93f0bd2feabb582a9d8b65d7
                          • Instruction ID: 347301a4ec92ef8e4b5adf4eb0e971e65b1602146e5d838a1cc250c6cb0ea7a6
                          • Opcode Fuzzy Hash: 3743d5b7aab1037372076fdde635afcd5328b88f93f0bd2feabb582a9d8b65d7
                          • Instruction Fuzzy Hash: 2B214135644108AF9B10DFACDC89DAB77ECFB59760B508235F919CB260DA70DD828B64
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00A4B6C7
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A4B6E4
                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A4B71C
                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00A4B742
                          • _wcsstr.LIBCMT ref: 00A4B74C
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                          • String ID: @U=u
                          • API String ID: 3902887630-2594219639
                          • Opcode ID: a9905d1f86eb4eb88e9a4315ec015c31e5a2621bd487a594d60e2f6446264378
                          • Instruction ID: bff6ebac6c82582fae212502674e27dce61138903c81a71d95bdda76fa90c455
                          • Opcode Fuzzy Hash: a9905d1f86eb4eb88e9a4315ec015c31e5a2621bd487a594d60e2f6446264378
                          • Instruction Fuzzy Hash: D2212936605244BBEB259B799D49E7B7BACDF89720F008039FD09CA1A1EF61DC819370
                          APIs
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A49802
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A49834
                          • __itow.LIBCMT ref: 00A4984C
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A49874
                          • __itow.LIBCMT ref: 00A49885
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$__itow$_memmove
                          • String ID: @U=u
                          • API String ID: 2983881199-2594219639
                          • Opcode ID: 6a985cb316de3b4d2f798a045c93d2e7010840e12438093b27f69dce40ae3b56
                          • Instruction ID: 6ecbc9035c6035472fc7cd73fb78f58d41810c97d8ba786ab56cccbbc15527d4
                          • Opcode Fuzzy Hash: 6a985cb316de3b4d2f798a045c93d2e7010840e12438093b27f69dce40ae3b56
                          • Instruction Fuzzy Hash: E221C535B00208BFDB10DBB98C86EEF7BA8EF8A710F044025FA05DB291D6708D559791
                          APIs
                            • Part of subcall function 009F1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009F1D73
                            • Part of subcall function 009F1D35: GetStockObject.GDI32(00000011), ref: 009F1D87
                            • Part of subcall function 009F1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F1D91
                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00A778A1
                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00A778AE
                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00A778B9
                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00A778C8
                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00A778D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$CreateObjectStockWindow
                          • String ID: Msctls_Progress32
                          • API String ID: 1025951953-3636473452
                          • Opcode ID: 6a4e4412d43c0cbb97748cb625c952124f4b1004a6080e60a51408a04b729dce
                          • Instruction ID: 3214638172a0bb02ca936d910239e9d7eccd17cd00204fbff56c06664dc993cc
                          • Opcode Fuzzy Hash: 6a4e4412d43c0cbb97748cb625c952124f4b1004a6080e60a51408a04b729dce
                          • Instruction Fuzzy Hash: 351163B1550119BFEF159F60CC85EEB7F6DEF08758F018115B608A6091C7729C61DBA4
                          APIs
                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00A14292,?), ref: 00A141E3
                          • GetProcAddress.KERNEL32(00000000), ref: 00A141EA
                          • EncodePointer.KERNEL32(00000000), ref: 00A141F6
                          • DecodePointer.KERNEL32(00000001,00A14292,?), ref: 00A14213
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                          • String ID: RoInitialize$combase.dll
                          • API String ID: 3489934621-340411864
                          • Opcode ID: fc9e08f4b84fa6616f59938c94cd273b045e5546aad3f26460f1064d37b4d6b5
                          • Instruction ID: 7e372822b30e4a3ce3aa28948fc8a18aa43b22d9f8d92ec247a4495e8465f66f
                          • Opcode Fuzzy Hash: fc9e08f4b84fa6616f59938c94cd273b045e5546aad3f26460f1064d37b4d6b5
                          • Instruction Fuzzy Hash: 69E0EDB4990700AEEB10ABF8EC09B543A94B718702F508624B525D90B2D6B541E68B00
                          APIs
                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00A141B8), ref: 00A142B8
                          • GetProcAddress.KERNEL32(00000000), ref: 00A142BF
                          • EncodePointer.KERNEL32(00000000), ref: 00A142CA
                          • DecodePointer.KERNEL32(00A141B8), ref: 00A142E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                          • String ID: RoUninitialize$combase.dll
                          • API String ID: 3489934621-2819208100
                          • Opcode ID: 5d1e1a5bf4c9fd94872a43303a8f704dfe0f351614d08fb40ff7d5d7edec1897
                          • Instruction ID: 03de5fa5b9ca526b5f99b08c48bb9535fc0e0175b9d925942de26ac492a88dd9
                          • Opcode Fuzzy Hash: 5d1e1a5bf4c9fd94872a43303a8f704dfe0f351614d08fb40ff7d5d7edec1897
                          • Instruction Fuzzy Hash: CEE0B67C981310AFEB10EBE8FC0DB953AA8BB28742F108625F115E50B2CBB446C2CB14
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove$__itow__swprintf
                          • String ID:
                          • API String ID: 3253778849-0
                          • Opcode ID: da52f7aa59bd86189c3283b216ba2f53a604beb6c066220f3fc8d1d2b7220bb0
                          • Instruction ID: 00a61eaccb1625eaaacc986ffcced22b60a0b2ef89485213f5202a7d55d28271
                          • Opcode Fuzzy Hash: da52f7aa59bd86189c3283b216ba2f53a604beb6c066220f3fc8d1d2b7220bb0
                          • Instruction Fuzzy Hash: 7D61AC3190065A9BCF11EF64CD82FFE77A4BF48308F444559FE595B292DB30A989CB90
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A710A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A70038,?,?), ref: 00A710BC
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A70548
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A70588
                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00A705AB
                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00A705D4
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00A70617
                          • RegCloseKey.ADVAPI32(00000000), ref: 00A70624
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                          • String ID:
                          • API String ID: 4046560759-0
                          • Opcode ID: 101268986945d25d63ed84d004d26c5a3752d60cbd52824af4fca95bb8bf445c
                          • Instruction ID: 2765779d2941ebb76a52df184469b81eabb7f6e4e0e061b3e0ef1d56a016ddb1
                          • Opcode Fuzzy Hash: 101268986945d25d63ed84d004d26c5a3752d60cbd52824af4fca95bb8bf445c
                          • Instruction Fuzzy Hash: 0E515831508204EFCB14EB64CD85E6EBBE8FF89314F04892DF689972A1DB71E945CB52
                          APIs
                          • GetMenu.USER32(?), ref: 00A75A82
                          • GetMenuItemCount.USER32(00000000), ref: 00A75AB9
                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00A75AE1
                          • GetMenuItemID.USER32(?,?), ref: 00A75B50
                          • GetSubMenu.USER32(?,?), ref: 00A75B5E
                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00A75BAF
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Menu$Item$CountMessagePostString
                          • String ID:
                          • API String ID: 650687236-0
                          • Opcode ID: c8bb8c84c32af2c6e9347b05a64c7f42ae41f9b12edeef9a28608b8896aeb285
                          • Instruction ID: 652dd7b694c3d74d95bc30bbac52b78d0ae77916b12aa03432c3b59b0d66f087
                          • Opcode Fuzzy Hash: c8bb8c84c32af2c6e9347b05a64c7f42ae41f9b12edeef9a28608b8896aeb285
                          • Instruction Fuzzy Hash: 34517E35E00619AFCF15DFA4CD45AAEB7B4EF88310F148469E909B7351DBB0AE818B90
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00A4F3F7
                          • VariantClear.OLEAUT32(00000013), ref: 00A4F469
                          • VariantClear.OLEAUT32(00000000), ref: 00A4F4C4
                          • _memmove.LIBCMT ref: 00A4F4EE
                          • VariantClear.OLEAUT32(?), ref: 00A4F53B
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00A4F569
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeInitType_memmove
                          • String ID:
                          • API String ID: 1101466143-0
                          • Opcode ID: cab9295aa20b882b4a1ac2bcd4cbe3fe54fb5efa31e86117aa7dc773a7a70b8c
                          • Instruction ID: 14f1d027712bb1cb852b789c19af0b3f7accdcf77a894fec1d56a9b3650a394b
                          • Opcode Fuzzy Hash: cab9295aa20b882b4a1ac2bcd4cbe3fe54fb5efa31e86117aa7dc773a7a70b8c
                          • Instruction Fuzzy Hash: 94513CB9A00209DFCB14CF58D884AAAB7F8FF8C354B158569ED59DB311D730E951CBA0
                          APIs
                          • _memset.LIBCMT ref: 00A52747
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00A52792
                          • IsMenu.USER32(00000000), ref: 00A527B2
                          • CreatePopupMenu.USER32 ref: 00A527E6
                          • GetMenuItemCount.USER32(000000FF), ref: 00A52844
                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00A52875
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                          • String ID:
                          • API String ID: 3311875123-0
                          • Opcode ID: 4e49927a29d0d2fa97d228358ccd46ed0b481850cfba8ca1d62e57789822edda
                          • Instruction ID: a7158e647d0d6ccb206013b87064ed672c14c60d9936c474654a9a08def931f5
                          • Opcode Fuzzy Hash: 4e49927a29d0d2fa97d228358ccd46ed0b481850cfba8ca1d62e57789822edda
                          • Instruction Fuzzy Hash: BA51D370A00305EFDF24CFA8C988BADBBF4BF56315F104169EC159B291D7709948CB51
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 009F179A
                          • GetWindowRect.USER32(?,?), ref: 009F17FE
                          • ScreenToClient.USER32(?,?), ref: 009F181B
                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 009F182C
                          • EndPaint.USER32(?,?), ref: 009F1876
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                          • String ID:
                          • API String ID: 1827037458-0
                          • Opcode ID: 86787052314c69f2ff1fb519d3577bea43068f5d5810a5409189721193424286
                          • Instruction ID: 63ed8eb101208901037c4497bca2eec635e77f5fead8180f74c2a6c2d523cb28
                          • Opcode Fuzzy Hash: 86787052314c69f2ff1fb519d3577bea43068f5d5810a5409189721193424286
                          • Instruction Fuzzy Hash: F141AE71104304EFD710DFA8DC84BBA7BF8EB49764F044629FA98871B2C7359946DBA1
                          APIs
                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00A65134,?,?,00000000,00000001), ref: 00A673BF
                            • Part of subcall function 00A63C94: GetWindowRect.USER32(?,?), ref: 00A63CA7
                          • GetDesktopWindow.USER32 ref: 00A673E9
                          • GetWindowRect.USER32(00000000), ref: 00A673F0
                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00A67422
                            • Part of subcall function 00A554E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A5555E
                          • GetCursorPos.USER32(?), ref: 00A6744E
                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00A674AC
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                          • String ID:
                          • API String ID: 4137160315-0
                          • Opcode ID: 8ea759afb50106a753b7e91048d9fa4d0274c2a27fcec569efea3424fe646bf4
                          • Instruction ID: 86b0bd546504997aa4468e40c66a43c5fe30c89aae3bc6c894d4469b622c853a
                          • Opcode Fuzzy Hash: 8ea759afb50106a753b7e91048d9fa4d0274c2a27fcec569efea3424fe646bf4
                          • Instruction Fuzzy Hash: 6131D272508305AFD720DF54DC49E9FBBA9FF88314F004919F98997191DA30EA49CB92
                          APIs
                            • Part of subcall function 00A485F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A48608
                            • Part of subcall function 00A485F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A48612
                            • Part of subcall function 00A485F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A48621
                            • Part of subcall function 00A485F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A48628
                            • Part of subcall function 00A485F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A4863E
                          • GetLengthSid.ADVAPI32(?,00000000,00A48977), ref: 00A48DAC
                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00A48DB8
                          • HeapAlloc.KERNEL32(00000000), ref: 00A48DBF
                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00A48DD8
                          • GetProcessHeap.KERNEL32(00000000,00000000,00A48977), ref: 00A48DEC
                          • HeapFree.KERNEL32(00000000), ref: 00A48DF3
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                          • String ID:
                          • API String ID: 3008561057-0
                          • Opcode ID: 2828fe249368f76a6d73e7cec7b16d3ed2058956a52b3d57ce9d75cc2f78781d
                          • Instruction ID: b3a701535c745fbf2de5b986ac03482c4b26094df35f059c36d81254e28cb734
                          • Opcode Fuzzy Hash: 2828fe249368f76a6d73e7cec7b16d3ed2058956a52b3d57ce9d75cc2f78781d
                          • Instruction Fuzzy Hash: E111E135902604FFDB50DFA4EC08BBE7779FF81315F108129E94993250DB399A41CB60
                          APIs
                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00A48B2A
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00A48B31
                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00A48B40
                          • CloseHandle.KERNEL32(00000004), ref: 00A48B4B
                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00A48B7A
                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 00A48B8E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                          • String ID:
                          • API String ID: 1413079979-0
                          • Opcode ID: 4738f60caf4c17ea3d58aff0a364805ac8d106f49d16b3cf32c25ae72a91b56b
                          • Instruction ID: 405b3ba796989ebee0fe15642a737d0f56e40759981778455fb236ef497235b3
                          • Opcode Fuzzy Hash: 4738f60caf4c17ea3d58aff0a364805ac8d106f49d16b3cf32c25ae72a91b56b
                          • Instruction Fuzzy Hash: 97115CB6500209AFDF01CFA4ED49FDE7BA9FF48344F048064FE08A2160D7758EA29B60
                          APIs
                            • Part of subcall function 009F12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009F134D
                            • Part of subcall function 009F12F3: SelectObject.GDI32(?,00000000), ref: 009F135C
                            • Part of subcall function 009F12F3: BeginPath.GDI32(?), ref: 009F1373
                            • Part of subcall function 009F12F3: SelectObject.GDI32(?,00000000), ref: 009F139C
                          • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00A7C1C4
                          • LineTo.GDI32(00000000,00000003,?), ref: 00A7C1D8
                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A7C1E6
                          • LineTo.GDI32(00000000,00000000,?), ref: 00A7C1F6
                          • EndPath.GDI32(00000000), ref: 00A7C206
                          • StrokePath.GDI32(00000000), ref: 00A7C216
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                          • String ID:
                          • API String ID: 43455801-0
                          • Opcode ID: a0419a5e9467a9813f70e6d3841f0beac3435ab6fd8663e1da182d0ae5837711
                          • Instruction ID: 53e4661ba9b01f02d3c8ce131e35ec61a24f75bbc9b44eb3535e83f642485616
                          • Opcode Fuzzy Hash: a0419a5e9467a9813f70e6d3841f0beac3435ab6fd8663e1da182d0ae5837711
                          • Instruction Fuzzy Hash: A411097640010CBFDB119FD0DC88EEA7FADEB08364F048125BA185A162D7719E96DBA0
                          APIs
                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00A103D3
                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00A103DB
                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00A103E6
                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00A103F1
                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00A103F9
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00A10401
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Virtual
                          • String ID:
                          • API String ID: 4278518827-0
                          • Opcode ID: 2a91e2dcac53bc6669f14451560ad0417034108c7e95fa66fbea9a873410d354
                          • Instruction ID: 6f29c78c8bdaa44c2e8b1a42adf383292baf110c2dc53983a1786f9179b6ce45
                          • Opcode Fuzzy Hash: 2a91e2dcac53bc6669f14451560ad0417034108c7e95fa66fbea9a873410d354
                          • Instruction Fuzzy Hash: 0D016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A864CBE5
                          APIs
                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00A5569B
                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00A556B1
                          • GetWindowThreadProcessId.USER32(?,?), ref: 00A556C0
                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A556CF
                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A556D9
                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00A556E0
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                          • String ID:
                          • API String ID: 839392675-0
                          • Opcode ID: dbc4a054051560fd08724de91983b1eca281046621f208681920880214b001ba
                          • Instruction ID: e30f33ef0de9520dfceb2eb19c1d858a8fbf7a82dcff6e2b0c181d8e520bec2a
                          • Opcode Fuzzy Hash: dbc4a054051560fd08724de91983b1eca281046621f208681920880214b001ba
                          • Instruction Fuzzy Hash: D0F01D32645158BFE7219BA29C0DEAB7B7CEBC6B12F004169FA08D105096A11B42C6B5
                          APIs
                          • InterlockedExchange.KERNEL32(?,?), ref: 00A574E5
                          • EnterCriticalSection.KERNEL32(?,?,00A01044,?,?), ref: 00A574F6
                          • TerminateThread.KERNEL32(00000000,000001F6,?,00A01044,?,?), ref: 00A57503
                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00A01044,?,?), ref: 00A57510
                            • Part of subcall function 00A56ED7: CloseHandle.KERNEL32(00000000,?,00A5751D,?,00A01044,?,?), ref: 00A56EE1
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00A57523
                          • LeaveCriticalSection.KERNEL32(?,?,00A01044,?,?), ref: 00A5752A
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                          • String ID:
                          • API String ID: 3495660284-0
                          • Opcode ID: 4c4eb5b743fa81f962ac7a262bb22e7e51ae76bf934fe8485da06a9b5f89fe0a
                          • Instruction ID: 55638bae637e14fcea7d48d84de1e0ee00bfa6949ccd96c987a3a732b7dd318f
                          • Opcode Fuzzy Hash: 4c4eb5b743fa81f962ac7a262bb22e7e51ae76bf934fe8485da06a9b5f89fe0a
                          • Instruction Fuzzy Hash: 06F09A7A044612EFDB115BA4FC889EA372ABF04302B000131F606A10A2DF711A82CAA0
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00A48E7F
                          • UnloadUserProfile.USERENV(?,?), ref: 00A48E8B
                          • CloseHandle.KERNEL32(?), ref: 00A48E94
                          • CloseHandle.KERNEL32(?), ref: 00A48E9C
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00A48EA5
                          • HeapFree.KERNEL32(00000000), ref: 00A48EAC
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                          • String ID:
                          • API String ID: 146765662-0
                          • Opcode ID: 61aeac8facaa5749dbf368ab699f6879215211f81d131fa1d72b0d25e26087a0
                          • Instruction ID: e9d15b7a77af2a520e80aed2d283eeb995c42db246966ca8a3464f259ff57681
                          • Opcode Fuzzy Hash: 61aeac8facaa5749dbf368ab699f6879215211f81d131fa1d72b0d25e26087a0
                          • Instruction Fuzzy Hash: FAE05276104505FFDA019FF5EC0C95ABB69FB89762B508631F32D86470CB3295A2DB60
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00A68928
                          • CharUpperBuffW.USER32(?,?), ref: 00A68A37
                          • VariantClear.OLEAUT32(?), ref: 00A68BAF
                            • Part of subcall function 00A57804: VariantInit.OLEAUT32(00000000), ref: 00A57844
                            • Part of subcall function 00A57804: VariantCopy.OLEAUT32(00000000,?), ref: 00A5784D
                            • Part of subcall function 00A57804: VariantClear.OLEAUT32(00000000), ref: 00A57859
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                          • API String ID: 4237274167-1221869570
                          • Opcode ID: a1c0d1631ef3272a94a614d7fbb0132e5923be89130e2d9875baecad0a670b69
                          • Instruction ID: f238e688a4e9e0303e19f902da8a2bc4735e082f999ca157009d03f602d70883
                          • Opcode Fuzzy Hash: a1c0d1631ef3272a94a614d7fbb0132e5923be89130e2d9875baecad0a670b69
                          • Instruction Fuzzy Hash: FF919F756083059FC710DF24C580A6ABBF8EFC9354F048A6EF99A8B361DB30E945CB52
                          APIs
                            • Part of subcall function 00A0FEC6: _wcscpy.LIBCMT ref: 00A0FEE9
                          • _memset.LIBCMT ref: 00A53077
                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A530A6
                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00A53159
                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00A53187
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                          • String ID: 0
                          • API String ID: 4152858687-4108050209
                          • Opcode ID: 6e702b5b361f5fbd2934afcd7942f96086ff03a678d947da539b50f0165a7920
                          • Instruction ID: eb823f3154c087accbdc8c6c4be52a8b5c2cf02ac046b1fb556978ee7719dd41
                          • Opcode Fuzzy Hash: 6e702b5b361f5fbd2934afcd7942f96086ff03a678d947da539b50f0165a7920
                          • Instruction Fuzzy Hash: BF51B073608300AADF259F78D845AABB7E8BFC5391F044A2DFD95D21D1DB70CA488792
                          APIs
                          • GetWindowRect.USER32(013AE700,?), ref: 00A79AD2
                          • ScreenToClient.USER32(00000002,00000002), ref: 00A79B05
                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00A79B72
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$ClientMoveRectScreen
                          • String ID: @U=u
                          • API String ID: 3880355969-2594219639
                          • Opcode ID: a8c2afbaf3113e74b7ca86afc91a6fe816f26090869c8a3770a055c968c178f9
                          • Instruction ID: 90c0128807d7a3068486f0656054f7d804b6b6f2b1801a36fa3b51b0a29fdd08
                          • Opcode Fuzzy Hash: a8c2afbaf3113e74b7ca86afc91a6fe816f26090869c8a3770a055c968c178f9
                          • Instruction Fuzzy Hash: ED512F35A00209EFCF10DF64DD819AE7BB6FB95360F14C25AF8199B2A1D730AD81CB90
                          APIs
                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A4DAC5
                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00A4DAFB
                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00A4DB0C
                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00A4DB8E
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorMode$AddressCreateInstanceProc
                          • String ID: DllGetClassObject
                          • API String ID: 753597075-1075368562
                          • Opcode ID: 87da0455dff63791885189c5d84ee0604dc49477573fcde151c5a84a23201939
                          • Instruction ID: 0d781810562d4b63cfefa603b30e069f6cdb7f93622fb1e19befdf12c90a549d
                          • Opcode Fuzzy Hash: 87da0455dff63791885189c5d84ee0604dc49477573fcde151c5a84a23201939
                          • Instruction Fuzzy Hash: 604191B5600208EFDB15CF64C884AAA7BB9EF84350F1581AAFD09DF205D7B1DE41CBA0
                          APIs
                          • _memset.LIBCMT ref: 00A52CAF
                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00A52CCB
                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00A52D11
                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00AB6890,00000000), ref: 00A52D5A
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Menu$Delete$InfoItem_memset
                          • String ID: 0
                          • API String ID: 1173514356-4108050209
                          • Opcode ID: f50f5827b812502da63ddc18ff882792bddebd975363d98a9cab9bcfa964cfd7
                          • Instruction ID: 8b02b57b0e3e0a07e9e162338528a11461f03f1c203799b051b13afeb60067c9
                          • Opcode Fuzzy Hash: f50f5827b812502da63ddc18ff882792bddebd975363d98a9cab9bcfa964cfd7
                          • Instruction Fuzzy Hash: E4418032204302AFD724DF24D845B5ABBE8FF86321F14465EFD65972A1D770E909CB92
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00A78B4D
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID: @U=u
                          • API String ID: 634782764-2594219639
                          • Opcode ID: a1694f7888fa5f2b6953ecb7057bad2878b282ec3a4ae7645f623ba06e3ff676
                          • Instruction ID: 2132f6319e2e872e667ca3f1bea386c53234081c681a6f0ae92ec5ac43ceba90
                          • Opcode Fuzzy Hash: a1694f7888fa5f2b6953ecb7057bad2878b282ec3a4ae7645f623ba06e3ff676
                          • Instruction Fuzzy Hash: D431B4B4681204BEEF209B68CC8DFAD3764EB85350F64C616FA59D62A1CF38A9409751
                          APIs
                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A6DAD9
                            • Part of subcall function 009F79AB: _memmove.LIBCMT ref: 009F79F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharLower_memmove
                          • String ID: cdecl$none$stdcall$winapi
                          • API String ID: 3425801089-567219261
                          • Opcode ID: 626714f45fb3f359508e51162534687c14a2cd04d9891c9d1b1bbc5cb6fb22bf
                          • Instruction ID: a34e28ea4dd709518e22e033c0b0d278d359591ab735dedffa847b0d9f356305
                          • Opcode Fuzzy Hash: 626714f45fb3f359508e51162534687c14a2cd04d9891c9d1b1bbc5cb6fb22bf
                          • Instruction Fuzzy Hash: C231C570A00619AFCF00EF94CC809FEB3B4FF45350B118A29E965A76D5CB71E946CB80
                          APIs
                            • Part of subcall function 009F1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009F1D73
                            • Part of subcall function 009F1D35: GetStockObject.GDI32(00000011), ref: 009F1D87
                            • Part of subcall function 009F1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F1D91
                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00A766D0
                          • LoadLibraryW.KERNEL32(?), ref: 00A766D7
                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00A766EC
                          • DestroyWindow.USER32(?), ref: 00A766F4
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                          • String ID: SysAnimate32
                          • API String ID: 4146253029-1011021900
                          • Opcode ID: f456c25ce26149877bd4a450f092e4770d43d2af125a5261d7bf91252aef649d
                          • Instruction ID: 8f426b9b5e3d36694ee00bf4ad384346e46284a73a1c23d313fedc3bb6c0bc6c
                          • Opcode Fuzzy Hash: f456c25ce26149877bd4a450f092e4770d43d2af125a5261d7bf91252aef649d
                          • Instruction Fuzzy Hash: DD218E71200A06AFEF148F64DC80FBB37ADEB59368F50C629F91892190D771CC919B60
                          APIs
                          • GetStdHandle.KERNEL32(0000000C), ref: 00A5705E
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A57091
                          • GetStdHandle.KERNEL32(0000000C), ref: 00A570A3
                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00A570DD
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: 5bb0d9a6b5248633a8e7848fccfa1b6abc123a1047f4d8c0aee80898fc87d702
                          • Instruction ID: ac184fb8a5b4999d2d6fce82c62c12704a3bb3a0cd40000f39c8d739955c8602
                          • Opcode Fuzzy Hash: 5bb0d9a6b5248633a8e7848fccfa1b6abc123a1047f4d8c0aee80898fc87d702
                          • Instruction Fuzzy Hash: 19218174504209AFDB209F69EC05A9E77F8BF54722F208A29FDA1E72D0D7709948CB50
                          APIs
                          • GetStdHandle.KERNEL32(000000F6), ref: 00A5712B
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00A5715D
                          • GetStdHandle.KERNEL32(000000F6), ref: 00A5716E
                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00A571A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: 374caafd27053b17fda471dd455d8557a4dda8cf1054cb84639482f7ed3c793c
                          • Instruction ID: 47830c6a6846cf49b93f917d8e4efb713b179fcd547c8a84420f2ed9ccac398f
                          • Opcode Fuzzy Hash: 374caafd27053b17fda471dd455d8557a4dda8cf1054cb84639482f7ed3c793c
                          • Instruction Fuzzy Hash: 5521C471504605ABDB209F68AC04A9DB7E8BF55731F200719FDA1E32E0DB709849C790
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 00A5AEBF
                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00A5AF13
                          • __swprintf.LIBCMT ref: 00A5AF2C
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,00A7F910), ref: 00A5AF6A
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume__swprintf
                          • String ID: %lu
                          • API String ID: 3164766367-685833217
                          • Opcode ID: 295f92d9e1192e237ade67b316fb198410ef2a8687d468e33e29e66740e194fa
                          • Instruction ID: 91ea6decdf16a6f05f4f874550a24ab69679d5147bd25193358cf984a9baeb39
                          • Opcode Fuzzy Hash: 295f92d9e1192e237ade67b316fb198410ef2a8687d468e33e29e66740e194fa
                          • Instruction Fuzzy Hash: EC214435A00109AFCB10DFA4CD85EAE7BB8FF89705B108069F909DB251DB71EA45DB61
                          APIs
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                            • Part of subcall function 00A4A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A4A399
                            • Part of subcall function 00A4A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00A4A3AC
                            • Part of subcall function 00A4A37C: GetCurrentThreadId.KERNEL32 ref: 00A4A3B3
                            • Part of subcall function 00A4A37C: AttachThreadInput.USER32(00000000), ref: 00A4A3BA
                          • GetFocus.USER32 ref: 00A4A554
                            • Part of subcall function 00A4A3C5: GetParent.USER32(?), ref: 00A4A3D3
                          • GetClassNameW.USER32(?,?,00000100), ref: 00A4A59D
                          • EnumChildWindows.USER32(?,00A4A615), ref: 00A4A5C5
                          • __swprintf.LIBCMT ref: 00A4A5DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                          • String ID: %s%d
                          • API String ID: 1941087503-1110647743
                          • Opcode ID: 64fdbfaf6e6e8672614235de052c0b2311103ba7df4a8ec23366e6410f8b46a9
                          • Instruction ID: b9468e3f09163a9a013e638258be513d3a2623e2f577e72345612909ca3d2305
                          • Opcode Fuzzy Hash: 64fdbfaf6e6e8672614235de052c0b2311103ba7df4a8ec23366e6410f8b46a9
                          • Instruction Fuzzy Hash: EF11A279640208BBDF10BFA4DD85FFA7778AF98700F048075BA0CAA192DB705A858B75
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00A52048
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                          • API String ID: 3964851224-769500911
                          • Opcode ID: 9f9dc7b96cb4741fab2b4f3a581742392e7f050ab1d1ec997eb0968f7212e591
                          • Instruction ID: 2d82c3c5a9c625b1aabecc58d4a8bb4d98ad8353954a9772a5ebf4006aeea500
                          • Opcode Fuzzy Hash: 9f9dc7b96cb4741fab2b4f3a581742392e7f050ab1d1ec997eb0968f7212e591
                          • Instruction Fuzzy Hash: D6116D70940109DFCF40EFA4D9419FEB7B4FF26304B108569D855A7292EB32AD4ACB50
                          APIs
                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00A6EF1B
                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00A6EF4B
                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00A6F07E
                          • CloseHandle.KERNEL32(?), ref: 00A6F0FF
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                          • String ID:
                          • API String ID: 2364364464-0
                          • Opcode ID: 68013be5e23bdde610c3c1136f4a1e8b9f4f08da2b944e02c26264614bc6b82f
                          • Instruction ID: 818055b5d2ab0e799a04632f00607a80a80e703a1bd63817b57a349bbf696131
                          • Opcode Fuzzy Hash: 68013be5e23bdde610c3c1136f4a1e8b9f4f08da2b944e02c26264614bc6b82f
                          • Instruction Fuzzy Hash: B28165756043019FD720EF28DC46F2AB7E5AF88720F14881DF69ADB292DB70ED418B51
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A710A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00A70038,?,?), ref: 00A710BC
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00A70388
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00A703C7
                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00A7040E
                          • RegCloseKey.ADVAPI32(?,?), ref: 00A7043A
                          • RegCloseKey.ADVAPI32(00000000), ref: 00A70447
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                          • String ID:
                          • API String ID: 3440857362-0
                          • Opcode ID: ecd73ce29f6f41e8ff8de82fb3c8d1d75bce8ba06b4c95988b8cfa3998213b66
                          • Instruction ID: 1e143df70aba47c370ad64faf20fbf5b276a528ad399a9d385e14c16c04a11a4
                          • Opcode Fuzzy Hash: ecd73ce29f6f41e8ff8de82fb3c8d1d75bce8ba06b4c95988b8cfa3998213b66
                          • Instruction Fuzzy Hash: F9511771218204AFD704EB64DC81F6EB7E8FF88704F44892DB6999B2A1DB70E905DB52
                          APIs
                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00A5E88A
                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00A5E8B3
                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00A5E8F2
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00A5E917
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00A5E91F
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                          • String ID:
                          • API String ID: 1389676194-0
                          • Opcode ID: 952f644dc43f58d76d061d9f79b4c0dbae3ad27b5b2c1532215256c354e659ea
                          • Instruction ID: c472b2808b71cd6ef4e95bc9187eff6513a5759868d5b60d7774b5cfc83192a1
                          • Opcode Fuzzy Hash: 952f644dc43f58d76d061d9f79b4c0dbae3ad27b5b2c1532215256c354e659ea
                          • Instruction Fuzzy Hash: A9511C35A00209DFCF05EF64C981AAEBBF5FF48311B1480A9E949AB362CB71ED51DB50
                          APIs
                          • GetCursorPos.USER32(?), ref: 009F2357
                          • ScreenToClient.USER32(00AB67B0,?), ref: 009F2374
                          • GetAsyncKeyState.USER32(00000001), ref: 009F2399
                          • GetAsyncKeyState.USER32(00000002), ref: 009F23A7
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AsyncState$ClientCursorScreen
                          • String ID:
                          • API String ID: 4210589936-0
                          • Opcode ID: 42fae9797675a4d0f0c1bd6140ba2750ab6d4cdf482c93914a6e069f874cb10d
                          • Instruction ID: 92cebce5a94aa32a1bfb4771ab108f5495eca11942b7eefed684dad5aa8cb26a
                          • Opcode Fuzzy Hash: 42fae9797675a4d0f0c1bd6140ba2750ab6d4cdf482c93914a6e069f874cb10d
                          • Instruction Fuzzy Hash: 8041A171504129FFCF159FA8DC44BEDBB74FB05760F208329F92896290CB749A94DBA1
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A4695D
                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00A469A9
                          • TranslateMessage.USER32(?), ref: 00A469D2
                          • DispatchMessageW.USER32(?), ref: 00A469DC
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00A469EB
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                          • String ID:
                          • API String ID: 2108273632-0
                          • Opcode ID: fba55f0a2858599c2d52e19a08f5ceb7622ff6ab45e4f7c91a31afdda524e4e5
                          • Instruction ID: 19eaf19627b9aaad33d841b5c730b88043b252c3956b89b04e88b2365b596acf
                          • Opcode Fuzzy Hash: fba55f0a2858599c2d52e19a08f5ceb7622ff6ab45e4f7c91a31afdda524e4e5
                          • Instruction Fuzzy Hash: 20312475900246AEDB20CFB4CC44FF67BBCBB43300F144675E025C21A2D7B89886D792
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00A48F12
                          • PostMessageW.USER32(?,00000201,00000001), ref: 00A48FBC
                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00A48FC4
                          • PostMessageW.USER32(?,00000202,00000000), ref: 00A48FD2
                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00A48FDA
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessagePostSleep$RectWindow
                          • String ID:
                          • API String ID: 3382505437-0
                          • Opcode ID: a6b74a2fc10938f8233c2a9a5dad770315fd1d7ad365e23b688dcff65ad9c20e
                          • Instruction ID: 2a67589945f0146e98a7a624ef6456a2e888eccbca8bc19c1f5fd106f5737639
                          • Opcode Fuzzy Hash: a6b74a2fc10938f8233c2a9a5dad770315fd1d7ad365e23b688dcff65ad9c20e
                          • Instruction Fuzzy Hash: 8B31C071500219EFDB14CFA8ED4CA9E7BB6EB44326F108229F925E61D0C7B49A58DB90
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • GetWindowLongW.USER32(?,000000F0), ref: 00A7B44C
                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00A7B471
                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00A7B489
                          • GetSystemMetrics.USER32(00000004), ref: 00A7B4B2
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00A61184,00000000), ref: 00A7B4D0
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$Long$MetricsSystem
                          • String ID:
                          • API String ID: 2294984445-0
                          • Opcode ID: 3c98f32ee431f956191fc663ff90aa82c51b6e1f10b6ae4fcbd49e0ff5b9d473
                          • Instruction ID: fcb245840f5907a6b008349805273fd5b4720632f41e97c3759d7363fc294be2
                          • Opcode Fuzzy Hash: 3c98f32ee431f956191fc663ff90aa82c51b6e1f10b6ae4fcbd49e0ff5b9d473
                          • Instruction Fuzzy Hash: 492181B1920255AFCB209F78CC44B6A3BA4FB05721F14C738F92AD71E2E7309951DBA0
                          APIs
                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009F134D
                          • SelectObject.GDI32(?,00000000), ref: 009F135C
                          • BeginPath.GDI32(?), ref: 009F1373
                          • SelectObject.GDI32(?,00000000), ref: 009F139C
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ObjectSelect$BeginCreatePath
                          • String ID:
                          • API String ID: 3225163088-0
                          • Opcode ID: a5bb4b2383746faa537b12ab40d85ea03891b8f57cecb33ccfaf5d64473210be
                          • Instruction ID: 8bcbc9454f5879015a2d2966e70c9e0fa003d0dd12cacaf1e32f401195a1a504
                          • Opcode Fuzzy Hash: a5bb4b2383746faa537b12ab40d85ea03891b8f57cecb33ccfaf5d64473210be
                          • Instruction Fuzzy Hash: 9D210C71800208EFDB11DFE5EC047B97BB9FB00321F14832AE918965B2D7B99992DB90
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: 6c8443f13dac163fc4a25705c7c987049e02d582c3c4c431a2bb08d06118d522
                          • Instruction ID: ac193636ab6e1b29e5b210f9de249842f772f8e74072edd149104e1793420af7
                          • Opcode Fuzzy Hash: 6c8443f13dac163fc4a25705c7c987049e02d582c3c4c431a2bb08d06118d522
                          • Instruction Fuzzy Hash: 0E01B5B56061057BE244B6295D42FFBB75CABA13F4F044621FE1896283E651EF1283F0
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 00A54D5C
                          • __beginthreadex.LIBCMT ref: 00A54D7A
                          • MessageBoxW.USER32(?,?,?,?), ref: 00A54D8F
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00A54DA5
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00A54DAC
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                          • String ID:
                          • API String ID: 3824534824-0
                          • Opcode ID: 54f6519e09f27399c0429aaa493e9e2fea55b1f6b4e767f5a389f203674f4813
                          • Instruction ID: 534f98d4a8f534ae1c78e1c8484af6c2ebf104d2531c85bf5b1b119355604453
                          • Opcode Fuzzy Hash: 54f6519e09f27399c0429aaa493e9e2fea55b1f6b4e767f5a389f203674f4813
                          • Instruction Fuzzy Hash: D211E572D04244BFD701DBE89C08ADA7BACFB49325F144365FD18D3261D6758D858BA0
                          APIs
                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00A48766
                          • GetLastError.KERNEL32(?,00A4822A,?,?,?), ref: 00A48770
                          • GetProcessHeap.KERNEL32(00000008,?,?,00A4822A,?,?,?), ref: 00A4877F
                          • HeapAlloc.KERNEL32(00000000,?,00A4822A,?,?,?), ref: 00A48786
                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00A4879D
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 842720411-0
                          • Opcode ID: 6074d141c2b28a4445e31881241c956e1d680f2af6119eb0c20029399a659616
                          • Instruction ID: 2898c6f0ecc3888b66ff112f43a0d68e5bd938b319ed242f078e8b97ca86c0a6
                          • Opcode Fuzzy Hash: 6074d141c2b28a4445e31881241c956e1d680f2af6119eb0c20029399a659616
                          • Instruction Fuzzy Hash: 2E016D75204204FFDB208FA6EC88D6B7BACFF89355B204539F949C2260DA718D81CA70
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A55502
                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A55510
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A55518
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00A55522
                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00A5555E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterSleep$Frequency
                          • String ID:
                          • API String ID: 2833360925-0
                          • Opcode ID: f176c9c218903920a5521194f595aaedfca0bfecab43185b13e99e65fd5e527d
                          • Instruction ID: 5800f05ad0c139de5ae942ba5f3e222db794c65256742b09e446523c9e73b054
                          • Opcode Fuzzy Hash: f176c9c218903920a5521194f595aaedfca0bfecab43185b13e99e65fd5e527d
                          • Instruction Fuzzy Hash: C5011B35D00A29DBCF00DFF9EC589EDBB79BF09712F404566E905B2140EB315699C7A1
                          APIs
                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?,?,?,00A4799D), ref: 00A4766F
                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?,?), ref: 00A4768A
                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?,?), ref: 00A47698
                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?), ref: 00A476A8
                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00A4758C,80070057,?,?), ref: 00A476B4
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: From$Prog$FreeStringTasklstrcmpi
                          • String ID:
                          • API String ID: 3897988419-0
                          • Opcode ID: 43208b96c3ba358ca9addfc123f34c0a235a333e5c1e268f00e4c492c574f87f
                          • Instruction ID: 195728d9f4f1b51daf49739482dbdaa0d89630ac08d9d4720218a4ec73bd1580
                          • Opcode Fuzzy Hash: 43208b96c3ba358ca9addfc123f34c0a235a333e5c1e268f00e4c492c574f87f
                          • Instruction Fuzzy Hash: C401D476600614BFDB118F58DC04BAEBBAEEF84752F154028FD08D2211E731DE4197A0
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00A48608
                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00A48612
                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00A48621
                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00A48628
                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00A4863E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: 1e657bb28b9ac39aac76ed8a477f169b43820adb957cd28984e8192315f10bba
                          • Instruction ID: 2b0db8f651bc17940cacd0e8489c75f95f2eb66658af2e835f4bb9d4a768e65c
                          • Opcode Fuzzy Hash: 1e657bb28b9ac39aac76ed8a477f169b43820adb957cd28984e8192315f10bba
                          • Instruction Fuzzy Hash: 69F0AF34200204AFEB104FE4EC89E6F7BACFF89B54F504135F909C6150EB609D82DA60
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A48669
                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A48673
                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48682
                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48689
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A4869F
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: ca79e9d42c57510d33f11ff0138d6396e6d6abaf3c965bd05b9041b240c409fa
                          • Instruction ID: 658353bdbe7912c7d58731b9d924248546c8642bb758eb54a40d70cd998497d9
                          • Opcode Fuzzy Hash: ca79e9d42c57510d33f11ff0138d6396e6d6abaf3c965bd05b9041b240c409fa
                          • Instruction Fuzzy Hash: D7F04F75200204AFEB115FA5EC88E6B7BACFFCA754F104135F949C6150DAA59A82EA60
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 00A4C6BA
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00A4C6D1
                          • MessageBeep.USER32(00000000), ref: 00A4C6E9
                          • KillTimer.USER32(?,0000040A), ref: 00A4C705
                          • EndDialog.USER32(?,00000001), ref: 00A4C71F
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                          • String ID:
                          • API String ID: 3741023627-0
                          • Opcode ID: f7a1a01f589739692eb9489bbf7f3322578ba1b23415f1505ae5d67ef2c8354e
                          • Instruction ID: 3d2a2370db809d2e6001433b8c0b1777b67f483ebe141340401d4c29e1f316a5
                          • Opcode Fuzzy Hash: f7a1a01f589739692eb9489bbf7f3322578ba1b23415f1505ae5d67ef2c8354e
                          • Instruction Fuzzy Hash: 8301D634400304ABEB209B60DC4EFA6B7B8FF00701F004669F54AA14E0EBF0AA958F80
                          APIs
                          • EndPath.GDI32(?), ref: 009F13BF
                          • StrokeAndFillPath.GDI32(?,?,00A2BAD8,00000000,?), ref: 009F13DB
                          • SelectObject.GDI32(?,00000000), ref: 009F13EE
                          • DeleteObject.GDI32 ref: 009F1401
                          • StrokePath.GDI32(?), ref: 009F141C
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Path$ObjectStroke$DeleteFillSelect
                          • String ID:
                          • API String ID: 2625713937-0
                          • Opcode ID: b36132ec841f9312b2969a00f49eeb23b1e7a7eb48baac575d47e2d37906a042
                          • Instruction ID: a6adf15ac0a9f601cf5a1e7e9ce1d6f2cd78f1d40e515fd684308d3cf4e9ec83
                          • Opcode Fuzzy Hash: b36132ec841f9312b2969a00f49eeb23b1e7a7eb48baac575d47e2d37906a042
                          • Instruction Fuzzy Hash: 19F0B231004208EFDB169FE6EC087A83BA9AB41326F04C324E529951B2D7798A97DF90
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 00A5C69D
                          • CoCreateInstance.OLE32(00A82D6C,00000000,00000001,00A82BDC,?), ref: 00A5C6B5
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                          • CoUninitialize.OLE32 ref: 00A5C922
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateInitializeInstanceUninitialize_memmove
                          • String ID: .lnk
                          • API String ID: 2683427295-24824748
                          • Opcode ID: 7a851cfffb7a139b09d56b7c4d7fd5c94f15fb65a54391d228f6aac27f31667c
                          • Instruction ID: 6716637a79b52790ffda96130c7187e1d3141e91d5436fd05b6936fb218891a7
                          • Opcode Fuzzy Hash: 7a851cfffb7a139b09d56b7c4d7fd5c94f15fb65a54391d228f6aac27f31667c
                          • Instruction Fuzzy Hash: 43A10871108209AFD700EF64C891FBBB7E8EF94714F044928B656971A2EB70EA49CB52
                          APIs
                            • Part of subcall function 00A10FF6: std::exception::exception.LIBCMT ref: 00A1102C
                            • Part of subcall function 00A10FF6: __CxxThrowException@8.LIBCMT ref: 00A11041
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 009F7BB1: _memmove.LIBCMT ref: 009F7C0B
                          • __swprintf.LIBCMT ref: 00A0302D
                          Strings
                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00A02EC6
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                          • API String ID: 1943609520-557222456
                          • Opcode ID: 8519655506471e5bd26670574cd6263373182e4d778c75c4d9ad2c264acb798d
                          • Instruction ID: dbf5b44d6ac24c6fb587d921591cca29b90db88faba7ef12bc16356b47dd9f37
                          • Opcode Fuzzy Hash: 8519655506471e5bd26670574cd6263373182e4d778c75c4d9ad2c264acb798d
                          • Instruction Fuzzy Hash: 50917E72508309AFCB18EF28E985D7EB7B8EF85740F00491DF546972A1DA60EE44CB52
                          APIs
                            • Part of subcall function 009F48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,009F48A1,?,?,009F37C0,?), ref: 009F48CE
                          • CoInitialize.OLE32(00000000), ref: 00A5BC26
                          • CoCreateInstance.OLE32(00A82D6C,00000000,00000001,00A82BDC,?), ref: 00A5BC3F
                          • CoUninitialize.OLE32 ref: 00A5BC5C
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                          • String ID: .lnk
                          • API String ID: 2126378814-24824748
                          • Opcode ID: caf68613c905eab79b915141c34c402e29bb78b7f72e9a0fdce315f68e95f9ef
                          • Instruction ID: 8dd94db39f175fe6640efec24eb301bca6c63ce4f863a267be48e278e22939d4
                          • Opcode Fuzzy Hash: caf68613c905eab79b915141c34c402e29bb78b7f72e9a0fdce315f68e95f9ef
                          • Instruction Fuzzy Hash: 51A132756043059FCB00DF18C884E6ABBE5FF89315F158988F9999B3A2CB31ED49CB91
                          APIs
                          • __startOneArgErrorHandling.LIBCMT ref: 00A152DD
                            • Part of subcall function 00A20340: __87except.LIBCMT ref: 00A2037B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorHandling__87except__start
                          • String ID: pow
                          • API String ID: 2905807303-2276729525
                          • Opcode ID: c90533c26a5f45d2f6ecdcf862e8543dbf3c2c8eea844f8aba3362b18ef4038c
                          • Instruction ID: f07373ac04a71a75238933c3b98f73680ecc9a9c631781daef15f2df96849a76
                          • Opcode Fuzzy Hash: c90533c26a5f45d2f6ecdcf862e8543dbf3c2c8eea844f8aba3362b18ef4038c
                          • Instruction Fuzzy Hash: 64517B72E1C601C7CB11B73CEA517EE2BA49B80750F308978E4A58A2E7EF74CCD49A45
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID: #$+
                          • API String ID: 0-2552117581
                          • Opcode ID: 4ff82b94da7ac6971d2068e666cc403adee213900c219edc34f6ee7c370f48d7
                          • Instruction ID: cd3c9f585cf4acefa4c11c1c7104bccf2d184788f8cc256a47832b964b65f8f7
                          • Opcode Fuzzy Hash: 4ff82b94da7ac6971d2068e666cc403adee213900c219edc34f6ee7c370f48d7
                          • Instruction Fuzzy Hash: A151333990464ADFDF15DF78C888AFA7BB4EF9A310F144055E8A19F2A1C7749C82CB60
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memset$_memmove
                          • String ID: ERCP
                          • API String ID: 2532777613-1384759551
                          • Opcode ID: f3661e8f2bac7f03867992012f76dbcbc03b75bfaf475a997a581e93d55954c4
                          • Instruction ID: c4aafc00d4db1e16d296d7338925363997ea2728beba6e5342e846768e38b38b
                          • Opcode Fuzzy Hash: f3661e8f2bac7f03867992012f76dbcbc03b75bfaf475a997a581e93d55954c4
                          • Instruction Fuzzy Hash: D951D1719003099FDB24CF65D981BEABBF4EF44318F20856EEA4ACB281E771D694CB50
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00A7F910,00000000,?,?,?,?), ref: 00A77C4E
                          • GetWindowLongW.USER32 ref: 00A77C6B
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00A77C7B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$Long
                          • String ID: SysTreeView32
                          • API String ID: 847901565-1698111956
                          • Opcode ID: caccac0b683b1246ca345fcfab3b4193e505e85d959c2eb9997b35e47e75c5ed
                          • Instruction ID: 8b37c0bed68b728c4553134d173ef92ee6efee8518add93022526a63d935dd16
                          • Opcode Fuzzy Hash: caccac0b683b1246ca345fcfab3b4193e505e85d959c2eb9997b35e47e75c5ed
                          • Instruction Fuzzy Hash: 1731AF31204209AFDB128F78CC41BEA77A9EF49324F24C725F979932E0D731E9919B60
                          APIs
                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00A776D0
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00A776E4
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A77708
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: SysMonthCal32
                          • API String ID: 2326795674-1439706946
                          • Opcode ID: 6595ade536ee58c50ff2e76a22be282e2b0e39195816b5d893ced837fcd88c2c
                          • Instruction ID: ef1f25028c363e4b70e34f7055a55663b851af3ee95503d03e638c58b2b8977c
                          • Opcode Fuzzy Hash: 6595ade536ee58c50ff2e76a22be282e2b0e39195816b5d893ced837fcd88c2c
                          • Instruction Fuzzy Hash: B221BF32600218BBDF15CFA4CC42FEE3B79FB48714F118254FE196B1D0DAB1A8918BA0
                          APIs
                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00A76FAA
                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00A76FBA
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00A76FDF
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$MoveWindow
                          • String ID: Listbox
                          • API String ID: 3315199576-2633736733
                          • Opcode ID: 1b5c91c51d27622e31b45f505e100d5c352c880f1d2abfda5dd8e036d543f4ec
                          • Instruction ID: a503c47f37da5321ec097a19144c334b7f710aee77023849fdcb5329649eef0e
                          • Opcode Fuzzy Hash: 1b5c91c51d27622e31b45f505e100d5c352c880f1d2abfda5dd8e036d543f4ec
                          • Instruction Fuzzy Hash: 8F219232610118BFDF159F54DC85FBB3BAAEF89754F01C124F9189B190CA71AC52CBA0
                          APIs
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00A4914F
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00A49166
                          • SendMessageW.USER32(?,0000000D,?,00000000), ref: 00A4919E
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: adfd251f5652c7d5e4bbcbbb7381e55645ba74ba85d1a3189fba2719c90f291b
                          • Instruction ID: d4cb4efe4f88feea0dac67d13d9fa04d347cf4fedd051fa9521940fe7ef88451
                          • Opcode Fuzzy Hash: adfd251f5652c7d5e4bbcbbb7381e55645ba74ba85d1a3189fba2719c90f291b
                          • Instruction Fuzzy Hash: A1219236600109BFDF60DBADDC469AFB7BDAF84350F11065AE509E3290DA71BE518B50
                          APIs
                          • SendMessageW.USER32(00000402,00000000,00000000), ref: 00A6613B
                          • SendMessageW.USER32(0000000C,00000000,?), ref: 00A6617C
                          • SendMessageW.USER32(0000000C,00000000,?), ref: 00A661A4
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: 74698fc33872e5f88f819f403a4fe3b1a9550de30584a965a4cb4700c63af690
                          • Instruction ID: 472d3547778ed3265b9c701fd9fe24dd7fe0e9a81fc0ba5f4f12df4f8bbab5c3
                          • Opcode Fuzzy Hash: 74698fc33872e5f88f819f403a4fe3b1a9550de30584a965a4cb4700c63af690
                          • Instruction Fuzzy Hash: 55212C35300505AFEB10EB68DD85E6ABBF5FF8A7107018164FA499B6B2CB71BC51CB90
                          APIs
                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00A779E1
                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00A779F6
                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00A77A03
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: msctls_trackbar32
                          • API String ID: 3850602802-1010561917
                          • Opcode ID: 1823bcea7bb2ab5800d6d4f21dadc4cca5e6a9a4671ec55694e34e4ba2ad7c52
                          • Instruction ID: d88c34b0ff91fc19111cd98a1552c48de437fb640ca8973ac82ed349ce981cbd
                          • Opcode Fuzzy Hash: 1823bcea7bb2ab5800d6d4f21dadc4cca5e6a9a4671ec55694e34e4ba2ad7c52
                          • Instruction Fuzzy Hash: A511E372254208BEEF109F60CC05FAF3BA9EF89B64F018529FB45A60D1D6729851CB60
                          APIs
                          • GetWindowTextLengthW.USER32(00000000), ref: 00A76C11
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00A76C20
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: LengthMessageSendTextWindow
                          • String ID: @U=u$edit
                          • API String ID: 2978978980-590756393
                          • Opcode ID: ff03c9417cff4854ab7c1aabf3f92b5776a3749da13b83409f85e54168c94286
                          • Instruction ID: d4762a9a004e4214ed84cf9cc8aff3b34d9eb2f079489823d1e5b56c70a6eefd
                          • Opcode Fuzzy Hash: ff03c9417cff4854ab7c1aabf3f92b5776a3749da13b83409f85e54168c94286
                          • Instruction Fuzzy Hash: 22119671100608AFEB118F64DC41BAB3B6AEB86368F20C724F968D71E0C735EC919B60
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A4B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B0E7
                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00A49355
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: @U=u$ComboBox$ListBox
                          • API String ID: 372448540-2258501812
                          • Opcode ID: 75df30a274b92ed006fecb32c36552eaedfdc2037460931cdca9284b8cd0223d
                          • Instruction ID: c7f9e8b49ef442d32a4f4fa8bd2b1fce4a4abb114a9b6bf97bb7fc06cd3c0d6f
                          • Opcode Fuzzy Hash: 75df30a274b92ed006fecb32c36552eaedfdc2037460931cdca9284b8cd0223d
                          • Instruction Fuzzy Hash: 7701B975A45219ABCB04EFA4CC929FF7779BF86310B140619F5325B2D1DB31691C8750
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A4B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B0E7
                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00A4924D
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: @U=u$ComboBox$ListBox
                          • API String ID: 372448540-2258501812
                          • Opcode ID: 7af635b650ba7d35c38db57703a4c9ee054da83dc78c1a66a8477ca3114675c1
                          • Instruction ID: 904145260cfc3b49e797fe897b31a444cb48ec73ad854ccf814d7922ee216df0
                          • Opcode Fuzzy Hash: 7af635b650ba7d35c38db57703a4c9ee054da83dc78c1a66a8477ca3114675c1
                          • Instruction Fuzzy Hash: 74018475E41109BBCB08EBA4C992EFFB3A8AF85300F240019BA12672C1EB519F1C9671
                          APIs
                            • Part of subcall function 009F7F41: _memmove.LIBCMT ref: 009F7F82
                            • Part of subcall function 00A4B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00A4B0E7
                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00A492D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: @U=u$ComboBox$ListBox
                          • API String ID: 372448540-2258501812
                          • Opcode ID: df6bf4945f60a4d45a9b0b88cbcb989b140ee9fc0d486f8168ad95061074f9d0
                          • Instruction ID: caeee185ca670dbb5de462e2a01a6234c0dba1117ca5684fca0d898e965b4fec
                          • Opcode Fuzzy Hash: df6bf4945f60a4d45a9b0b88cbcb989b140ee9fc0d486f8168ad95061074f9d0
                          • Instruction Fuzzy Hash: 9701D675E41209BBCB04EBA4C982EFFB7ACAF95300F240115BA16632C2DB619F1C9271
                          APIs
                          • GetForegroundWindow.USER32(?,00AB67B0,00A7DB17,000000FC,?,00000000,00000000,?,?,?,00A2BBB9,?,?,?,?,?), ref: 00A7AF8B
                          • GetFocus.USER32 ref: 00A7AF93
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                            • Part of subcall function 009F25DB: GetWindowLongW.USER32(?,000000EB), ref: 009F25EC
                          • SendMessageW.USER32(013AE700,000000B0,000001BC,000001C0), ref: 00A7B005
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$Long$FocusForegroundMessageSend
                          • String ID: @U=u
                          • API String ID: 3601265619-2594219639
                          • Opcode ID: 358128cc2ac66082d917bbaa940e73d2a880c466ec2678ee1f28cc7637a50861
                          • Instruction ID: 8b94cd9e0b578cccc88af5b8cdc5334f87235e00fd20b1ba7af80c23c3dc654e
                          • Opcode Fuzzy Hash: 358128cc2ac66082d917bbaa940e73d2a880c466ec2678ee1f28cc7637a50861
                          • Instruction Fuzzy Hash: 4E0152712006009FC724DB68DC94B6777E6FF89324F188269F42A872B1CB31AC47CB60
                          APIs
                            • Part of subcall function 00A0619A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A061B1
                          • SendMessageW.USER32(?,0000000C,00000000,?), ref: 00A061DF
                          • GetParent.USER32(?), ref: 00A4111F
                          • InvalidateRect.USER32(00000000,?,00A03BAF,?,00000000,00000001), ref: 00A41126
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$InvalidateParentRectTimeout
                          • String ID: @U=u
                          • API String ID: 3648793173-2594219639
                          • Opcode ID: ef25da6e3a81915119c4f46897481dccd2067f14f9b4c687a27cccd3076f4c80
                          • Instruction ID: d6cad7aea6d62afa94096c13ceeedf718a9f687a510d640198ca4aa3a4ebfb57
                          • Opcode Fuzzy Hash: ef25da6e3a81915119c4f46897481dccd2067f14f9b4c687a27cccd3076f4c80
                          • Instruction Fuzzy Hash: 30F0A034200248FFEF206FA0EC09F917BA8AF19748F208139F5459B0E2C6A258B1AB50
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,009F4C2E), ref: 009F4CA3
                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 009F4CB5
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetNativeSystemInfo$kernel32.dll
                          • API String ID: 2574300362-192647395
                          • Opcode ID: 9683936bcb9b2f5fd3a86670717633ea2f69be2394dfc4072dae9f3ed7cee560
                          • Instruction ID: 013dcf71a7aec175acfd42e877cabd5ad5b8c5327cbf87bd30ee1534a832d183
                          • Opcode Fuzzy Hash: 9683936bcb9b2f5fd3a86670717633ea2f69be2394dfc4072dae9f3ed7cee560
                          • Instruction Fuzzy Hash: 1ED01730510727DFDB209F71DE1865776E9AF05791F11CC3A99CAD6150E670D9C0CB50
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,009F4CE1,?), ref: 009F4DA2
                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 009F4DB4
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-1355242751
                          • Opcode ID: 2cfaac15345336b37fe7935d42c068a747332db0ad85d99c29cf0674dd2b03d1
                          • Instruction ID: a298291698aae77a21e6dc7d868d3bf2256dff9254899e898f030a1c9ad99b0c
                          • Opcode Fuzzy Hash: 2cfaac15345336b37fe7935d42c068a747332db0ad85d99c29cf0674dd2b03d1
                          • Instruction Fuzzy Hash: 30D0E231550712DFDB209B71DC08A5B76E8AF05355F11C83ADA8ADA190E770E880CB50
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,009F4D2E,?,009F4F4F,?,00AB62F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 009F4D6F
                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 009F4D81
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-3689287502
                          • Opcode ID: 78222694c92d6ce2dc7e7d3521d12bfe19a8278c6ae718305e9596d16603055c
                          • Instruction ID: 075bcae1cce93ad187b337603a18b562a71664fae97b724a4d9c49f59c20b9d0
                          • Opcode Fuzzy Hash: 78222694c92d6ce2dc7e7d3521d12bfe19a8278c6ae718305e9596d16603055c
                          • Instruction Fuzzy Hash: B6D0E230510712DFDB209F71DC0862776E8BF15352F11C93A958AD6290E670E880CB51
                          APIs
                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00A712C1), ref: 00A71080
                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00A71092
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: RegDeleteKeyExW$advapi32.dll
                          • API String ID: 2574300362-4033151799
                          • Opcode ID: 70d91f3ed9b858a7e7c77f8daa2aaa00559ec0d722673e9eb9d8abd53c48bc63
                          • Instruction ID: 28728a8224641bcc1e710df268b3b91dc5a413f97af3cc0b39dbc3af492fc4a1
                          • Opcode Fuzzy Hash: 70d91f3ed9b858a7e7c77f8daa2aaa00559ec0d722673e9eb9d8abd53c48bc63
                          • Instruction Fuzzy Hash: 93D01730520712DFD7209F79DC18A5B7AE4AF06362F11CD3AA48EDA190E770C9C1CA60
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00A69009,?,00A7F910), ref: 00A69403
                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00A69415
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetModuleHandleExW$kernel32.dll
                          • API String ID: 2574300362-199464113
                          • Opcode ID: b3b256f0c53ad0200f2d565ce27fc65a913b33542608959ebd9e47f6934bd6c1
                          • Instruction ID: 8a9ee9aa8d1b0ab8acd89282d91cbfa1bf228cb2343a40ad0d1cab1db64a85c4
                          • Opcode Fuzzy Hash: b3b256f0c53ad0200f2d565ce27fc65a913b33542608959ebd9e47f6934bd6c1
                          • Instruction Fuzzy Hash: 3ED08230580713DFDB208FB0CD4822372E8AF01352F00C83AA48AC2990EB70C880CA10
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 83e1631325e274d16cec5c3dfdc1e79018afa9f4209ff6ed05fc8666e4ac2eab
                          • Instruction ID: 3aaffe8be9ef13ec31338c7ec86cb474e690b7f5fab65a838eb4bc9a5ea6f158
                          • Opcode Fuzzy Hash: 83e1631325e274d16cec5c3dfdc1e79018afa9f4209ff6ed05fc8666e4ac2eab
                          • Instruction Fuzzy Hash: D1C17279A04256EFCB14CF98C884EAEB7F5FF88714B158599E805EB251D730EE81CB90
                          APIs
                          • CharLowerBuffW.USER32(?,?), ref: 00A6E3D2
                          • CharLowerBuffW.USER32(?,?), ref: 00A6E415
                            • Part of subcall function 00A6DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00A6DAD9
                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00A6E615
                          • _memmove.LIBCMT ref: 00A6E628
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: BuffCharLower$AllocVirtual_memmove
                          • String ID:
                          • API String ID: 3659485706-0
                          • Opcode ID: 4feff860b833cd02b354523bd1f54733bb543039b1a29acd405fcfffe3744554
                          • Instruction ID: faf4cf7bfc974a100f779bd91bee56377b10a49f720c57266f52937120684ea8
                          • Opcode Fuzzy Hash: 4feff860b833cd02b354523bd1f54733bb543039b1a29acd405fcfffe3744554
                          • Instruction Fuzzy Hash: E1C147756083019FC714DF28C480A6ABBF4FF88718F14896DF99A9B351D771E946CB82
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 00A683D8
                          • CoUninitialize.OLE32 ref: 00A683E3
                            • Part of subcall function 00A4DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00A4DAC5
                          • VariantInit.OLEAUT32(?), ref: 00A683EE
                          • VariantClear.OLEAUT32(?), ref: 00A686BF
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                          • String ID:
                          • API String ID: 780911581-0
                          • Opcode ID: b87c0a938599fa2ef07997d154e81b980fc70939579fc01ee9c11e73c6f43fb0
                          • Instruction ID: 0bd51c2bc786e0ca2c60279d65f50431dff362824522753dc10ad52e8646a7e7
                          • Opcode Fuzzy Hash: b87c0a938599fa2ef07997d154e81b980fc70939579fc01ee9c11e73c6f43fb0
                          • Instruction Fuzzy Hash: FBA149752047059FCB10DF28C885B2AB7F8BF88354F148549FA9A9B3A1CB74ED44CB42
                          APIs
                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00A82C7C,?), ref: 00A47C32
                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00A82C7C,?), ref: 00A47C4A
                          • CLSIDFromProgID.OLE32(?,?,00000000,00A7FB80,000000FF,?,00000000,00000800,00000000,?,00A82C7C,?), ref: 00A47C6F
                          • _memcmp.LIBCMT ref: 00A47C90
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: FromProg$FreeTask_memcmp
                          • String ID:
                          • API String ID: 314563124-0
                          • Opcode ID: 14208789384d923668353780210a64a8aa13bb91ce8420b590328cd243694e7b
                          • Instruction ID: ec1eaf7d4ea2e342ae27091774797753bc046b04abaaf9d9b40ed485cbacd0be
                          • Opcode Fuzzy Hash: 14208789384d923668353780210a64a8aa13bb91ce8420b590328cd243694e7b
                          • Instruction Fuzzy Hash: A8811975A00109EFCB04DF94C984EEEB7B9FF89315F208599E506EB250DB71AE06CB60
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Variant$AllocClearCopyInitString
                          • String ID:
                          • API String ID: 2808897238-0
                          • Opcode ID: 77ac7b75404419e4917de4d52a0e26a64dd69505f7288b4c3d8f71040717c806
                          • Instruction ID: 029f494fb2180b2e620dd08375f48856c9a303c8f8908c4c1ac2987647760539
                          • Opcode Fuzzy Hash: 77ac7b75404419e4917de4d52a0e26a64dd69505f7288b4c3d8f71040717c806
                          • Instruction Fuzzy Hash: E651B6386043419ADB24AF75D891B7EB3F4EFC9310F20881FE59ACB291DB7198849B12
                          APIs
                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00A66CE4
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A66CF4
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00A66D58
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A66D64
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ErrorLast$__itow__swprintfsocket
                          • String ID:
                          • API String ID: 2214342067-0
                          • Opcode ID: b6bc6c7e269f2cc03a7c550ad68e06f900cfe9502c963c72d83fe5801b7ca153
                          • Instruction ID: 3d029c56550df5c33f7fb7f2c7ac5065daae6dceb40f234175a159cdcdf034ef
                          • Opcode Fuzzy Hash: b6bc6c7e269f2cc03a7c550ad68e06f900cfe9502c963c72d83fe5801b7ca153
                          • Instruction Fuzzy Hash: 2241B474740604AFEB10AF24DC86F3A77F59B84B10F448018FB599B2D2DA719D018B91
                          APIs
                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00A7F910), ref: 00A667BA
                          • _strlen.LIBCMT ref: 00A667EC
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _strlen
                          • String ID:
                          • API String ID: 4218353326-0
                          • Opcode ID: da0e36f3e98fff984b658a610fabd8106c0ba9e310324f93662778ef47c2504f
                          • Instruction ID: 327ce65a52c1afd5f212b8e95bd663a8a12d32bfcebaad88149ea0fafb6a0e6b
                          • Opcode Fuzzy Hash: da0e36f3e98fff984b658a610fabd8106c0ba9e310324f93662778ef47c2504f
                          • Instruction Fuzzy Hash: 0E41A231A00108AFCB14EBB4DDD5FBEB7B9AF48314F148169FA199B292DB70AD40C791
                          APIs
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00A5BB09
                          • GetLastError.KERNEL32(?,00000000), ref: 00A5BB2F
                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00A5BB54
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00A5BB80
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CreateHardLink$DeleteErrorFileLast
                          • String ID:
                          • API String ID: 3321077145-0
                          • Opcode ID: f5cf430f8f60adabe17c08ee812801071c49e19a4e83797ebe23a7db2c94291f
                          • Instruction ID: 8fc92d3b703198e225b2db98f6042d4031b796e084968a02e3bb12af9dd38b99
                          • Opcode Fuzzy Hash: f5cf430f8f60adabe17c08ee812801071c49e19a4e83797ebe23a7db2c94291f
                          • Instruction Fuzzy Hash: 86411539200614DFCB10EF19C584A69BBF1BF89351B0A8498EE4A9B362CB74FD45CB91
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 00A7AE1A
                          • GetWindowRect.USER32(?,?), ref: 00A7AE90
                          • PtInRect.USER32(?,?,00A7C304), ref: 00A7AEA0
                          • MessageBeep.USER32(00000000), ref: 00A7AF11
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Rect$BeepClientMessageScreenWindow
                          • String ID:
                          • API String ID: 1352109105-0
                          • Opcode ID: b87e30de35ead7ba8d5b71700776cd83ec1b6e9e7b259edc08dea7b239e72dc4
                          • Instruction ID: afb8440b16eab7c9ad05fff0e71577448c705541d38221d5a07f6a93632ca87b
                          • Opcode Fuzzy Hash: b87e30de35ead7ba8d5b71700776cd83ec1b6e9e7b259edc08dea7b239e72dc4
                          • Instruction Fuzzy Hash: D6416D71600129EFCB11CF98CC84A6D7BF5FFA9750F14C1A9E41C9B261D730A942DB92
                          APIs
                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00A51037
                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 00A51053
                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00A510B9
                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00A5110B
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: 724c5523bec128bdb0eb8bb52f8b9ae5def8867d093c30cd51a8c4bf35d2768e
                          • Instruction ID: 03b6703a3ddb7e2197b9a6618efa697ca7a443141fdd4d9362c627d1e9dc4b60
                          • Opcode Fuzzy Hash: 724c5523bec128bdb0eb8bb52f8b9ae5def8867d093c30cd51a8c4bf35d2768e
                          • Instruction Fuzzy Hash: 51314630E40698AEFF30CB658C05BFABBB9BB44312F08831AFD84521D1C37489C99761
                          APIs
                          • GetKeyboardState.USER32(?,753DC0D0,?,00008000), ref: 00A51176
                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00A51192
                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00A511F1
                          • SendInput.USER32(00000001,?,0000001C,753DC0D0,?,00008000), ref: 00A51243
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: c9589f1c1fc5b96bbbfd9e5c4b6843781f2224d2306e9305564e69a119db9605
                          • Instruction ID: fcbbc63e1c41bec69e06e69ca9e8a55921d8add84ecb780e4fc53f9632d54979
                          • Opcode Fuzzy Hash: c9589f1c1fc5b96bbbfd9e5c4b6843781f2224d2306e9305564e69a119db9605
                          • Instruction Fuzzy Hash: 61312B30A40A085EEF20CBA58C04BFE7BB9BB49312F04439EF985921D1D3744A9DD791
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00A2644B
                          • __isleadbyte_l.LIBCMT ref: 00A26479
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A264A7
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00A264DD
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: e932d817022ac27ee7d500fda99d64b2436f53d213b0d4f624bb30e5bdcfd6dc
                          • Instruction ID: bf928c3b2b2c65669b25a44503c690eb1f055ca8d41b0f1408ad82781a5f1c19
                          • Opcode Fuzzy Hash: e932d817022ac27ee7d500fda99d64b2436f53d213b0d4f624bb30e5bdcfd6dc
                          • Instruction Fuzzy Hash: CA31D031602266EFDB21AF69EE45BBA7BB5FF40320F154139E89487190D731D990DB90
                          APIs
                          • GetForegroundWindow.USER32 ref: 00A75189
                            • Part of subcall function 00A5387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00A53897
                            • Part of subcall function 00A5387D: GetCurrentThreadId.KERNEL32 ref: 00A5389E
                            • Part of subcall function 00A5387D: AttachThreadInput.USER32(00000000,?,00A552A7), ref: 00A538A5
                          • GetCaretPos.USER32(?), ref: 00A7519A
                          • ClientToScreen.USER32(00000000,?), ref: 00A751D5
                          • GetForegroundWindow.USER32 ref: 00A751DB
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                          • String ID:
                          • API String ID: 2759813231-0
                          • Opcode ID: b7a721c98630c95746d158e62bb185223492ca54831a048285a84e799493dab2
                          • Instruction ID: 859144330dae693bc3ccf096f631ebef9da8fb3bee65faf2ddcfd55fb61f1c3e
                          • Opcode Fuzzy Hash: b7a721c98630c95746d158e62bb185223492ca54831a048285a84e799493dab2
                          • Instruction Fuzzy Hash: 4431EE72900108AFDB04EFA5CD45AFFB7F9EF98300F10806AE515E7251DA759E45CBA1
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • GetCursorPos.USER32(?), ref: 00A7C7C2
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00A2BBFB,?,?,?,?,?), ref: 00A7C7D7
                          • GetCursorPos.USER32(?), ref: 00A7C824
                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00A2BBFB,?,?,?), ref: 00A7C85E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                          • String ID:
                          • API String ID: 2864067406-0
                          • Opcode ID: 5773322bdd9d4d0941b630e5269687d0fe4235eac9f11da3efacdafc96c596aa
                          • Instruction ID: d7f3de220ece346b011e6cdb23610d34f874ceed3d7924cdab072ebd14063d5e
                          • Opcode Fuzzy Hash: 5773322bdd9d4d0941b630e5269687d0fe4235eac9f11da3efacdafc96c596aa
                          • Instruction Fuzzy Hash: F5317175600018AFCB15CF98CC98EEA7BBAEB49720F04C169F9098B261C7359E51DFA1
                          APIs
                            • Part of subcall function 00A48652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00A48669
                            • Part of subcall function 00A48652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00A48673
                            • Part of subcall function 00A48652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48682
                            • Part of subcall function 00A48652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00A48689
                            • Part of subcall function 00A48652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00A4869F
                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00A48BEB
                          • _memcmp.LIBCMT ref: 00A48C0E
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00A48C44
                          • HeapFree.KERNEL32(00000000), ref: 00A48C4B
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                          • String ID:
                          • API String ID: 1592001646-0
                          • Opcode ID: 86948537bc22ef4b0aa75ddbaf1c4077c706220cf0e9ad35aec6c1d4280233a8
                          • Instruction ID: 5c9d8613b24b2a9241f95b687b6f8118e9a4c084f0bef0881f008e59974b025d
                          • Opcode Fuzzy Hash: 86948537bc22ef4b0aa75ddbaf1c4077c706220cf0e9ad35aec6c1d4280233a8
                          • Instruction Fuzzy Hash: D221AE71E01208EFCB00CFA4D984BEEB7B8EF80344F048059E554A7240DB39AE46CB60
                          APIs
                          • __setmode.LIBCMT ref: 00A10BF2
                            • Part of subcall function 009F5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A57B20,?,?,00000000), ref: 009F5B8C
                            • Part of subcall function 009F5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A57B20,?,?,00000000,?,?), ref: 009F5BB0
                          • _fprintf.LIBCMT ref: 00A10C29
                          • OutputDebugStringW.KERNEL32(?), ref: 00A46331
                            • Part of subcall function 00A14CDA: _flsall.LIBCMT ref: 00A14CF3
                          • __setmode.LIBCMT ref: 00A10C5E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                          • String ID:
                          • API String ID: 521402451-0
                          • Opcode ID: a40d53904b02ac6a5726ba4670649feba0fe49a2db596f6bfb31c3f3cbb6c597
                          • Instruction ID: f30a1fde082e165d99c46fcd97e2fb3ee96b8d1522f7bfa5b1c6d5d7a0b0f6ec
                          • Opcode Fuzzy Hash: a40d53904b02ac6a5726ba4670649feba0fe49a2db596f6bfb31c3f3cbb6c597
                          • Instruction Fuzzy Hash: 4B1106329042087ADB04B7B8AD43EFE7B69AF89320F14411AF204971D2DF655DD687D5
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00A61A97
                            • Part of subcall function 00A61B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00A61B40
                            • Part of subcall function 00A61B21: InternetCloseHandle.WININET(00000000), ref: 00A61BDD
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Internet$CloseConnectHandleOpen
                          • String ID:
                          • API String ID: 1463438336-0
                          • Opcode ID: 89c15c516b78b0ce0ff35c6bb361ed5e7db3f2a14e2ce6c105d2ec8bd2a3ef1d
                          • Instruction ID: f1353f70baef51d91a091a526ed6be0256d65a82d46034708c214c2a45c86683
                          • Opcode Fuzzy Hash: 89c15c516b78b0ce0ff35c6bb361ed5e7db3f2a14e2ce6c105d2ec8bd2a3ef1d
                          • Instruction Fuzzy Hash: EB219335200A05BFEB169FA0CC01FBBBBBDFF54701F18401AFA5596651EB71D9119BA0
                          APIs
                            • Part of subcall function 00A4F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00A4E1C4,?,?,?,00A4EFB7,00000000,000000EF,00000119,?,?), ref: 00A4F5BC
                            • Part of subcall function 00A4F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00A4F5E2
                            • Part of subcall function 00A4F5AD: lstrcmpiW.KERNEL32(00000000,?,00A4E1C4,?,?,?,00A4EFB7,00000000,000000EF,00000119,?,?), ref: 00A4F613
                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00A4EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00A4E1DD
                          • lstrcpyW.KERNEL32(00000000,?), ref: 00A4E203
                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00A4EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00A4E237
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: lstrcmpilstrcpylstrlen
                          • String ID: cdecl
                          • API String ID: 4031866154-3896280584
                          • Opcode ID: 7812d122e192672853a47a63a7226300dcaf2c1022a2941b3c69e1018cc4125e
                          • Instruction ID: 479b0c116ab8339736e210a9303b6b8e524271501822ece8a7b05d79e7129e31
                          • Opcode Fuzzy Hash: 7812d122e192672853a47a63a7226300dcaf2c1022a2941b3c69e1018cc4125e
                          • Instruction Fuzzy Hash: 0E11813A100345EFCF25EF74DC45DBA77A8FF85350B40812AE916CB250EBB19991D791
                          APIs
                          • _free.LIBCMT ref: 00A25351
                            • Part of subcall function 00A1594C: __FF_MSGBANNER.LIBCMT ref: 00A15963
                            • Part of subcall function 00A1594C: __NMSG_WRITE.LIBCMT ref: 00A1596A
                            • Part of subcall function 00A1594C: RtlAllocateHeap.NTDLL(01390000,00000000,00000001,00000000,?,?,?,00A11013,?), ref: 00A1598F
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: AllocateHeap_free
                          • String ID:
                          • API String ID: 614378929-0
                          • Opcode ID: c690dae9111ab326cdb7eafe079a1c9c66faedbb690dab638198c85ac6ec8fc1
                          • Instruction ID: 48a1a21f9db84a9b47f7946ac322133bc0467673bc28aa6a5bcf75056e5a94e4
                          • Opcode Fuzzy Hash: c690dae9111ab326cdb7eafe079a1c9c66faedbb690dab638198c85ac6ec8fc1
                          • Instruction Fuzzy Hash: 78112732C04B25AFCF20AF78BD256AD37947F043B0F205439F9449E191DE74C9818790
                          APIs
                          • _memset.LIBCMT ref: 009F4560
                            • Part of subcall function 009F410D: _memset.LIBCMT ref: 009F418D
                            • Part of subcall function 009F410D: _wcscpy.LIBCMT ref: 009F41E1
                            • Part of subcall function 009F410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 009F41F1
                          • KillTimer.USER32(?,00000001,?,?), ref: 009F45B5
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 009F45C4
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00A2D6CE
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                          • String ID:
                          • API String ID: 1378193009-0
                          • Opcode ID: a45c59e697a320118beb61643682dcc2b2bf6c3eab9cc2365a548e631955c188
                          • Instruction ID: feac212d8a59ef33e5d005aca5804ec357927d6d613bfd9de9a765e746682408
                          • Opcode Fuzzy Hash: a45c59e697a320118beb61643682dcc2b2bf6c3eab9cc2365a548e631955c188
                          • Instruction Fuzzy Hash: 4F21D770908798AFEB32DB64DC45BF7BBEC9F01308F04009DE79E56282C7745A858B51
                          APIs
                            • Part of subcall function 009F5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00A57B20,?,?,00000000), ref: 009F5B8C
                            • Part of subcall function 009F5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00A57B20,?,?,00000000,?,?), ref: 009F5BB0
                          • gethostbyname.WSOCK32(?,?,?), ref: 00A666AC
                          • WSAGetLastError.WSOCK32(00000000), ref: 00A666B7
                          • _memmove.LIBCMT ref: 00A666E4
                          • inet_ntoa.WSOCK32(?), ref: 00A666EF
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                          • String ID:
                          • API String ID: 1504782959-0
                          • Opcode ID: 55dd6a02495d3b38526a38923fe2ab01629ca55f69798fc748b6c178e2cef02f
                          • Instruction ID: 6bbc5a2deca91ea02aee54115c19f7cce73d5169dc2f2b3b1d7449b6b0722b28
                          • Opcode Fuzzy Hash: 55dd6a02495d3b38526a38923fe2ab01629ca55f69798fc748b6c178e2cef02f
                          • Instruction Fuzzy Hash: 00115E35900508AFCB04EBA4DD96EEEB7B8AF44310B148165F606A7261DF30AF54CBA1
                          APIs
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00A49043
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A49055
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A4906B
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00A49086
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: b15bbf6942c9ade3b57b2d0d167274ca373d1de19aed977aaf7c1815d4cbf2f5
                          • Instruction ID: 370069c7aa813317ec68d0a98ccfd927305c0c3ad0bb28fc5bce421ae82d176b
                          • Opcode Fuzzy Hash: b15bbf6942c9ade3b57b2d0d167274ca373d1de19aed977aaf7c1815d4cbf2f5
                          • Instruction Fuzzy Hash: CA115E79900218FFDB10DFA5CD84E9EBB74FB88710F204095E904B7250D6716E50DB90
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • DefDlgProcW.USER32(?,00000020,?), ref: 009F12D8
                          • GetClientRect.USER32(?,?), ref: 00A2B84B
                          • GetCursorPos.USER32(?), ref: 00A2B855
                          • ScreenToClient.USER32(?,?), ref: 00A2B860
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Client$CursorLongProcRectScreenWindow
                          • String ID:
                          • API String ID: 4127811313-0
                          • Opcode ID: 61df7e0e9ed22f6e0734c05602979ee729641426bdff387a787a9c4aba6084c7
                          • Instruction ID: 32016770ae058c38d0570bf64bb900869b9164dfe3893fd965aac8a1a1e31fbb
                          • Opcode Fuzzy Hash: 61df7e0e9ed22f6e0734c05602979ee729641426bdff387a787a9c4aba6084c7
                          • Instruction Fuzzy Hash: 3B111335A0001DEFCB00EFE8D8859FE77B8EB45310F004466FA25E7251C735AA929BA5
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A501FD,?,00A51250,?,00008000), ref: 00A5166F
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00A501FD,?,00A51250,?,00008000), ref: 00A51694
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00A501FD,?,00A51250,?,00008000), ref: 00A5169E
                          • Sleep.KERNEL32(?,?,?,?,?,?,?,00A501FD,?,00A51250,?,00008000), ref: 00A516D1
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuerySleep
                          • String ID:
                          • API String ID: 2875609808-0
                          • Opcode ID: a48746f7c4843366fbf20f4cdef699841fe254e236ea65461fdc29532b33663c
                          • Instruction ID: 5dda7323eab7557605b0c40040b40630f2cd6d1fcdad07078504e7b028ff3c70
                          • Opcode Fuzzy Hash: a48746f7c4843366fbf20f4cdef699841fe254e236ea65461fdc29532b33663c
                          • Instruction Fuzzy Hash: FC113631C00519EBCF009FE5D948BFEBB78FF09752F444555EA44B6240CB3056A4CBA6
                          APIs
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction ID: 75d810706bdd074c78307f36a3d32936c50b0941246b5c9082cbe867461e078c
                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction Fuzzy Hash: 6901807204415AFBCF125F88EC028EE3F22BF19340B088525FA1858031C237CAB1AB81
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 00A7B59E
                          • ScreenToClient.USER32(?,?), ref: 00A7B5B6
                          • ScreenToClient.USER32(?,?), ref: 00A7B5DA
                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00A7B5F5
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClientRectScreen$InvalidateWindow
                          • String ID:
                          • API String ID: 357397906-0
                          • Opcode ID: 0b6ea02e7fabbdf93938bb3c20b8eaa636f79d0a81a3a7688c719530f78b354d
                          • Instruction ID: 9ba323b1b857f952de52bf39d5486e59860de0dfc7d1728dd8efb50120c85df2
                          • Opcode Fuzzy Hash: 0b6ea02e7fabbdf93938bb3c20b8eaa636f79d0a81a3a7688c719530f78b354d
                          • Instruction Fuzzy Hash: BB1146B5D00249EFDB41DF99C844AEEFBB5FB08310F108166E915E3220D735AA558F60
                          APIs
                          • _memset.LIBCMT ref: 00A7B8FE
                          • _memset.LIBCMT ref: 00A7B90D
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00AB7F20,00AB7F64), ref: 00A7B93C
                          • CloseHandle.KERNEL32 ref: 00A7B94E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _memset$CloseCreateHandleProcess
                          • String ID:
                          • API String ID: 3277943733-0
                          • Opcode ID: 782586d007f07c2aaa7d4ec380f62c1e715be5ee8e068b9ecf0c2b71e583fd90
                          • Instruction ID: 2b662d44f4e603fdef4db3e04bf01b91933dfad9272c4ac2d2cff9bfe14c5e9d
                          • Opcode Fuzzy Hash: 782586d007f07c2aaa7d4ec380f62c1e715be5ee8e068b9ecf0c2b71e583fd90
                          • Instruction Fuzzy Hash: F8F03AB25443107AE610ABB1AC05FBF3A9CEB48354F008020BA08DA1A2D7B18D01C7AC
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 00A56E88
                            • Part of subcall function 00A5794E: _memset.LIBCMT ref: 00A57983
                          • _memmove.LIBCMT ref: 00A56EAB
                          • _memset.LIBCMT ref: 00A56EB8
                          • LeaveCriticalSection.KERNEL32(?), ref: 00A56EC8
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CriticalSection_memset$EnterLeave_memmove
                          • String ID:
                          • API String ID: 48991266-0
                          • Opcode ID: fb8a28767b66908c291f198eb18adb264c0ce310510c3682093d3e9055ab1f18
                          • Instruction ID: 232542021b4b57a12bfc79252c795c1a266ed7ce7b57ed16d8fa825fdce906b2
                          • Opcode Fuzzy Hash: fb8a28767b66908c291f198eb18adb264c0ce310510c3682093d3e9055ab1f18
                          • Instruction Fuzzy Hash: 53F0547A104210ABCF01AF55DD85E89BB2AFF49321B04C065FE085F217C731A951CBF4
                          APIs
                            • Part of subcall function 009F12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 009F134D
                            • Part of subcall function 009F12F3: SelectObject.GDI32(?,00000000), ref: 009F135C
                            • Part of subcall function 009F12F3: BeginPath.GDI32(?), ref: 009F1373
                            • Part of subcall function 009F12F3: SelectObject.GDI32(?,00000000), ref: 009F139C
                          • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00A7C030
                          • LineTo.GDI32(00000000,?,?), ref: 00A7C03D
                          • EndPath.GDI32(00000000), ref: 00A7C04D
                          • StrokePath.GDI32(00000000), ref: 00A7C05B
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                          • String ID:
                          • API String ID: 1539411459-0
                          • Opcode ID: ec57c7f0aace1c5504c0c827058dfbcb57ed5142674a3f43be6a5b4fe4e9c331
                          • Instruction ID: 9185c25dd973e5c88a2f7fd2639fd37d11070680745a150ae8f7e9a67221931f
                          • Opcode Fuzzy Hash: ec57c7f0aace1c5504c0c827058dfbcb57ed5142674a3f43be6a5b4fe4e9c331
                          • Instruction Fuzzy Hash: AEF05E32005259FBDB12AFD4AC09FDE3F99AF05321F04C114FA19651E2877956A3CBD5
                          APIs
                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00A4A399
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00A4A3AC
                          • GetCurrentThreadId.KERNEL32 ref: 00A4A3B3
                          • AttachThreadInput.USER32(00000000), ref: 00A4A3BA
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                          • String ID:
                          • API String ID: 2710830443-0
                          • Opcode ID: 17916f70e1d1971a3341516b7db0026fc04aaf839ee374e5f499d95b52700866
                          • Instruction ID: 7d26b31500e4472a2591fe82bbdac03818697f61511288d06621ae7f793f792b
                          • Opcode Fuzzy Hash: 17916f70e1d1971a3341516b7db0026fc04aaf839ee374e5f499d95b52700866
                          • Instruction Fuzzy Hash: 83E06D35285368BEDB209FA2DC0CED77F5CEF267A1F008024F60C88060D6B1D681DBA0
                          APIs
                          • GetSysColor.USER32(00000008), ref: 009F2231
                          • SetTextColor.GDI32(?,000000FF), ref: 009F223B
                          • SetBkMode.GDI32(?,00000001), ref: 009F2250
                          • GetStockObject.GDI32(00000005), ref: 009F2258
                          • GetWindowDC.USER32(?,00000000), ref: 00A2C0D3
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00A2C0E0
                          • GetPixel.GDI32(00000000,?,00000000), ref: 00A2C0F9
                          • GetPixel.GDI32(00000000,00000000,?), ref: 00A2C112
                          • GetPixel.GDI32(00000000,?,?), ref: 00A2C132
                          • ReleaseDC.USER32(?,00000000), ref: 00A2C13D
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                          • String ID:
                          • API String ID: 1946975507-0
                          • Opcode ID: 605fb7cb11b8b69587218129fb24392439d11c19e1e441ee2f962745a85226c0
                          • Instruction ID: 3516dc3c56b807c9d2d09f1e88eac603d4997c792e501806079f688097e3f57e
                          • Opcode Fuzzy Hash: 605fb7cb11b8b69587218129fb24392439d11c19e1e441ee2f962745a85226c0
                          • Instruction Fuzzy Hash: 03E0C932604244EEDB219FA8FC097D87B14AB15736F54C376FB6D980E187714AD1DB11
                          APIs
                          • GetCurrentThread.KERNEL32 ref: 00A48C63
                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,00A4882E), ref: 00A48C6A
                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00A4882E), ref: 00A48C77
                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,00A4882E), ref: 00A48C7E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CurrentOpenProcessThreadToken
                          • String ID:
                          • API String ID: 3974789173-0
                          • Opcode ID: 2353df4ee4df9e4796931b3d7943f64763d7d3fae9618ec9fb1a32f3e6647bd0
                          • Instruction ID: 2284dec632a1d87ce1cff6c2469b01f1d07caca40df08d28279987eff5c33721
                          • Opcode Fuzzy Hash: 2353df4ee4df9e4796931b3d7943f64763d7d3fae9618ec9fb1a32f3e6647bd0
                          • Instruction Fuzzy Hash: C6E08636642211DFD7609FF06D0CB9A3BACFF50792F048838B649CA040EA3886C3CB61
                          APIs
                          • GetDesktopWindow.USER32 ref: 00A32187
                          • GetDC.USER32(00000000), ref: 00A32191
                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A321B1
                          • ReleaseDC.USER32(?), ref: 00A321D2
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CapsDesktopDeviceReleaseWindow
                          • String ID:
                          • API String ID: 2889604237-0
                          • Opcode ID: 7d1534e7d4e9cc79c796cd484ee75bae0235ac98fc63cf0e1ea46ca335e44caa
                          • Instruction ID: 4f570892294a4b5ec14e629a0abef20de1d008289d1ca1a369ec91894ec1453a
                          • Opcode Fuzzy Hash: 7d1534e7d4e9cc79c796cd484ee75bae0235ac98fc63cf0e1ea46ca335e44caa
                          • Instruction Fuzzy Hash: 3BE0E5B5804208EFDB019FA0CD08BADBBF1EB4C350F10C425F95A97220DB3882829F40
                          APIs
                          • GetDesktopWindow.USER32 ref: 00A3219B
                          • GetDC.USER32(00000000), ref: 00A321A5
                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00A321B1
                          • ReleaseDC.USER32(?), ref: 00A321D2
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CapsDesktopDeviceReleaseWindow
                          • String ID:
                          • API String ID: 2889604237-0
                          • Opcode ID: 8f99c2617e031042f2fc9aa201eb80b4368bcb799658e5fec49f11b47018a9ce
                          • Instruction ID: 4c31e7444fb5000a18c92a02c741e08bd0c53160822aebc146d56cf5ae54c9ba
                          • Opcode Fuzzy Hash: 8f99c2617e031042f2fc9aa201eb80b4368bcb799658e5fec49f11b47018a9ce
                          • Instruction Fuzzy Hash: 72E075B5804208AFCB119FA0DD086ADBBE5AB5C351F11C425F95A97260DB7896829F44
                          APIs
                          • OleSetContainedObject.OLE32(?,00000001), ref: 00A4B981
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ContainedObject
                          • String ID: AutoIt3GUI$Container
                          • API String ID: 3565006973-3941886329
                          • Opcode ID: fad7c1a6865d84281c15c41af63c9e109dcb45eff000435bcfbdf2b2d80dca93
                          • Instruction ID: a575831a17d27ddcd8c84551eb3cdb0bc39f3479971e88be96318a6438f2ffa7
                          • Opcode Fuzzy Hash: fad7c1a6865d84281c15c41af63c9e109dcb45eff000435bcfbdf2b2d80dca93
                          • Instruction Fuzzy Hash: 68914A74610201AFDB24DF68C885B6ABBF9FF89710F14856DF94ACB691DB70E841CB60
                          APIs
                            • Part of subcall function 00A0FEC6: _wcscpy.LIBCMT ref: 00A0FEE9
                            • Part of subcall function 009F9997: __itow.LIBCMT ref: 009F99C2
                            • Part of subcall function 009F9997: __swprintf.LIBCMT ref: 009F9A0C
                          • __wcsnicmp.LIBCMT ref: 00A5B298
                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00A5B361
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                          • String ID: LPT
                          • API String ID: 3222508074-1350329615
                          • Opcode ID: 30cd0161d29fd27446fc52743174418d8cc73517e4122379e1ab042001c3f195
                          • Instruction ID: 2cf2fa129f123466c7250b24f4d5ea655c5d553a5e082c88c37b9d2abae8a41e
                          • Opcode Fuzzy Hash: 30cd0161d29fd27446fc52743174418d8cc73517e4122379e1ab042001c3f195
                          • Instruction Fuzzy Hash: 01617275A10219AFCB14DF98C985EBEB7B4BF48311F114069F946BB391DB70AE84CB60
                          APIs
                          • Sleep.KERNEL32(00000000), ref: 00A02AC8
                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00A02AE1
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: GlobalMemorySleepStatus
                          • String ID: @
                          • API String ID: 2783356886-2766056989
                          • Opcode ID: 8b1028a99502636575259983bebf40a50e3abc13601fc6afb5754cf7b8aa9159
                          • Instruction ID: 54bf39f2e146aa3eea0383d4f973b89c6215e6b74caa365c98dc6b2c50b1e995
                          • Opcode Fuzzy Hash: 8b1028a99502636575259983bebf40a50e3abc13601fc6afb5754cf7b8aa9159
                          • Instruction Fuzzy Hash: 525157715187489BD320AF54DC86BBBBBE8FBC4310F82885DF2D9810A1DF308529CB26
                          APIs
                            • Part of subcall function 009F506B: __fread_nolock.LIBCMT ref: 009F5089
                          • _wcscmp.LIBCMT ref: 00A59AAE
                          • _wcscmp.LIBCMT ref: 00A59AC1
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _wcscmp$__fread_nolock
                          • String ID: FILE
                          • API String ID: 4029003684-3121273764
                          • Opcode ID: 6df2c26d08e46af5f1a0a53a9ec81d1ad3130192aa58342fb9c266d3e35377fc
                          • Instruction ID: 042d0320abe1b3d561d5f55fc67cfdd4d5445e8a74b2d86de1bb5de2b40cb498
                          • Opcode Fuzzy Hash: 6df2c26d08e46af5f1a0a53a9ec81d1ad3130192aa58342fb9c266d3e35377fc
                          • Instruction Fuzzy Hash: 1541E771A00619FADF209FA0DC45FEFBBBDEF89714F050469FA04AB181DB759A0487A1
                          APIs
                          • _memset.LIBCMT ref: 00A62892
                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00A628C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CrackInternet_memset
                          • String ID: |
                          • API String ID: 1413715105-2343686810
                          • Opcode ID: 67adf1d8d3a53a70cd68b1ce48dd8e6222f67ab6146be4fdbe423644a55c42e7
                          • Instruction ID: b6d37f95fabc4dd4c774b56ee600ea8b569d3257c4e5480f37f833fede0f60d8
                          • Opcode Fuzzy Hash: 67adf1d8d3a53a70cd68b1ce48dd8e6222f67ab6146be4fdbe423644a55c42e7
                          • Instruction Fuzzy Hash: 2E313A72800119AFDF01EFA1CC85EEEBFB9FF48350F104029F915A6166DB319A56DBA0
                          APIs
                          • DestroyWindow.USER32(?,?,?,?), ref: 00A76D86
                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00A76DC2
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$DestroyMove
                          • String ID: static
                          • API String ID: 2139405536-2160076837
                          • Opcode ID: 2d6e3cc5fef8d008b593a01d6bba35315615cfa321edea791b3cc0cf52d8c2b6
                          • Instruction ID: 5f4a0aa77cdd27b7c1973abc6bf117aa8bb2ffc661052b335a6d492f7e96b0bc
                          • Opcode Fuzzy Hash: 2d6e3cc5fef8d008b593a01d6bba35315615cfa321edea791b3cc0cf52d8c2b6
                          • Instruction Fuzzy Hash: E7317E71210A04AEDB20DF64CC80BFB77B9FF48720F14C619F9A997191DA31AC91CB60
                          APIs
                          • _memset.LIBCMT ref: 00A52E00
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00A52E3B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: InfoItemMenu_memset
                          • String ID: 0
                          • API String ID: 2223754486-4108050209
                          • Opcode ID: 1fa579a43abdb1174cc0b5de96ce055be215d1c0fd777b24743853f5c50933cc
                          • Instruction ID: c10073ee9f031f2e4f3e3b3e53546cb0c629f1de341d926f8a50aa6cc7e1db5e
                          • Opcode Fuzzy Hash: 1fa579a43abdb1174cc0b5de96ce055be215d1c0fd777b24743853f5c50933cc
                          • Instruction Fuzzy Hash: 27310672A00305ABEB24CF58D986BEEBFB9FF06341F144029ED85961A0D7709D89CB50
                          APIs
                            • Part of subcall function 00A0619A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00A061B1
                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00A4B03B
                          • _strlen.LIBCMT ref: 00A4B046
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout_strlen
                          • String ID: @U=u
                          • API String ID: 2777139624-2594219639
                          • Opcode ID: d30e6ef631c3702d150e10771c5d26e28c5cd96c95501d57cd51e8768a5834e2
                          • Instruction ID: 35eabc56c183115621615d0f49dbcfb76b48cd5f43de4d144869175a552e878f
                          • Opcode Fuzzy Hash: d30e6ef631c3702d150e10771c5d26e28c5cd96c95501d57cd51e8768a5834e2
                          • Instruction Fuzzy Hash: CC1105362102096ACB14AFB89CC2ABF7B699FC9301F00003EF6059A193DF65CD858370
                          APIs
                            • Part of subcall function 00A5589F: GetLocalTime.KERNEL32 ref: 00A558AC
                            • Part of subcall function 00A5589F: _wcsncpy.LIBCMT ref: 00A558E1
                            • Part of subcall function 00A5589F: _wcsncpy.LIBCMT ref: 00A55913
                            • Part of subcall function 00A5589F: _wcsncpy.LIBCMT ref: 00A55946
                            • Part of subcall function 00A5589F: _wcsncpy.LIBCMT ref: 00A55988
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00A76B6E
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: _wcsncpy$LocalMessageSendTime
                          • String ID: @U=u$SysDateTimePick32
                          • API String ID: 2466184910-2530228043
                          • Opcode ID: e5f557a831ced4f211b12ee817c7ae1fdddd28a49643d0e6fa0c7dfb209d4487
                          • Instruction ID: e8b53102ae9732e20546a7afdacdb5389e674dc99de7dd74771f04b06d782a3b
                          • Opcode Fuzzy Hash: e5f557a831ced4f211b12ee817c7ae1fdddd28a49643d0e6fa0c7dfb209d4487
                          • Instruction Fuzzy Hash: CD2106313802097FEF219F64CC82FEA7369EB85760F10C519F948E71D0D6B1AC8187A0
                          APIs
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A49720
                            • Part of subcall function 00A518EE: GetWindowThreadProcessId.USER32(?,?), ref: 00A51919
                            • Part of subcall function 00A518EE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00A4973C,00000034,?,?,00001004,00000000,00000000), ref: 00A51929
                            • Part of subcall function 00A518EE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00A4973C,00000034,?,?,00001004,00000000,00000000), ref: 00A5193F
                            • Part of subcall function 00A519CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A49778,?,?,00000034,00000800,?,00000034), ref: 00A519F6
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00A49787
                            • Part of subcall function 00A51997: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A497A7,?,?,00000800,?,00001073,00000000,?,?), ref: 00A519C1
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Process$MemoryMessageSend$AllocOpenReadThreadVirtualWindowWrite
                          • String ID: @U=u
                          • API String ID: 1045663743-2594219639
                          • Opcode ID: 4676555ea438485b24cbd7d5f5de8b69ba0c9b89fb0fc33cfe632036eccedb17
                          • Instruction ID: 68a37715800cfa3a718ebb64c762431b28ad689bb55c3a029d1fccd72a0fd600
                          • Opcode Fuzzy Hash: 4676555ea438485b24cbd7d5f5de8b69ba0c9b89fb0fc33cfe632036eccedb17
                          • Instruction Fuzzy Hash: 55215E35901129EBEF21EFA4DD41FDABBB8FF08354F1001A5F948A7190DA705A94DB90
                          APIs
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00A769D0
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00A769DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: Combobox
                          • API String ID: 3850602802-2096851135
                          • Opcode ID: 40aa63b926c754795a338866e4a2b48977f7f03431e6df09119d9333c8b787b5
                          • Instruction ID: d51a07ad872891135ea227f0b504a9b5b7b8301d77e73bd45fd27d5241812804
                          • Opcode Fuzzy Hash: 40aa63b926c754795a338866e4a2b48977f7f03431e6df09119d9333c8b787b5
                          • Instruction Fuzzy Hash: B511B271700609AFEF119F54CC90FFB376AEB893A4F15C124FA5C97291D6719C9187A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID:
                          • String ID: @U=u
                          • API String ID: 0-2594219639
                          • Opcode ID: 4b36dae2b5e0fcb6c3ff9bea0ad0b573b6aabd79b30d9d93eb1f65bc06fc2cda
                          • Instruction ID: 93460c95a8825d2ca44db550876ad4d17132f8b7cfa064edf9ad0b7e6021d7b4
                          • Opcode Fuzzy Hash: 4b36dae2b5e0fcb6c3ff9bea0ad0b573b6aabd79b30d9d93eb1f65bc06fc2cda
                          • Instruction Fuzzy Hash: AD21AF31244148BFEB10CF58CC42FBB37A4EB09350F00C15AFA1AEA1E1D670DE529B60
                          APIs
                            • Part of subcall function 009F1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 009F1D73
                            • Part of subcall function 009F1D35: GetStockObject.GDI32(00000011), ref: 009F1D87
                            • Part of subcall function 009F1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 009F1D91
                          • GetWindowRect.USER32(00000000,?), ref: 00A76EE0
                          • GetSysColor.USER32(00000012), ref: 00A76EFA
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                          • String ID: static
                          • API String ID: 1983116058-2160076837
                          • Opcode ID: 25695a879230f9c5aabde605b8543aaf299c8529ac3d25aa0d840e934eee6ca5
                          • Instruction ID: dd21176430e9dc85ebe2005e1d6171c868f59cccf1b691cf8a93d433d68987ac
                          • Opcode Fuzzy Hash: 25695a879230f9c5aabde605b8543aaf299c8529ac3d25aa0d840e934eee6ca5
                          • Instruction Fuzzy Hash: D6213A7261060AAFDB04DFA8DD45AFA7BB8FB08314F048629FD59E3250D735E861DB60
                          APIs
                          • _memset.LIBCMT ref: 00A52F11
                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00A52F30
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: InfoItemMenu_memset
                          • String ID: 0
                          • API String ID: 2223754486-4108050209
                          • Opcode ID: 9db98bf8ab0dd1cba4434d5a322ea1908aababe52fe57b72d699fdc11f258199
                          • Instruction ID: ef8e338574893e3cae9fdc7152f24388caebd2e7a8ea66b6e1f638a004d989e7
                          • Opcode Fuzzy Hash: 9db98bf8ab0dd1cba4434d5a322ea1908aababe52fe57b72d699fdc11f258199
                          • Instruction Fuzzy Hash: E911EF32901214ABDB20DB98EC45BAD77B9FB07312F0880A5EC44A72A0D7B0AE1DC7D1
                          APIs
                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00A62520
                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00A62549
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Internet$OpenOption
                          • String ID: <local>
                          • API String ID: 942729171-4266983199
                          • Opcode ID: 0a954bf1ff131cb68b6f2f1f914f7148d5683c49915257b0d2ea36095ca76748
                          • Instruction ID: 7a00bb7f5a809d2db413b3d7fc3f0fb9e2b518e52dbe5dbf7ebc9b40c6395579
                          • Opcode Fuzzy Hash: 0a954bf1ff131cb68b6f2f1f914f7148d5683c49915257b0d2ea36095ca76748
                          • Instruction Fuzzy Hash: A9119E70501A25BEDB348F518C99FBBFFB8FB16751F10812AF94656040D7746981DBA0
                          APIs
                          • SendMessageW.USER32(?,?,?,?), ref: 00A7879F
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: d1db9588048152d9b1e694745c9b1dbe9d050a382aa5e9239b6d22cb2026eb5a
                          • Instruction ID: fc1e063bf86dc6c46f61a76d24cafeb5e14cfb29a0046cca15d70e1bcf8d7db0
                          • Opcode Fuzzy Hash: d1db9588048152d9b1e694745c9b1dbe9d050a382aa5e9239b6d22cb2026eb5a
                          • Instruction Fuzzy Hash: 9A21F975600109EF8B19CF94DC848EA7BB5FB4C340B108154FD0AA7320DB35ED61DBA0
                          APIs
                          • SendMessageW.USER32(?,00000401,?,00000000), ref: 00A7689B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u$button
                          • API String ID: 3850602802-1762282863
                          • Opcode ID: 1c671440ced882e8bdcd6e2343cf4b001d1eda3941a28e04a3dc9dcfbd4771e7
                          • Instruction ID: 720e87d2b577fccc9a8d2ea7fe1e596892c28e868cc056d27d160fd42cc4e46a
                          • Opcode Fuzzy Hash: 1c671440ced882e8bdcd6e2343cf4b001d1eda3941a28e04a3dc9dcfbd4771e7
                          • Instruction Fuzzy Hash: E1110432150209ABDF018FA0CC41FEA376AFF48314F15C618FE58A7190C776E8919B61
                          APIs
                          • SendMessageW.USER32(?,0000133E,00000000,?), ref: 00A77B47
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: cfe727eba8eaaef60dab052d984b534e8d276977951760fc56d203ab47535247
                          • Instruction ID: 6131542f754ee3f07270312b71f057176c6a48500ef99f9204858536b57f8f6e
                          • Opcode Fuzzy Hash: cfe727eba8eaaef60dab052d984b534e8d276977951760fc56d203ab47535247
                          • Instruction Fuzzy Hash: E311BE30504344AFDB20DF74C891AEBB7E8BF46310F10C91DE9AF57291DB7169419BA0
                          APIs
                            • Part of subcall function 00A6830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00A680C8,?,00000000,?,?), ref: 00A68322
                          • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00A680CB
                          • htons.WSOCK32(00000000,?,00000000), ref: 00A68108
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ByteCharMultiWidehtonsinet_addr
                          • String ID: 255.255.255.255
                          • API String ID: 2496851823-2422070025
                          • Opcode ID: a13d200d7d478c55d29ef67f93072cba703b43b57cebfcbda959c14c28138a13
                          • Instruction ID: 4ffbb8762f093e0173f5bfa2efe24a6012f1673b496aafb87faa50ea605f8f77
                          • Opcode Fuzzy Hash: a13d200d7d478c55d29ef67f93072cba703b43b57cebfcbda959c14c28138a13
                          • Instruction Fuzzy Hash: C511C434600209ABDB20EFA4CC46FBEB378FF55720F108626FA159B2D1DB72A815C795
                          APIs
                            • Part of subcall function 00A519CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A49778,?,?,00000034,00000800,?,00000034), ref: 00A519F6
                          • SendMessageW.USER32(?,0000102B,?,00000000), ref: 00A499EB
                          • SendMessageW.USER32(?,0000102B,?,00000000), ref: 00A49A10
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$MemoryProcessWrite
                          • String ID: @U=u
                          • API String ID: 1195347164-2594219639
                          • Opcode ID: 8fac503475f8479b35ae6829bd82e46da14c4f166f08c8285850426855b900ea
                          • Instruction ID: ab4db44f69b69874355ed9ba38be036f85dddefb47d31450ed680fb0718afa88
                          • Opcode Fuzzy Hash: 8fac503475f8479b35ae6829bd82e46da14c4f166f08c8285850426855b900ea
                          • Instruction Fuzzy Hash: 4E01DB32900118EBDB21AF64DC46FEBBB78EB44360F10416AF955A70D1DB706DA5CB60
                          APIs
                          • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 00A49ADD
                          • SendMessageW.USER32(?,0000040D,?,00000000), ref: 00A49B10
                            • Part of subcall function 00A51997: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00A497A7,?,?,00000800,?,00001073,00000000,?,?), ref: 00A519C1
                            • Part of subcall function 009F7D2C: _memmove.LIBCMT ref: 009F7D66
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend$MemoryProcessRead_memmove
                          • String ID: @U=u
                          • API String ID: 339422723-2594219639
                          • Opcode ID: 8f58f4100d2b2001bbb6072d625c132b42211abe291004a0eab24177cf3d97e7
                          • Instruction ID: f4221296fcf06e2da2614c3f5d810517556620dc2a20fd9ddabbd06a53a602fd
                          • Opcode Fuzzy Hash: 8f58f4100d2b2001bbb6072d625c132b42211abe291004a0eab24177cf3d97e7
                          • Instruction Fuzzy Hash: 9C015B7190111CAFDB60EEA0DC91EEA77BCFB18340F40C0A6BA89A6150DE315E99CB90
                          APIs
                            • Part of subcall function 009F2612: GetWindowLongW.USER32(?,000000EB), ref: 009F2623
                          • DefDlgProcW.USER32(?,0000002B,?,?,?,?,?,?,?,00A2BB8A,?,?,?), ref: 00A7C8E1
                            • Part of subcall function 009F25DB: GetWindowLongW.USER32(?,000000EB), ref: 009F25EC
                          • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00A7C8C7
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: LongWindow$MessageProcSend
                          • String ID: @U=u
                          • API String ID: 982171247-2594219639
                          • Opcode ID: e476b0982cabdf1ad2145a6663b14be487f64246d3b66796128185f1fcda9498
                          • Instruction ID: 75971271663946ef78f8764c02c9203b4f05665d08d71d3a27ac6a661f0bafd0
                          • Opcode Fuzzy Hash: e476b0982cabdf1ad2145a6663b14be487f64246d3b66796128185f1fcda9498
                          • Instruction Fuzzy Hash: C401D831200204AFCB219F54CC54F6A3BB6FF89334F14C168F9594B2E1CB319842EB92
                          APIs
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00A49A2E
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00A49A46
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: a0653a632a4f8f3ad5abbe1793b8febc7512587084329a7153a4fb67286763c6
                          • Instruction ID: 83b47d1ae5a1f1d6d1e6a80db840501c2edf85935acb1732a827aa7103d7d027
                          • Opcode Fuzzy Hash: a0653a632a4f8f3ad5abbe1793b8febc7512587084329a7153a4fb67286763c6
                          • Instruction Fuzzy Hash: 64E09B393423517AF63056554D4EFD75F59DBC9FA1F110039BB05991E1CAD14CA382A1
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00A4A1BA
                          • SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00A4A1EA
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: 0522de43a502e13cc25e98f45e03d74cca51f831d1a259a75ae7464356beaf8f
                          • Instruction ID: b234ab33d2b66a8632d592d7eb90b3e09eb0a861ca1b0366d14b05eee786240b
                          • Opcode Fuzzy Hash: 0522de43a502e13cc25e98f45e03d74cca51f831d1a259a75ae7464356beaf8f
                          • Instruction Fuzzy Hash: 03F08235340304BFEA116A949C46FE67A19FB58B91F104024F7055A0E1D6A25D909750
                          APIs
                            • Part of subcall function 00A49E2E: SendMessageW.USER32(?,0000110A,00000000,00000000), ref: 00A49E47
                            • Part of subcall function 00A49E2E: SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00A49E81
                          • SendMessageW.USER32(?,0000110B,00000005,00000000), ref: 00A4A34B
                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00A4A35B
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: bf41a348bfd59e2c304293f6c30d327feddf60f8b919ecf11a5e3f563780ad17
                          • Instruction ID: 99d233f77f06e1725c822d5f910e46bfeb455ca82b8e4d8721d39adede47a443
                          • Opcode Fuzzy Hash: bf41a348bfd59e2c304293f6c30d327feddf60f8b919ecf11a5e3f563780ad17
                          • Instruction Fuzzy Hash: 4EE0D87D3443057FF6255F619C4BE97372CEB98B51F114039B300450A0EFA29CA06520
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp
                          • String ID: #32770
                          • API String ID: 2292705959-463685578
                          • Opcode ID: 085fb9886a588573fddc4732a565d353357aa6a9cd7587abb8c96564f7dbb190
                          • Instruction ID: a0f39eef02815e1b6543d08f57d4f476b77797dcf14a6c6eef1dca524cdc0154
                          • Opcode Fuzzy Hash: 085fb9886a588573fddc4732a565d353357aa6a9cd7587abb8c96564f7dbb190
                          • Instruction Fuzzy Hash: 07E02B329002292AD720DA959C05BE7F7ECFB41721F00015AFD14D3050E6609A4587D0
                          APIs
                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00A481CA
                            • Part of subcall function 00A13598: _doexit.LIBCMT ref: 00A135A2
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: Message_doexit
                          • String ID: AutoIt$Error allocating memory.
                          • API String ID: 1993061046-4017498283
                          • Opcode ID: 762bb1c0f5ad6a4457b1fbc773dadb7d56270ed9a9372669f4d692f0a55669e2
                          • Instruction ID: 6f285cba1aaa6d1cf1a29b1dc936dc41e398cd28ca81e4f61338d70288c27b96
                          • Opcode Fuzzy Hash: 762bb1c0f5ad6a4457b1fbc773dadb7d56270ed9a9372669f4d692f0a55669e2
                          • Instruction Fuzzy Hash: 10D05B323C535836D21433E86D07FCB794C5B09F51F144426BB08555D38ED555D243D9
                          APIs
                            • Part of subcall function 00A2B564: _memset.LIBCMT ref: 00A2B571
                            • Part of subcall function 00A10B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00A2B540,?,?,?,009F100A), ref: 00A10B89
                          • IsDebuggerPresent.KERNEL32(?,?,?,009F100A), ref: 00A2B544
                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,009F100A), ref: 00A2B553
                          Strings
                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00A2B54E
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                          • API String ID: 3158253471-631824599
                          • Opcode ID: 96c7deecc87b3c869b9fac8c9bdf25a6ddba7641e75b2ae4a13c6544fd3eaa9c
                          • Instruction ID: 004890d6f8af30a69a1de57c3a5de6f77cb5a614fcbbdb4b57483b0395823053
                          • Opcode Fuzzy Hash: 96c7deecc87b3c869b9fac8c9bdf25a6ddba7641e75b2ae4a13c6544fd3eaa9c
                          • Instruction Fuzzy Hash: 51E06D706103208FD720DF68E9447827BE4AF00704F04893DE446CA262DBB8D585CBA1
                          APIs
                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00A498CB
                          • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 00A498D9
                          Strings
                          Memory Dump Source
                          • Source File: 00000005.00000002.1306667245.00000000009F1000.00000020.00000001.01000000.00000004.sdmp, Offset: 009F0000, based on PE: true
                          • Associated: 00000005.00000002.1306650601.00000000009F0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000A7F000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306731181.0000000000AA5000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306779011.0000000000AAF000.00000004.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000005.00000002.1306801702.0000000000AB8000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_5_2_9f0000_Aviso de cuenta vencida de DHL - 1606622076_86576432567897664542354656.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: @U=u
                          • API String ID: 3850602802-2594219639
                          • Opcode ID: a9da44ae78262ebd38c57271b55af16095249147dd2998e015f369e1b2538334
                          • Instruction ID: 16875b54b2c9918f5ffa510298b21d3b20f0ddf5900347a5da71488ca5f99df0
                          • Opcode Fuzzy Hash: a9da44ae78262ebd38c57271b55af16095249147dd2998e015f369e1b2538334
                          • Instruction Fuzzy Hash: 35C002312411C0BAEA215BB7AC0DD873E3DE7CAF52711416CB215950B586650196D624